Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.178",
%%%     date            = "18 April 2024",
%%%     time            = "06:11:31 MST",
%%%     filename        = "compsurv.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "https://www.math.utah.edu/~beebe",
%%%     checksum        = "21341 100728 470345 4769365",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography, BibTeX, Computing Surveys",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of ACM
%%%                        Computing Surveys (known just as Computing
%%%                        Surveys until volume 3 in 1971), covering
%%%                        all volumes from 1969 to date.
%%%
%%%                        Volume 28, number 4es, and Volume 30,
%%%                        number 3es, are electronic supplements that
%%%                        are only available online at World-Wide Web
%%%                        URLs given in the entries.  The articles in
%%%                        the first supplement are listed in the
%%%                        table of contents of volume 28, number 4,
%%%                        but do not appear in the issue itself.  The
%%%                        last article in Volume 28, number 4es is
%%%                        missing from that table of contents.
%%%
%%%                        The journal ISSN changed from 0010-4892 to
%%%                        0360-0300 at the June 1983 issue, for no
%%%                        obvious reason: the journal title remained
%%%                        unchanged.
%%%
%%%                        At version 1.178, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             1969 (  17)    1988 (  17)    2007 (  12)
%%%                             1970 (  18)    1989 (  22)    2008 (  19)
%%%                             1971 (   9)    1990 (  22)    2009 (  20)
%%%                             1972 (  12)    1991 (  23)    2010 (  15)
%%%                             1973 (   9)    1992 (  23)    2011 (  31)
%%%                             1974 (  14)    1993 (  19)    2012 (  38)
%%%                             1975 (  15)    1994 (  17)    2013 (  92)
%%%                             1976 (  17)    1995 (  92)    2014 (  29)
%%%                             1977 (  27)    1996 ( 336)    2015 (  71)
%%%                             1978 (  38)    1997 (  19)    2016 (  91)
%%%                             1979 (  41)    1998 (  43)    2017 (  94)
%%%                             1980 (  29)    1999 (  87)    2018 ( 108)
%%%                             1981 (  30)    2000 (  55)    2019 ( 151)
%%%                             1982 (  28)    2001 (  12)    2020 ( 133)
%%%                             1983 (  27)    2002 (  14)    2021 ( 157)
%%%                             1984 (  19)    2003 (  13)    2022 ( 109)
%%%                             1985 (  22)    2004 (  12)    2023 ( 322)
%%%                             1986 (  20)    2005 (  11)    2024 ( 190)
%%%                             1987 (  20)    2006 (  13)
%%%
%%%                             Article:       2942
%%%                             Book:             2
%%%
%%%                             Total entries: 2944
%%%
%%%                        The bibliography also includes entries for
%%%                        all editorial comments, and for Surveyor's
%%%                        Forum letters.  Articles and letters that
%%%                        comment on them are cross-referenced in both
%%%                        directions, so that citation of one of them
%%%                        will automatically include the others.  A
%%%                        small number of additional entries from
%%%                        outside ACM Computing Surveys are included to
%%%                        satisfy cross references.
%%%
%%%                        The initial draft of this bibliography was
%%%                        extracted from the ACM Computing Archive CD
%%%                        ROM for the 1980s, with manual corrections
%%%                        and additions.  Major additions were then
%%%                        obtained from the huge Computer Science
%%%                        bibliography archive on ftp.ira.uka.de.  The
%%%                        remaining entries were added by hand, and all
%%%                        entries were rechecked against the original
%%%                        journal issues, which resulted in numerous
%%%                        corrections.  Math Review MRclass and
%%%                        MRnumber values were supplied from a search
%%%                        of the American Mathematical Society's
%%%                        MathSciNet database for six entries, the
%%%                        only ones covered there.  At version 1.36
%%%                        [18-Dec-1996], search results from the
%%%                        Compendex databases (1970--1996) were used
%%%                        to check and augment the bibliographic
%%%                        data.
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.  Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        The ACM maintains Web pages with journal
%%%                        tables of contents for 1985--date at
%%%
%%%                            http://www.acm.org/pubs/toc
%%%
%%%                        The Web pages for Computing Surveys are at
%%%
%%%                            http://www.acm.org/pubs/contents/journals/surveys/
%%%                            http://portal.acm.org/browse_dl.cfm?idx=J204
%%%                            https://dl.acm.org/loi/csur
%%%
%%%                        That data has been automatically converted to
%%%                        BibTeX form, corrected for spelling and page
%%%                        number errors, and merged into this file.
%%%
%%%                        ACM copyrights explicitly permit abstracting
%%%                        with credit, so article abstracts, keywords,
%%%                        and subject classifications have been
%%%                        included in this bibliography wherever
%%%                        available.  Article reviews have been
%%%                        omitted, until their copyright status has
%%%                        been clarified.
%%%
%%%                        bibsource keys in the bibliography entries
%%%                        below indicate the entry originally came
%%%                        from the computer science bibliography
%%%                        archive, even though it has likely since
%%%                        been corrected and updated.
%%%
%%%                        URL keys in the bibliography point to
%%%                        World Wide Web locations of additional
%%%                        information about the entry.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted by
%%%                        journal, and then by publication order, with
%%%                        the help of ``bibsort -byvolume''.  The
%%%                        bibsort utility is available from
%%%                        ftp://ftp.math.utah.edu/pub/tex/bib/bibsort-x.y.*,
%%%                        where x.y is a version number.
%%%
%%%                        Fields within entries have been put into a
%%%                        consistent order by the biborder utility
%%%                        [ftp://ftp.math.utah.edu/pub/tex/bib/biborder-x.y.*].
%%%                        and the entire bibliography has been
%%%                        processed by the bibclean syntax checker and
%%%                        prettyprinter,
%%%                        [ftp://ftp.math.utah.edu/pub/tex/bib/bibclean-x.y.*],
%%%                        and by bibcheck
%%%                        [ftp://ftp.math.utah.edu/pub/tex/bib/bibcheck-x.y.*].
%%%
%%%                        Numerous heuristic checks on the validity
%%%                        of the bibliography files have been made
%%%                        using software developed by the author for
%%%                        maintenance of the TeX Users Group and
%%%                        BibNet bibliography collections.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{"\input bibnames.sty "
 # "\input path.sty "
 # "\hyphenation{
                Les-lie
                Pren-tice
                Rich-ard
                Schlotz-hauer
                Spring-er
                } "
 # "\ifx \undefined \circled \def \circled #1{(#1)}          \fi"
 # "\ifx \undefined \mathbb  \def \mathbb  #1{{\bf #1}}      \fi"
 # "\ifx \undefined \reg     \def \reg       {\circled{R}}   \fi"
 # "\ifx \undefined \TM      \def \TM        {${}^{\sc TM}$} \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-COMP-SURV             = "ACM Computing Surveys"}

%%% ====================================================================
%%% Publisher abbreviations:
@String{pub-MIT                 = "MIT Press"}

@String{pub-MIT:adr             = "Cambridge, MA, USA"}

@String{pub-SUCSLI              = "Stanford University Center for the Study of
                                  Language and Information"}

@String{pub-SUCSLI:adr          = "Stanford, CA, USA"}

%%% ====================================================================
%%% Bibliography entries: The book entries at the end of this file are
%%% cross-referenced from earlier article entries.
@Article{Finerman:1969:EN,
  author =       "Aaron Finerman",
  title =        "An Editorial Note",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "1",
  pages =        "1--1",
  month =        mar,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356540.356541",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:12:26 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dorn:1969:EPa,
  author =       "William S. Dorn",
  title =        "{Editor}'s Preview\ldots{}",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "1",
  pages =        "2--5",
  month =        mar,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356540.356542",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:12:26 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rosen:1969:ECH,
  author =       "Saul Rosen",
  title =        "Electronic Computers: a Historical Survey",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "1",
  pages =        "7--36",
  month =        mar,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356540.356543",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:12:26 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The first large scale electronic computers were built
                 in connection with university projects sponsored by
                 government military and research organizations. Many
                 established companies, as well as new companies,
                 entered the computer field during the first generation,
                 1947--1959, in which the vacuum tube was almost
                 universally used as the active component in the
                 implementation of computer logic. The second generation
                 was characterized by the transistorized computers that
                 began to appear in 1959. Some of the computers built
                 then and since are considered super computers; they
                 attempt to go to the limit of current technology in
                 terms of size, speed, and logical complexity. From 1965
                 onward, most new computers belong to a third
                 generation, which features integrated circuit
                 technology and multiprocessor multiprogramming
                 systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer history; electronic computers; magnetic drum
                 computers; super computers; time-sharing;
                 transistorized computers; university computer projects;
                 vacuum tube computers",
}

@Article{Rosin:1969:SMS,
  author =       "Robert F. Rosin",
  title =        "Supervisory and Monitor Systems",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "1",
  pages =        "37--54",
  month =        mar,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356540.356544",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:12:26 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Glass:1969:EDC,
  author =       "R. L. Glass",
  title =        "An Elementary Discussion of Compiler\slash Interpreter
                 Writing",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "1",
  pages =        "55--77",
  month =        mar,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356540.356545",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:12:26 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dorn:1969:EPb,
  author =       "William S. Dorn",
  title =        "{Editor}'s Preview \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "2",
  pages =        "81--84",
  month =        jun,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356546.356547",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:12:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hoffman:1969:CPS,
  author =       "Lance J. Hoffman",
  title =        "Computers and Privacy: a Survey",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "2",
  pages =        "85--103",
  month =        jun,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356546.356548",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:12:45 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  annote =       "Survey, discussion, and large Bibliography.",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{McKinney:1969:SAT,
  author =       "J. M. McKinney",
  title =        "A Survey of Analytical Time-Sharing Models",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "2",
  pages =        "105--116",
  month =        jun,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356546.356549",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:12:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dodd:1969:EDM,
  author =       "George G. Dodd",
  title =        "Elements of Data Management Systems",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "2",
  pages =        "117--133",
  month =        jun,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356546.356550",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:12:45 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  annote =       "definitions and examples of various file org.
                 methods.",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dorn:1969:EPc,
  author =       "William S. Dorn",
  title =        "{Editor}'s Preview \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "3",
  pages =        "135--138",
  month =        sep,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356551.356552",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:13:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wilkes:1969:GIM,
  author =       "M. V. Wilkes",
  title =        "The Growth of Interest in Microprogramming: a
                 Literature Survey",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "3",
  pages =        "139--145",
  month =        sep,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356551.356553",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:13:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rosenfeld:1969:PPC,
  author =       "Azriel Rosenfeld",
  title =        "Picture Processing by Computer",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "3",
  pages =        "147--176",
  month =        sep,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356551.356554",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:13:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dorn:1969:EPd,
  author =       "William S. Dorn",
  title =        "{Editor}'s Postview \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "3",
  pages =        "177--177",
  month =        sep,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356551.356555",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:13:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dorn:1969:EPe,
  author =       "William S. Dorn",
  title =        "{Editor}'s Preview \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "4",
  pages =        "179--182",
  month =        dec,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356556.356557",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:13:33 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kent:1969:ALM,
  author =       "William Kent",
  title =        "Assembler-Language Macroprogramming: a Tutorial
                 Oriented Toward the {IBM 360}",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "4",
  pages =        "183--196",
  month =        dec,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356556.356558",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:13:33 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Christoph:1970:LEA,Kent:1970:LEA}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rosin:1969:CCM,
  author =       "Robert F. Rosin",
  title =        "Contemporary Concepts of Microprogramming and
                 Emulation",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "4",
  pages =        "197--212",
  month =        dec,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356556.356559",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:13:33 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Rosin:1970:ECC}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Aron:1969:ISP,
  author =       "J. D. Aron",
  title =        "Information Systems in Perspective",
  journal =      j-COMP-SURV,
  volume =       "1",
  number =       "4",
  pages =        "213--236",
  month =        dec,
  year =         "1969",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356556.356560",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:13:33 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  annote =       "Introduction to the present and future capabilities of
                 management information systems in the context of file
                 handling, system design, and management use.",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dorn:1970:EPa,
  author =       "William S. Dorn",
  title =        "{Editor}'s Preview \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "1",
  pages =        "1--3",
  month =        mar,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356561.356562",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:13:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dolotta:1970:FST,
  author =       "T. A. Dolotta",
  title =        "Functional Specifications for Typewriter-Like
                 Time-Sharing Terminals",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "1",
  pages =        "5--31",
  month =        mar,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356561.356563",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:13:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Beech:1970:SVP,
  author =       "David Beech",
  title =        "A Structural View of {PL/I}",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "1",
  pages =        "33--64",
  month =        mar,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356561.356564",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:13:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cohen:1970:LSF,
  author =       "Doron J. Cohen and C. C. Gotlieb",
  title =        "A List Structure Form of Grammars for Syntactic
                 Analysis",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "1",
  pages =        "65--82",
  month =        mar,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356561.356565",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:13:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dorn:1970:EPb,
  author =       "William S. Dorn",
  title =        "{Editor}'s Preview \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "2",
  pages =        "83--87",
  month =        jun,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356566.356567",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:14:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sedelow:1970:CHF,
  author =       "Sally Yeates Sedelow",
  title =        "The Computer in the Humanities and Fine Arts",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "2",
  pages =        "89--110",
  month =        jun,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356566.356568",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:14:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hellerman:1970:TAS,
  author =       "H. Hellerman and H. J. {Smith, Jr.}",
  title =        "Throughput Analysis of Some Idealized Input, Output,
                 and Compute Overlap Configurations",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "2",
  pages =        "111--118",
  month =        jun,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356566.356569",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:14:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chapin:1970:FAS,
  author =       "Ned Chapin",
  title =        "Flowcharting With the {ANSI Standard}: a Tutorial",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "2",
  pages =        "119--146",
  month =        jun,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356566.356570",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:14:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dorn:1970:EPc,
  author =       "William S. Dorn",
  title =        "{Editor}'s Preview \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "3",
  pages =        "147--152",
  month =        sep,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356571.356572",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:14:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1970:VM,
  author =       "Peter J. Denning",
  title =        "Virtual Memory",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "3",
  pages =        "153--189",
  month =        sep,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356571.356573",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:14:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{MacDougall:1970:CSS,
  author =       "M. H. MacDougall",
  title =        "Computer System Simulation: an Introduction",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "3",
  pages =        "191--209",
  month =        sep,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356571.356574",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:14:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Smith:1970:DCI,
  author =       "Cecil L. Smith",
  title =        "Digital Control of Industrial Processes",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "3",
  pages =        "211--241",
  month =        sep,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356571.356575",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:14:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dorn:1970:EPd,
  author =       "William S. Dorn",
  title =        "{Editor}'s Postview \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "3",
  pages =        "243--243",
  month =        sep,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356571.356576",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:14:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Christoph:1970:LEA,
  author =       "Albert C. Christoph",
  title =        "Letter to the {Editor}: {``Assembler-Language
                 Macroprogramming: A Tutorial Oriented Toward the IBM
                 360''}",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "3",
  pages =        "243--244",
  month =        sep,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356571.356577",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:14:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Kent:1969:ALM,Kent:1970:LEA}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kent:1970:LEA,
  author =       "William Kent",
  title =        "Letter to the {Editor}: {``Assembler-Language
                 Macroprogramming: A Tutorial Oriented Toward the IBM
                 360''}",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "3",
  pages =        "244--244",
  month =        sep,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356571.356578",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:14:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Kent:1969:ALM,Christoph:1970:LEA}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rosin:1970:ECC,
  author =       "Robert F. Rosin",
  title =        "Erratum: {``Contemporary Concepts of Microprogramming
                 and Emulation''}",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "3",
  pages =        "244--244",
  month =        sep,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356571.356579",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:14:25 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Rosin:1969:CCM}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Knuth:1970:NFC,
  author =       "Donald E. Knuth",
  title =        "{Von Neumann}'s First Computer Program",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "4",
  pages =        "247--260",
  month =        dec,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356580.356581",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:15:01 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Reprinted in \cite{Aspray:1987:PJN}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Smith:1970:SIG,
  author =       "Lyle B. Smith",
  title =        "A Survey of Interactive Graphical Systems for
                 Mathematics",
  journal =      j-COMP-SURV,
  volume =       "2",
  number =       "4",
  pages =        "261--301",
  month =        dec,
  year =         "1970",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356580.356582",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:15:01 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Williams:1971:SDS,
  author =       "Robin Williams",
  title =        "A Survey of Data Structures for Computer Graphics
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "3",
  number =       "1",
  pages =        "1--21",
  month =        mar,
  year =         "1971",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356583.356584",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:15:11 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This is a survey of a data structures and their use in
                 computer graphics systems. First, the reasons for using
                 data structures are given. Then the sequential, random,
                 and list organizations are discussed, and it is shown
                 how they may be used to build complex data structures.
                 Representative samples of languages specifically
                 designed for creating and manipulating data structures
                 are described next. Finally some typical computer
                 graphics systems and their data structures are
                 described. It is also pointed out that much work
                 remains to be done to develop a satisfactory
                 theoretical foundation for designing data structures.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Foster:1971:UTS,
  author =       "Caxton C. Foster",
  title =        "An Unclever Time-Sharing System",
  journal =      j-COMP-SURV,
  volume =       "3",
  number =       "1",
  pages =        "23--48",
  month =        mar,
  year =         "1971",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356583.356585",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:15:11 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This paper describes the internal structure of a
                 time-sharing system in some detail. This system is
                 dedicated to providing remote access, and has a simple
                 file structure. It is intended for use in a university
                 type environment where there are many short jobs that
                 will profit from one- or two-second turnaround. Despite
                 its simplicity, this system can serve as a useful
                 introduction to the problems encountered by the
                 designers of any time-sharing system. Included are a
                 discussion of the command language, the hardware
                 organization toward which the design is oriented, the
                 general internal organization, the command sequences,
                 the CPU scheduler, handling of interrupts, the
                 assignment of core space, execution and control of the
                 user's program, backup storage management, and the
                 handling of errors.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Price:1971:TLT,
  author =       "C. E. Price",
  title =        "Table Lookup Techniques",
  journal =      j-COMP-SURV,
  volume =       "3",
  number =       "2",
  pages =        "49--64",
  month =        jun,
  year =         "1971",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356586.356587",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:15:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Consideration is given to the basic methodology for
                 table searching in computer programming. Only static
                 tables are treated, but references are made to
                 techniques for handling dynamic tables. Methods
                 described are: sequential search, merge search, binary
                 search, estimated entry, and direct entry. The
                 rationale of key transformation is discussed, with some
                 consideration of methods of ``hash addressing.'' A
                 general guide to technique selection is given in
                 conclusion.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "binary search; hashing; search techniques; table
                 lookup techniques",
}

@Article{Coffman:1971:SD,
  author =       "E. G. Coffman and M. J. Elphick and A. Shoshani",
  title =        "System Deadlocks",
  journal =      j-COMP-SURV,
  volume =       "3",
  number =       "2",
  pages =        "67--78",
  month =        jun,
  year =         "1971",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356586.356588",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:15:20 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A problem of increasing importance in the design of
                 large multiprogramming systems is the, so-called,
                 deadlock or deadly-embrace problem. In this article we
                 survey the work that has been done on the treatment of
                 deadlocks from both the theoretical and practical
                 points of view.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lucas:1971:PEM,
  author =       "Henry C. {Lucas, Jr.}",
  title =        "Performance Evaluation and Monitoring",
  journal =      j-COMP-SURV,
  volume =       "3",
  number =       "3",
  pages =        "79--91",
  month =        sep,
  year =         "1971",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356589.356590",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:15:31 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1971.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Three major purposes for evaluating the hardware and
                 software performance of computer systems--selection
                 evaluation, performance projection, and performance
                 monitoring--are described. Eight techniques that have
                 been used or suggested for evaluating performance are
                 discussed. Each of these techniques is rated on its
                 suitability for the three purposes of evaluation.
                 Recommendations are made on the most appropriate
                 technique for each evaluation purpose. These
                 suggestions include the development of a comprehensive
                 set of synthetic programs on an industry-wide basis for
                 selection evaluation purposes. Simulation is
                 recommended as the most suitable technique for
                 performance projection. Finally, a number of hardware
                 and software monitors are available for performance
                 monitoring.",
  acknowledgement = ack-nhfb,
  annote =       "Three major purposes for evaluating the hardware and
                 software performance of computer systems - selection
                 evaluation, performance projection, and performance
                 monitoring - are described. Eight techniques that have
                 been used or suggested for evaluating performance are
                 discussed.",
  country =      "USA",
  date =         "09/01/80",
  descriptors =  "Performance evaluation; simulation; monitoring;
                 performance projection; computer selection; benchmark;
                 test tool",
  enum =         "2009",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  language =     "English",
  references =   "59",
}

@Article{vanDam:1971:LTE,
  author =       "Andries {van Dam} and David E. Rice",
  title =        "On-line Text Editing: a Survey",
  journal =      j-COMP-SURV,
  volume =       "3",
  number =       "3",
  pages =        "93--114",
  month =        sep,
  year =         "1971",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356589.356591",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:15:31 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This paper is a survey of current methods for the
                 on-line creation and editing of computer programs and
                 of ordinary manuscripts text. The characteristics of
                 on-line editing systems are examined and examples of
                 various implementations are described in three
                 categories: program editors, text editors, and
                 terminals with local editing facilities.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ledgard:1971:TML,
  author =       "Henry F. Ledgard",
  title =        "Ten Mini-Languages: a Study of Topical Issues in
                 Programming Languages",
  journal =      j-COMP-SURV,
  volume =       "3",
  number =       "3",
  pages =        "115--146",
  month =        sep,
  year =         "1971",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356589.356592",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:15:31 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The proliferation of programming languages has raised
                 many issues of language design, definition, and
                 implementation. This paper presents a series of ten
                 mini-languages, each of which exposes salient features
                 found in existing programming languages. The value of
                 the mini-languages lies in their brevity of description
                 and the isolation of important linguistic features: in
                 particular, the notions of assignment, transfer of
                 control, functions, parameter passing, type checking,
                 data structures, string manipulation, and input/output.
                 The mini-languages may serve a variety of uses:
                 notably, as a pedagogical tool for teaching programming
                 languages, as a subject of study for the design of
                 programming languages, and as a set of test cases for
                 methods of language implementation or formal
                 definition.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Martin:1971:S,
  author =       "W. A. Martin",
  title =        "Sorting",
  journal =      j-COMP-SURV,
  volume =       "3",
  number =       "4",
  pages =        "147--174",
  month =        dec,
  year =         "1971",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356593.356594",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:15:51 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The bibliography appearing at the end of this article
                 lists 37 sorting algorithms and 100 books and papers on
                 sorting published in the last 20 years. The basic ideas
                 presented here have been abstracted from this body of
                 work, and the best algorithms known are given as
                 examples. As the algorithms are explained, references
                 to related algorithms and mathematical or experimental
                 analyses are given. Suggestions are then made for
                 choosing the algorithm best suited to a given
                 situation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1971:TGC,
  author =       "Peter J. Denning",
  title =        "Third Generation Computer Systems",
  journal =      j-COMP-SURV,
  volume =       "3",
  number =       "4",
  pages =        "175--216",
  month =        dec,
  year =         "1971",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356593.356595",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:15:51 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The common features of third generation operating
                 systems are surveyed from a general view, with emphasis
                 on the common abstractions that constitute at least the
                 basis for a ``theory'' of operating systems. Properties
                 of specific systems are not discussed except where
                 examples are useful. The technical aspects of issues
                 and concepts are stressed, the nontechnical aspects
                 mentioned only briefly. A perfunctory knowledge of
                 third generation systems is presumed.",
  acknowledgement = ack-nhfb,
  annote =       "An operating systems approach to storage management,
                 good illustration of deadlock, extensive
                 bibliography.",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1972:NPD,
  author =       "Peter J. Denning",
  title =        "A Note on Paging Drum Efficiency",
  journal =      j-COMP-SURV,
  volume =       "4",
  number =       "1",
  pages =        "1--3",
  month =        mar,
  year =         "1972",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356596.356597",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:16:09 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  annote =       "Do not assume uniform distribution over sector
                 queues.",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wegner:1972:VDL,
  author =       "Peter Wegner",
  title =        "The {Vienna Definition Language}",
  journal =      j-COMP-SURV,
  volume =       "4",
  number =       "1",
  pages =        "5--63",
  month =        mar,
  year =         "1972",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356596.356598",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:16:09 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Schucany:1972:SSP,
  author =       "W. R. Schucany and Paul D. Minton and B. Stanley
                 {Shannon, Jr.}",
  title =        "A Survey of Statistical Packages",
  journal =      j-COMP-SURV,
  volume =       "4",
  number =       "2",
  pages =        "65--79",
  month =        jun,
  year =         "1972",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356599.356600",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:16:19 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article presents a survey of the existing
                 packages of computer programs that are being used for
                 the statistical analysis of data. The basic
                 capabilities of a general-purpose package are listed
                 and discussed briefly. The various types of statistical
                 packages are classified into five general categories,
                 and a description of each category is given. Brief
                 abstracts and summary descriptions of 37 packages are
                 presented, as well as a list of 18 additional packages
                 and 17 related references. 17 refs.",
  acknowledgement = ack-nhfb,
  classification = "723; 922",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data processing; statistical methods; statistical
                 package",
}

@Article{Nievergelt:1972:WMC,
  author =       "J. Nievergelt and J. C. Farrar",
  title =        "What Machines Can and Cannot Do",
  journal =      j-COMP-SURV,
  volume =       "4",
  number =       "2",
  pages =        "81--96",
  month =        jun,
  year =         "1972",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356599.356601",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:16:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Elspas:1972:ATP,
  author =       "Bernard Elspas and Karl N. Levitt and Richard J.
                 Waldinger and Abraham Waksman",
  title =        "An Assessment of Techniques for Proving Program
                 Correctness",
  journal =      j-COMP-SURV,
  volume =       "4",
  number =       "2",
  pages =        "97--147",
  month =        jun,
  year =         "1972",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356599.356602",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:16:19 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The purpose of this paper is to point out the
                 significant quantity of work in progress on techniques
                 that will enable programmers to prove their programs
                 correct. This work has included: investigations in the
                 theory of program schemas or abstract programs;
                 development of the art of the informal or manual proof
                 of correctness; and development of mechanical or
                 semi-mechanical approaches to proving correctness. At
                 present, these mechanical approaches rely upon the
                 availability of powerful theorem-provers, development
                 of which is being actively pursued. All of these
                 technical areas are here surveyed in detail, and
                 recommendations are made concerning the direction of
                 future research toward producing a semi-mechanical
                 program verifier.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computers; program schema; theorem-proving",
  xxnote =       "There is a page 147 in each of numbers 2 and 3 of
                 volume 4.",
}

@Article{Weiss:1972:A,
  author =       "Eric A. Weiss",
  title =        "An Appreciation",
  journal =      j-COMP-SURV,
  volume =       "4",
  number =       "3",
  pages =        "147--147",
  month =        sep,
  year =         "1972",
  CODEN =        "CMSVAN",
  ISSN =         "0010-4892",
  bibdate =      "Fri Sep 30 00:31:17 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  xxnote =       "There is a page 147 in each of numbers 2 and 3 of
                 volume 4.",
}

@Article{Presser:1972:LL,
  author =       "Leon Presser and John R. White",
  title =        "Linkers and Loaders",
  journal =      j-COMP-SURV,
  volume =       "4",
  number =       "3",
  pages =        "149--167",
  month =        sep,
  year =         "1972",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356603.356605",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:16:35 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This is a paper on the linking and loading stages of
                 the language transformation process. First, loaders are
                 classified and discussed. Next, the linking process is
                 treated in terms of the various times at which it may
                 occur (i.e., binding to logical space). Finally, the
                 linking and loading functions are explained in detail
                 through a careful examination of their implementation
                 in the IBM System\slash 360. Examples are presented,
                 and a number of possible system trade-offs are pointed
                 out.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "binary loaders; computer operating systems; linking
                 loaders; relocating loaders",
}

@Article{Hoare:1972:I,
  author =       "C. A. R. Hoare and D. C. S. Allison",
  title =        "Incomputability",
  journal =      j-COMP-SURV,
  volume =       "4",
  number =       "3",
  pages =        "169--178",
  month =        sep,
  year =         "1972",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356603.356606",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:16:35 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Russell's logical paradox, formulated in terms of
                 English adjectives, is considered as a convenient
                 starting point for this discussion of incomputability.
                 It is shown to be impossible, under a wide variety of
                 circumstances, to program a function which will
                 determine whether another function written in the same
                 programming language will terminate. The theory of
                 types is introduced in an attempt to evade the paradox.
                 Finally, it is shown that any language containing
                 conditionals and recursive function definitions, which
                 is powerful enough to program its own interpreter,
                 cannot be used to program its own terminates
                 function.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer metatheory --- Formal Logic; computer
                 programming languages; incomputability; logical
                 paradox; recursion",
}

@Article{Holt:1972:SDP,
  author =       "Richard C. Holt",
  title =        "Some Deadlock Properties of Computer Systems",
  journal =      j-COMP-SURV,
  volume =       "4",
  number =       "3",
  pages =        "179--196",
  month =        sep,
  year =         "1972",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356603.356607",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:16:35 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Several examples of deadlock occurring in present day
                 computer systems are given. Next, there is a discussion
                 of the strategies which can be used to deal with the
                 deadlock problem. A theory of computer systems is
                 developed so that the terms ``process'' and
                 ``deadlock'' can be defined. ``Reusable resources'' are
                 introduced to model objects that are shared among
                 processes, and ``consumable resources'' are introduced
                 to model signals or messages passed among processes.
                 Then a simple graph model of computer systems is
                 developed, and its deadlock properties are
                 investigated. This graph model unifies a number of
                 previous results, leads to efficient deadlock detection
                 and prevention algorithms, and is useful for teaching
                 purposes.",
  acknowledgement = ack-nhfb,
  annote =       "Abstract of thesis, survey and solutions.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer operating systems",
}

@Article{Stutzman:1972:DCC,
  author =       "Byron W. Stutzman",
  title =        "Data Communication Control Procedures",
  journal =      j-COMP-SURV,
  volume =       "4",
  number =       "4",
  pages =        "197--220",
  month =        dec,
  year =         "1972",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356608.356609",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:16:47 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This paper is a tutorial on the methods used to
                 control the transmission of digital information on data
                 communication links. Simple models of data
                 communication systems are introduced and terminology
                 for describing their functions and operation is
                 established. Various graphical methods of representing
                 communication control procedures are discussed and used
                 to describe significant features of communication
                 control procedures in detail.",
  acknowledgement = ack-nhfb,
  classification = "718; 722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computers; data processing --- Data Handling; data
                 transmission",
}

@Article{Barnes:1972:PVA,
  author =       "Bruce H. Barnes",
  title =        "A Programmer's View of Automata",
  journal =      j-COMP-SURV,
  volume =       "4",
  number =       "4",
  pages =        "221--239",
  month =        dec,
  year =         "1972",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356608.356610",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:16:47 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The purpose of this discussion is to introduce the
                 Computer Scientist to the concepts, definitions,
                 notation and ideas of finite automata theory and to
                 suggest how these ideas might relate to some of the
                 other fields of Computer Science. Since understanding
                 of the basic concepts is the purpose of this
                 discussion, emphasis will be placed on definitions and
                 examples than on theorems and proofs.",
  acknowledgement = ack-nhfb,
  classification = "721",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "automata theory; deterministic automation",
}

@Article{Willoughby:1972:SMF,
  author =       "Theodore C. Willoughby",
  title =        "Staffing the {MIS} Function",
  journal =      j-COMP-SURV,
  volume =       "4",
  number =       "4",
  pages =        "241--259",
  month =        dec,
  year =         "1972",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356608.356611",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:16:47 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This tutorial describes MIS (Business Data Processing)
                 staffing problems. Aspects included are job
                 descriptions, recruitment, selection and turnover. The
                 job descriptions described are traditional, trait
                 analysis and task analysis. The recruiting section
                 includes both inside and outside sources. Selection is
                 discussed in terms of satisfactoriness and
                 satisfaction. The more popular tests are described.",
  acknowledgement = ack-nhfb,
  annote =       "Discussion of the value of human assets.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data processing, business; managerial information
                 system (MIS)",
}

@Article{Organick:1973:EP,
  author =       "Elliott I. Organick",
  title =        "Editorial Policy \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "5",
  number =       "1",
  pages =        "1--3",
  month =        mar,
  year =         "1973",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356612.356613",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:16:58 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Horning:1973:PS,
  author =       "J. J. Horning and B. Randell",
  title =        "Process Structuring",
  journal =      j-COMP-SURV,
  volume =       "5",
  number =       "1",
  pages =        "5--30",
  month =        mar,
  year =         "1973",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356612.356614",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:16:58 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Baer:1973:SST,
  author =       "J. L. Baer",
  title =        "A Survey of Some Theoretical Aspects of
                 Multiprocessing",
  journal =      j-COMP-SURV,
  volume =       "5",
  number =       "1",
  pages =        "31--80",
  month =        mar,
  year =         "1973",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356612.356615",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:16:58 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rosenfeld:1973:PPP,
  author =       "Azriel Rosenfeld",
  title =        "Progress in Picture Processing: 1969--71",
  journal =      j-COMP-SURV,
  volume =       "5",
  number =       "2",
  pages =        "81--108",
  month =        jun,
  year =         "1973",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356616.356617",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:17:11 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pooch:1973:SIT,
  author =       "Udo W. Pooch and Al Nieder",
  title =        "A Survey of Indexing Techniques for Sparse Matrices",
  journal =      j-COMP-SURV,
  volume =       "5",
  number =       "2",
  pages =        "109--133",
  month =        jun,
  year =         "1973",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356616.356618",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:17:11 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{White:1973:SRC,
  author =       "William W. White",
  title =        "A Status Report on Computing Algorithms for
                 Mathematical Programming",
  journal =      j-COMP-SURV,
  volume =       "5",
  number =       "3",
  pages =        "135--166",
  month =        sep,
  year =         "1973",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356619.356620",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:17:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Couger:1973:EBS,
  author =       "J. Daniel Couger",
  title =        "Evolution of Business System Analysis Techniques",
  journal =      j-COMP-SURV,
  volume =       "5",
  number =       "3",
  pages =        "167--198",
  month =        sep,
  year =         "1973",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356619.356621",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:17:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Timmreck:1973:CSM,
  author =       "E. M. Timmreck",
  title =        "Computer Selection Methodology",
  journal =      j-COMP-SURV,
  volume =       "5",
  number =       "4",
  pages =        "200--222",
  month =        dec,
  year =         "1973",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356622.356623",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:17:30 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{BrinchHansen:1973:CPC,
  author =       "Per {Brinch Hansen}",
  title =        "Concurrent Programming Concepts",
  journal =      j-COMP-SURV,
  volume =       "5",
  number =       "4",
  pages =        "223--245",
  month =        dec,
  year =         "1973",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356622.356624",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:17:30 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sutherland:1974:CTH,
  author =       "Ivan E. Sutherland and Robert F. Sproull and Robert A.
                 Schumacker",
  title =        "A Characterization of Ten Hidden-Surface Algorithms",
  journal =      j-COMP-SURV,
  volume =       "6",
  number =       "1",
  pages =        "1--55",
  month =        mar,
  year =         "1974",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356625.356626",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:17:39 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.75.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  annote =       "A classic paper; describes all the major hidden
                 surface algorithms of the time, and gives a
                 classification scheme.",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "parallel processing; survey; visible surfaces",
}

@Article{Freeman:1974:CPL,
  author =       "Herbert Freeman",
  title =        "Computer Processing of Line-Drawing Images",
  journal =      j-COMP-SURV,
  volume =       "6",
  number =       "1",
  pages =        "57--97",
  month =        mar,
  year =         "1974",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356625.356627",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:17:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Aho:1974:LP,
  author =       "A. V. Aho and S. C. Johnson",
  title =        "{LR} Parsing",
  journal =      j-COMP-SURV,
  volume =       "6",
  number =       "2",
  pages =        "99--124",
  month =        jun,
  year =         "1974",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356628.356629",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:17:55 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  abstract =     "The LR syntax analysis method is a useful and
                 versatile technique for parsing deterministic
                 context-free languages in compiling applications. This
                 paper provides an informal exposition of LR parsing
                 techniques emphasizing the mechanical generation of
                 efficient LR parsers for context-free grammars.
                 Particular attention is given to extending the parser
                 generation techniques to apply to ambiguous grammars.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "ambiguous grammars; compilers; context-free languages;
                 grammars; LR grammars; parsers",
}

@Article{Pooch:1974:TDT,
  author =       "Udo W. Pooch",
  title =        "Translation of Decision Tables",
  journal =      j-COMP-SURV,
  volume =       "6",
  number =       "2",
  pages =        "125--151",
  month =        jun,
  year =         "1974",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356628.356630",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:17:55 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Pooch:1974:CTD}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bobrow:1974:NPL,
  author =       "Daniel G. Bobrow and Bertram Raphael",
  title =        "New Programming Languages for Artificial Intelligence
                 Research",
  journal =      j-COMP-SURV,
  volume =       "6",
  number =       "3",
  pages =        "153--174",
  month =        sep,
  year =         "1974",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356631.356632",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:18:09 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Severance:1974:ISM,
  author =       "Dennis G. Severance",
  title =        "Identifier Search Mechanisms: a Survey and Generalized
                 Model",
  journal =      j-COMP-SURV,
  volume =       "6",
  number =       "3",
  pages =        "175--194",
  month =        sep,
  year =         "1974",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356631.356633",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:18:09 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  annote =       "Evaluation model is core memory oriented.",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nievergelt:1974:BST,
  author =       "J. Nievergelt",
  title =        "Binary Search Trees and File Organisation",
  journal =      j-COMP-SURV,
  volume =       "6",
  number =       "3",
  pages =        "195--207",
  month =        sep,
  year =         "1974",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356631.356634",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:18:09 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1974:GEO,
  author =       "Peter J. Denning",
  title =        "{Guest Editor}'s Overview \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "6",
  number =       "4",
  pages =        "209--211",
  month =        dec,
  year =         "1974",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356635.356636",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:18:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Brown:1974:PDS,
  author =       "P. J. Brown",
  title =        "Programming and Documenting Software Projects",
  journal =      j-COMP-SURV,
  volume =       "6",
  number =       "4",
  pages =        "213--220",
  month =        dec,
  year =         "1974",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356635.356637",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:18:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Yohe:1974:OPP,
  author =       "J. M. Yohe",
  title =        "An Overview of Programming Practices",
  journal =      j-COMP-SURV,
  volume =       "6",
  number =       "4",
  pages =        "221--245",
  month =        dec,
  year =         "1974",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356635.356638",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:18:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wirth:1974:CWS,
  author =       "Niklaus Wirth",
  title =        "On the Composition of Well-Structured Programs",
  journal =      j-COMP-SURV,
  volume =       "6",
  number =       "4",
  pages =        "247--259",
  month =        dec,
  year =         "1974",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356635.356639",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:18:24 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Recently, the subject of programming methods,
                 generally applicable rules and patterns of development,
                 has received considerable attention. ``Structured
                 programming'' is the formulation of programs as
                 hierarchical, nested structures of statements and
                 objects of computation. The author gives brief examples
                 of structured programs, shows the essence of this
                 approach, discusses its relationship with program
                 verification, and comments on the role of structured
                 languages.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming; programming methods",
}

@Article{Knuth:1974:SPG,
  author =       "Donald E. Knuth",
  title =        "Structured Programming with {\tt go to} Statements",
  journal =      j-COMP-SURV,
  volume =       "6",
  number =       "4",
  pages =        "261--301",
  month =        dec,
  year =         "1974",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356635.356640",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:18:24 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Reprinted with revisions in {\sl Current Trends in
                 Programming Methodology}, Raymond T. Yeh, ed., {\bf 1}
                 (Englewood Cliffs, NJ: Prentice-Hall, 1977), 140--194;
                 {\sl Classics in Software Engineering}, Edward Nash
                 Yourdon, ed.\ (New York: Yourdon Press, 1979),
                 259--321. Reprinted with ``final'' revisions in
                 \cite[pp. 17--89]{Knuth:1992:LP}.",
  abstract =     "This study focuses largely on two issues: (a) improved
                 syntax for iterations and error exits, making it
                 possible to write a larger class of programs clearly
                 and efficiently without ``go to'' statements; (b) a
                 methodology of program design, beginning with readable
                 and correct, but possibly inefficient programs that are
                 systematically transformed in necessary into efficient
                 and correct, but possibly less readable code. The
                 discussion brings out opposing points of view about
                 whether or not ``go to'' statements should be
                 abolished; some merit is found on both sides of this
                 question. Finally, an attempt is made to define the
                 true nature of structured programming, and to recommend
                 fruitful directions for further study.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming; structured programming",
}

@Article{Kernighan:1974:PSE,
  author =       "Brian W. Kernighan and P. J. Plauger",
  title =        "Programming Style: {Examples} and Counterexamples",
  journal =      j-COMP-SURV,
  volume =       "6",
  number =       "4",
  pages =        "303--319",
  month =        dec,
  year =         "1974",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356635.356641",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:18:24 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This paper is a survey of some aspects of programming
                 style, primarily expression and structure, showing by
                 example what happens when principles of style are
                 violated, and what can be done to improve programs. The
                 examples are all taken verbatim from programming
                 textbooks.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming; programming methods,
                 control-flow structures; programming style; structured
                 programming",
}

@Article{Pooch:1974:CTD,
  author =       "Udo W. Pooch",
  title =        "Corrigendum: {``Translation of Decision Tables''}",
  journal =      j-COMP-SURV,
  volume =       "6",
  number =       "4",
  pages =        "321--321",
  month =        dec,
  year =         "1974",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356635.356642",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:18:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Pooch:1974:TDT}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Organick:1975:EO,
  author =       "Elliott I. Organick",
  title =        "{Editor}'s Overview",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "1",
  pages =        "1--1",
  month =        mar,
  year =         "1975",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356643.356644",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:18:53 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Maurer:1975:HTM,
  author =       "W. D. Maurer and T. G. Lewis",
  title =        "Hash Table Methods",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "1",
  pages =        "5--19",
  month =        mar,
  year =         "1975",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356643.356645",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:18:53 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This is a survey of hash table methods, chiefly
                 intended for programmers and students of programming
                 who are encountering the subject for the first time.
                 The better-known methods of calculating hash addresses
                 and of handling collisions and bucket overflow are
                 presented and compared. It is shown that under certain
                 conditions we can guarantee that no two items belonging
                 to a certain class will have the same hash code, thus
                 providing an improvement over the usual notion of a
                 hash code as a randomizing technique. Several
                 alternatives to hashing are discussed, and suggestions
                 are made for further research and further
                 development.",
  acknowledgement = ack-nhfb,
  annote =       "Short review of key-to-address transformation,
                 collision handling, and other access techniques.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming",
}

@Article{Presser:1975:MC,
  author =       "Leon Presser",
  title =        "Multiprogramming Coordination",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "1",
  pages =        "21--44",
  month =        mar,
  year =         "1975",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356643.356646",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:18:53 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Presser:1975:CMC}.",
  abstract =     "This paper commences with an overview of
                 multiprogrammed operating systems that uncovers an
                 architecture consisting of cooperating, but competing
                 processes working in parallel. This is followed by a
                 formal treatment of processes, and an analysis of the
                 fundamental coordination needs of concomitant
                 processes. The analysis leads to a set of two
                 coordination primitives originally defined by E. W.
                 Dijkstra. In the rest of the paper, an evolutionary
                 series of examples of increasing coordination
                 complexity is formulated and solved. As the various
                 examples are discussed, cumulative extensions to the
                 original set of coordination primitives are justified
                 and formally defined.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer systems programming",
}

@Article{Mooers:1975:CSC,
  author =       "Calvin N. Mooers",
  title =        "Computer Software and Copyright",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "1",
  pages =        "45--72",
  month =        mar,
  year =         "1975",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356643.356647",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:18:53 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Boyse:1975:SMC,
  author =       "John W. Boyse and David R. Warn",
  title =        "A Straightforward Model for Computer Performance
                 Prediction",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "2",
  pages =        "73--93",
  month =        jun,
  year =         "1975",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356648.356649",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:06 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Both simulation and analytic models of computer
                 systems can be very useful for predicting the
                 performance of proposed new systems or proposed changes
                 to existing systems. Many potential users of models are
                 reluctant to use them because of the complexity of many
                 such models. This tutorial paper leads the reader
                 through the development and use of an easily understood
                 analytic model. This is then placed in context with a
                 class of similar analytic models. In spite of the
                 simplicity of these models they have proved useful and
                 quite accurate in predicting performance (utilization,
                 throughput, and response) using only the most basic
                 system data as input. These parameters can either be
                 estimates or measurements from a running system. The
                 model equations and assumptions are defined, and a
                 detailed case study is presented as an example of their
                 use.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer systems, digital",
}

@Article{Cotton:1975:MMC,
  author =       "Ira W. Cotton",
  title =        "Microeconomics and the Market for Computer Services",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "2",
  pages =        "95--111",
  month =        jun,
  year =         "1975",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356648.356650",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:06 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Huang:1975:APT,
  author =       "J. C. Huang",
  title =        "An Approach to Program Testing",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "3",
  pages =        "113--128",
  month =        sep,
  year =         "1975",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356651.356652",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kimbleton:1975:CCN,
  author =       "Stephen R. Kimbleton and G. Michael Schneider",
  title =        "Computer Communication Networks: {Approaches},
                 Objectives, and Performance Considerations",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "3",
  pages =        "129--173",
  month =        sep,
  year =         "1975",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356651.356653",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:13 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Effective network utilization requires an
                 understanding of network functional components and
                 their interactions. Describing these issues is the
                 objective of this paper. To do this, the three basic
                 network sharing alternatives are first identified. For
                 those two which involve host\slash host communication,
                 the basic traffic types are discussed. The
                 communications alternatives are then detailed and a
                 hypothesis is advanced that the ``packet-switched''
                 networks provide the most appropriate technology for
                 supporting multimodal traffic between hosts.
                 Consequently, a careful examination of the functional
                 components of the packet switch is provided. This
                 provides a basis for describing factors which must be
                 considered in implementing a packet-switched
                 subnetwork. Additional issues which should be
                 considered when several hosts and, perhaps, the
                 communications subnetwork are under the control of a
                 single administrative organization are then discussed.
                 The paper concludes with a description of three
                 networking examples and an identification of areas for
                 future research.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computers",
  xxnote =       "There is a page 173 in each of numbers 3 and 4 of
                 volume 4.",
}

@Article{Organick:1975:EPU,
  author =       "Elliott I. Organick",
  title =        "Editorial Policy Update",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "4",
  pages =        "173--173",
  month =        dec,
  year =         "1975",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356654.356655",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  xxnote =       "There is a page 173 in each of numbers 3 and 4 of
                 volume 4.",
}

@Article{Patil:1975:GEN,
  author =       "Suhas S. Patil",
  title =        "{Guest Editor}'s Note \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "4",
  pages =        "175--175",
  month =        dec,
  year =         "1975",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356654.356656",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Keller:1975:LAP,
  author =       "Robert M. Keller",
  title =        "Look-Ahead Processors",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "4",
  pages =        "177--195",
  month =        dec,
  year =         "1975",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356654.356657",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:22 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Methods of achieving look-ahead in processing units
                 are discussed. An optimality criterion is proposed, and
                 several schemes are compared against the optimum under
                 varying assumptions. These schemes include existing and
                 proposed machine organizations, and theoretical
                 treatments not mentioned before in this context. The
                 problems of eliminating associative searches in the
                 processor control and the handling of loop-forming
                 decisions are also considered. The inherent limitations
                 of such processors are discussed. Finally, a number of
                 enhancements to look-ahead processors is qualitatively
                 surveyed.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer architecture; computer operating systems",
}

@Article{Anderson:1975:CIS,
  author =       "George A. Anderson and E. Douglas Jensen",
  title =        "Computer Interconnection Structures: {Taxonomy},
                 Characteristics, and Examples",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "4",
  pages =        "197--213",
  month =        dec,
  year =         "1975",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356654.356658",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:22 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A taxonomy, or naming scheme, for systems of
                 interconnected computer is presented. It is an attempt
                 to provide an implementation-independent method by
                 which to identify designs, and a common context in
                 which to discuss them. The taxonomy is based on
                 interprocessor message handling and hardware
                 interconnection topology, and distinguishes ten basic
                 multiple-computer architectures. Various relevant
                 attributes are identified and discussed, and examples
                 of actual designs are given for each architecture.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer architecture",
}

@Article{Thurber:1975:APP,
  author =       "Kenneth J. Thurber and Leon D. Wald",
  title =        "Associative and Parallel Processors",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "4",
  pages =        "215--255",
  month =        dec,
  year =         "1975",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356654.356659",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:22 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This tutorial survey of the area of parallel and
                 associative processors covers the main design tradeoffs
                 and major architectures of SIMD (Single Instruction
                 Stream Multiple Data Stream) systems. Summaries of
                 ILLIAC IV, STARAN, OMEN, and PEPE, the major SIMD
                 processors, are included.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer operating systems",
}

@Article{Organick:1975:EN,
  author =       "Elliott I. Organick",
  title =        "{Editor}'s Note",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "4",
  pages =        "257--257",
  month =        dec,
  year =         "1975",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356654.356660",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Presser:1975:CMC,
  author =       "Leon Presser",
  title =        "Corrigendum: {``Multiprogramming Coordination''}",
  journal =      j-COMP-SURV,
  volume =       "7",
  number =       "4",
  pages =        "257--257",
  month =        dec,
  year =         "1975",
  CODEN =        "CMSVAN",
  ISSN =         "0010-4892",
  bibdate =      "Thu Dec 28 16:51:57 1995",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Presser:1975:MC}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sibley:1976:GEI,
  author =       "E. H. Sibley",
  title =        "{Guest Editor}'s Introduction: {The} Development of
                 Data-Base Technology",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "1",
  pages =        "1--5",
  month =        mar,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356662.356663",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:43 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fry:1976:EDB,
  author =       "James P. Fry and Edgar H. Sibley",
  title =        "Evolution of Data-Base Management Systems",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "1",
  pages =        "7--42",
  month =        mar,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356662.356664",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:43 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The history and definitions common to data-base
                 technology are outlined. The objectives of data-base
                 management systems are given, important concepts
                 discussed, terminology defined and the development of
                 data-base systems methodology traced. An example is
                 presented along with trends and issues.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data base management; data processing",
}

@Article{Chamberlin:1976:RDB,
  author =       "Donald D. Chamberlin",
  title =        "Relational Data-Base Management Systems",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "1",
  pages =        "43--66",
  month =        mar,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356662.356665",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:43 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Reprinted in A. R. Hurson, L. L. Miller, and S. H.
                 Pakzad, Parallel Architectures for Database Systems,
                 IEEE Computer Society Press, Washington, DC, 1989.",
  abstract =     "The essential concepts of the relational data model
                 are defined, and normalization, relational languages
                 based on the model, as well as advantages and
                 implementations of relational systems are discussed.",
  acknowledgement = ack-nhfb,
  annote =       "Introductory paper.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data base management; data processing",
}

@Article{Taylor:1976:CDB,
  author =       "Robert W. Taylor and Randall L. Frank",
  title =        "{CODASYL} Data-Base Management Systems",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "1",
  pages =        "67--103",
  month =        mar,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356662.356666",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:43 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Presentation of the concepts, notation, and data-base
                 languages that were defined by the CODASYL Data
                 Description Language and Programming Language
                 Committees. Data structure diagram notation is
                 explained, and sample data-base definition is developed
                 along with several sample programs. Advanced features
                 of the languages are discussed, together with examples
                 of their use. An extensive bibliography is included.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data base management; data processing",
}

@Article{Tsichritzis:1976:HDB,
  author =       "D. C. Tsichritzis and F. H. Lochovsky",
  title =        "Hierarchical Data-Base Management: a Survey",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "1",
  pages =        "105--123",
  month =        mar,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356662.356667",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:43 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This survey discusses the facilities provided by
                 hierarchical data-base management systems. The systems
                 are based on the hierarchical data model which is
                 defined as a special case of the network data model.
                 Different methods used to access hierarchically
                 organized data are outlined. Constructs and examples of
                 programming languages are presented to illustrate the
                 features of hierarchical systems. This is followed by a
                 discussion of techniques for implementing such systems.
                 Finally, a brief comparison is made between the
                 hierarchical, the network, and the relational
                 systems.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data base management; data processing",
}

@Article{Michaels:1976:CRC,
  author =       "Ann S. Michaels and Benjamin Mittman and C. Robert
                 Carlson",
  title =        "A Comparison of the Relational and {CODASYL}
                 Approaches to Data-Base Management",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "1",
  pages =        "125--151",
  month =        mar,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356662.356668",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:19:43 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Data definition, manipulation, protection, and
                 independence, and system performance are important
                 factors when studying and evaluating data-base
                 management systems to be used in shared data-base
                 environments. The relational and CODASYL Data Base Task
                 Group approaches, which have been widely discussed and
                 debated, are compared and contrasted from these points
                 of view. It is concluded that since data-base
                 management systems are to serve the needs of widely
                 diverse communities of users, no single approach to
                 data-base management seems either desirable or likely
                 to emerge as dominant in the near future.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data base management; data processing",
}

@Article{Organick:1976:EO,
  author =       "Elliott I. Organick",
  title =        "Editorial Overview",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "2",
  pages =        "153--153",
  month =        jun,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356669.356670",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:05 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tanenbaum:1976:TA,
  author =       "Andrew S. Tanenbaum",
  title =        "A Tutorial on {Algol 68}",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "2",
  pages =        "155--190",
  month =        jun,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356669.356671",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:05 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Tanenbaum:1977:CTA}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Marcotty:1976:SFD,
  author =       "Michael Marcotty and Henry F. Ledgard and Gregor V.
                 Bochmann",
  title =        "A Sampler of Formal Definitions",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "2",
  pages =        "191--276",
  month =        jun,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356669.356672",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:05 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Donahue:1977:SFC,Marcotty:1977:SFC,Marcotty:1977:CSF}.",
  abstract =     "Four well-known formal definition techniques are
                 presented: W-grammars, Production Systems with an
                 axiomatic approach to semantics, the Vienna Definition
                 Language, and Attribute Grammars. Each technique is
                 described tutorially and examples are given; then each
                 technique is applied to define the same small
                 programming language. These definitions provide a
                 usable basis for a critical discussion of the relative
                 clarity of the different methods. This leads to a
                 review of some of the debatable issues of formal
                 definition. Among these issues are the advantages, if
                 any, to the use of an underlying machine model, the
                 precise nature of a valid program, the relative merits
                 of generative and analytic definitions, and the place
                 of implementation-defined features in the definition.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming languages",
}

@Article{Reddi:1976:CFC,
  author =       "S. S. Reddi and E. A. Feustel",
  title =        "A Conceptual Framework for Computer Architecture",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "2",
  pages =        "277--300",
  month =        jun,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356669.356673",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:05 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Yeh:1976:GEa,
  author =       "Raymond T. Yeh",
  title =        "Guest Editorial \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "3",
  pages =        "301--303",
  month =        sep,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356674.356675",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Special Issue on Reliable Software: Part I: Software
                 Validation",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fosdick:1976:DFA,
  author =       "Lloyd D. Fosdick and Leon J. Osterweil",
  title =        "Data Flow Analysis in Software Reliability",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "3",
  pages =        "305--330",
  month =        sep,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356674.356676",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:22 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The ways that the methods of data flow analysis can be
                 applied to improve software reliability are described.
                 There is also a review of the basic terminology from
                 graph theory and from data flow analysis in global
                 program optimization. The notation of regular
                 expressions is used to describe actions on data for
                 sets of paths. These expressions provide the basis of a
                 classification scheme for data flow which represents
                 patterns of data flow along paths within subprograms
                 and along paths which cross subprogram boundaries. Fast
                 algorithms, originally introduced for global
                 optimization, are described and it is shown how they
                 can be used to implement the classification scheme. It
                 is then shown how these same algorithms can also be
                 used to detect the presence of data flow anomalies
                 which are symptomatic of programming errors. Finally,
                 some characteristics of and experience with DAVE, a
                 data flow analysis system embodying some of these
                 ideas, are described.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming; computer software reliability;
                 data flow analysis",
}

@Article{Hantler:1976:IPC,
  author =       "Sidney L. Hantler and James C. King",
  title =        "An Introduction to Proving the Correctness of
                 Programs",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "3",
  pages =        "331--353",
  month =        sep,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356674.356677",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Yeh:1976:GEb,
  author =       "Raymond T. Yeh",
  title =        "Guest Editorial \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "4",
  pages =        "355--357",
  month =        dec,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356678.356679",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:35 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Special Issue on Reliable Software: Part II:
                 Fault-Tolerant Software",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1976:FTO,
  author =       "Peter J. Denning",
  title =        "Fault Tolerant Operating Systems",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "4",
  pages =        "359--389",
  month =        dec,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356678.356680",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:35 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Levin:1977:SFA,Iliffe:1977:SFE,Dennis:1977:SFE,Denning:1977:SFE}.",
  abstract =     "Four related architectural principles are developed
                 which can guide the construction of error-tolerant
                 operating systems. The fundamental principle, system
                 closure, specifies that no action is permissible unless
                 explicitly authorized. The capability based machine is
                 the most efficient known embodiment of this principle.
                 System closure implies a second principle, resource
                 control, that prevents processes from exchanging
                 information via residual values left in physical
                 resource units. These two principles enable a third,
                 decision verification by failure-independent processes.
                 These principles enable prompt error detection and
                 cost-effective recovery. Implementations of these
                 principles are given for process management, interrupts
                 and traps, store access through capabilities, protected
                 procedure entry, and tagged architecture.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer operating systems; computer systems, digital
                 --- Fault Tolerant Capability",
}

@Article{Hecht:1976:FTS,
  author =       "H. Hecht",
  title =        "Fault-Tolerant Software for Real-Time Applications",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "4",
  pages =        "391--407",
  month =        dec,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356678.356681",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:35 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Redundancy in fault-tolerant software requires
                 programs that are deliberately different from the
                 original ones which they are intended to back up. Error
                 detection and rollback provisions must be as
                 independent as possible of the software segments which
                 they protect. The recovery block concept pioneered by
                 B. Randell meets these requirements. Skeleton routines
                 are presented that illustrate the application of the
                 recovery block to real-time programs, particularly
                 those dealing with navigation and attitude control. The
                 concept is seen to be compatible with certain ad hoc
                 fault-tolerance techniques that are currently employed.
                 A technique for reliability analysis of the resulting
                 software system is developed.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming; computer systems, digital ---
                 Fault Tolerant Capability",
}

@Article{Linden:1976:OSS,
  author =       "Theodore A. Linden",
  title =        "Operating System Structures to Support Security and
                 Reliable Software",
  journal =      j-COMP-SURV,
  volume =       "8",
  number =       "4",
  pages =        "409--445",
  month =        dec,
  year =         "1976",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356678.356682",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:35 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Iliffe:1977:SFE,Dennis:1977:SFE,Denning:1977:SFE}.",
  abstract =     "This survey focuses on two system structuring concepts
                 that support security: small protection domains and
                 extended-type objects. These two concepts are
                 especially promising because they also support reliable
                 software by encouraging and enforcing highly modular
                 software structures. Small protection domains allow
                 each subunit or module of a program to be executed in a
                 restricted environment that can prevent unanticipated
                 or undesirable actions by that module. Extended-type
                 objects provide a vehicle for data abstraction by
                 allowing objects of new types to be manipulated in
                 terms of operations that are natural for these objects.
                 This provides a way to extend system protection
                 features so that protection can be enforced in terms of
                 applications-oriented operations on objects. This
                 survey also explains one approach toward implementing
                 these concepts thoroughly and efficiently based on the
                 concept of capabilities incorporated into the
                 addressing structure of the computer.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer operating systems; data processing ---
                 Security of Data",
}

@Article{Feng:1977:GEO,
  author =       "Tse-Yun Feng",
  title =        "Guest Editorial: an Overview of Parallel Processors
                 and Processing",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356683.356684",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:54 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Yau:1977:APA,
  author =       "S. S. Yau and H. S. Fung",
  title =        "Associative Processor Architecture --- a Survey",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "1",
  pages =        "3--27",
  month =        mar,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356683.356685",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:54 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A survey of the architecture of various associative
                 processors is presented with emphasis on their
                 characteristics, categorization, and implementation,
                 and especially on recent developments. Based on their
                 architecture, associative processors are classified
                 into four categories, namely fully parallel,
                 bit-serial, word-serial and block-oriented. The fully
                 parallel associative processors are divided into two
                 classes, word-organized and distributed logic
                 associative processors.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer architecture; computer operating systems",
}

@Article{Kuck:1977:SPM,
  author =       "David J. Kuck",
  title =        "A Survey of Parallel Machine Organization and
                 Programming",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "1",
  pages =        "29--59",
  month =        mar,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356683.356686",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:54 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Parallelism is defined in a broad sense, on the bit
                 level, operation level, and algorithm level. A number
                 of abstract and practical questions are discussed.
                 First, fast techniques for evaluating arithmetic
                 expressions and linear recurrences are treated. Next,
                 whole programs are discussed, and some experimental
                 results are presented. Finally, various aspects of
                 machine organization are discussed, including
                 processors, memories, and alignment networks.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer systems programming; computer systems,
                 digital",
}

@Article{Ramamoorthy:1977:PA,
  author =       "C. V. Ramamoorthy and H. F. Li",
  title =        "Pipeline Architecture",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "1",
  pages =        "61--102",
  month =        mar,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356683.356687",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:54 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Ramamoorthy:1978:CPA}.",
  abstract =     "This paper reviews the many theoretical considerations
                 and problems behind pipelining, surveying and comparing
                 various representative pipeline machines that operate
                 in either sequential or vector pipeline mode, the
                 practical solutions adopted, and the tradeoffs
                 involved. The performance of a simple pipe, the
                 physical speed limitation, and the control structures
                 for penalty-incurring events are analyzed separately.
                 The problems faced by the system designers are tackled,
                 including buffering, busing structure branching, and
                 interrupt handling. Aspects of sequential and vector
                 processing are studied. Fundamental advantages of
                 vector processing are unveiled, and additional
                 requirements (costs) are discussed to establish a
                 criterion for the tradeoff between sequential and
                 vector pipeline processing. Finally, two recent
                 machines (the Cray-1 and the Amdahl 470 V/6 systems)
                 are presented to demonstrate how complex pipeline
                 techniques can be used and how simple but advantageous
                 pipeline concepts can be exploited.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer architecture",
}

@Article{Enslow:1977:MOS,
  author =       "Philip H. {Enslow, Jr.}",
  title =        "Multiprocessor Organization --- a Survey",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "1",
  pages =        "103--129",
  month =        mar,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356683.356688",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:20:54 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Multiprocessors are defined as a subclass of MIMD
                 (Multiple Instruction Stream, Multiple Data Stream)
                 multiple-computer systems in which the processors have
                 common access to primary memory and the input\slash
                 output channels and there is a single operating system
                 controlling the entire complex. It is possible to
                 characterize the hardware organization by the nature of
                 the system utilized to interconnect the primary
                 functional units --- processors, memory, and
                 input\slash output channels. The three basic
                 interconnection systems discussed are: (1) time-shared
                 buses; (2) crossbar switch matrix; and (3) multibus,
                 multiport memories. Three organizations for
                 multiprocessor operating systems are also discussed:
                 (1) master-slave; (2) separate executive for each
                 processor; and (3) symmetric treatment of all
                 processors.",
  acknowledgement = ack-nhfb,
  classification = "722",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer systems, digital",
}

@Article{Denning:1977:ATIa,
  author =       "Peter J. Denning",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "2",
  pages =        "131--131",
  month =        jun,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356689.356690",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:21:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1977:EP,
  author =       "Peter J. Denning",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "2",
  pages =        "133--135",
  month =        jun,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356689.356691",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:21:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sedgewick:1977:PGM,
  author =       "Robert Sedgewick",
  title =        "Permutation Generation Methods",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "2",
  pages =        "137--164",
  month =        jun,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356689.356692",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:21:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Sedgewick:1977:CPG,Parsons:1977:SFF,MacCallum:1977:SFF}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Levin:1977:SFA,
  author =       "Roy Levin and Peter J. Denning",
  title =        "Surveyor's Forum: an Amplification on {Hydra}'s
                 Capabilities",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "2",
  pages =        "165--165",
  month =        jun,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356689.356693",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:21:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Denning:1976:FTO}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Donahue:1977:SFC,
  author =       "James Donahue",
  title =        "Surveyor's Forum: a Criticism of Sampler",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "2",
  pages =        "166--167",
  month =        jun,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356689.356695",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:21:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Marcotty:1976:SFD,Marcotty:1977:SFC,Marcotty:1977:CSF}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Marcotty:1977:SFC,
  author =       "Michael Marcotty and Henry F. Ledgard",
  title =        "Surveyor's Forum: a Criticism of Sampler",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "2",
  pages =        "167--168",
  month =        jun,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356689.356696",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:21:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Marcotty:1976:SFD,Donahue:1977:SFC,Marcotty:1977:CSF}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Marcotty:1977:CSF,
  author =       "Michael Marcotty and Henry F. Ledgard and Gregor V.
                 Bochmann",
  title =        "Corrigendum: {``A Sampler of Formal Definitions''}",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "2",
  pages =        "168--168",
  month =        jun,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356689.356697",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:21:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Marcotty:1976:SFD,Donahue:1977:SFC,Marcotty:1977:SFC}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1977:ATIb,
  author =       "Peter J. Denning",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "3",
  pages =        "171--172",
  month =        sep,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356698.356699",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:21:35 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gonzalez:1977:DPS,
  author =       "Mario J. {Gonzalez, Jr.}",
  title =        "Deterministic Processor Scheduling",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "3",
  pages =        "173--204",
  month =        sep,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356698.356700",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:21:35 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The deterministic scheduling of jobs in uniprocessor,
                 multiprocessor, and job-shop environments is surveyed.
                 The survey begins with a brief introduction to the
                 representation of task or job sets, followed by a
                 discussion of classification categories. These
                 categories include number of processors, task
                 interruptibility, job periodicity, deadlines, and
                 number of resources. Results are given for
                 single-processor schedules in job-shop and
                 multiprogramming environments, flow-shop schedules, and
                 multiprocessor schedules. They are stated in terms of
                 optimal constructive algorithms and suboptimal
                 heuristics. In most cases the latter are stated in
                 terms of performance bounds related to optimal results.
                 Annotations for most of the references are provided in
                 the form of a table classifying the referenced studies
                 in terms of various parameters. 54 refs.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer systems programming",
}

@Article{Lipsky:1977:AQN,
  author =       "Lester Lipsky and J. D. Church",
  title =        "Applications of a Queueing Network Model for a
                 Computer System",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "3",
  pages =        "205--221",
  month =        sep,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356698.356701",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:21:35 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Phister:1978:SFP,Lipsky:1978:SFP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Peterson:1977:PN,
  author =       "James L. Peterson",
  title =        "{Petri} Nets",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "3",
  pages =        "223--252",
  month =        sep,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356698.356702",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:21:35 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Genrich:1978:SFN,Peterson:1978:SFN}.",
  abstract =     "The basic concepts and uses of Petri nets are
                 surveyed. The structure of Petri nets, their markings
                 and execution, several examples of Petri net models of
                 computer hardware and software, and research into the
                 analysis of Petri nets are presented, as are the use of
                 the reachability tree and the decidability and
                 complexity of some Petri net problems. Petri net
                 languages, models of computation related to Petri nets,
                 and some extensions and subclasses of the Petri net
                 model are also briefly discussed.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer metatheory",
}

@Article{Iliffe:1977:SFE,
  author =       "J. K. Iliffe",
  title =        "Surveyor's Forum: an Error Recovery",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "3",
  pages =        "253--254",
  month =        sep,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356698.356703",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:21:35 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Denning:1976:FTO,Linden:1976:OSS,Dennis:1977:SFE,Denning:1977:SFE}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dennis:1977:SFE,
  author =       "Jack B. Dennis",
  title =        "Surveyor's Forum: An Error Recovery",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "3",
  pages =        "254--254",
  month =        sep,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356698.356704",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:21:35 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Denning:1976:FTO,Linden:1976:OSS,Iliffe:1977:SFE,Denning:1977:SFE}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1977:SFE,
  author =       "Peter J. Denning",
  title =        "Surveyor's Forum: an Error Recovery",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "3",
  pages =        "254--255",
  month =        sep,
  year =         "1977",
  CODEN =        "CMSVAN",
  ISSN =         "0010-4892",
  bibdate =      "Fri Sep 30 00:28:11 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Denning:1976:FTO,Linden:1976:OSS,Iliffe:1977:SFE,Dennis:1977:SFE}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tanenbaum:1977:CTA,
  author =       "Andrew S. Tanenbaum",
  title =        "Corrigenda: {``A Tutorial on Algol 68''}",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "3",
  pages =        "255--256",
  month =        sep,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356698.356706",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:21:35 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Tanenbaum:1976:TA}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1977:AIL,
  author =       "Peter J. Denning",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "4",
  pages =        "257--257",
  month =        dec,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356707.356708",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:04 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Severance:1977:PAS,
  author =       "D. G. Severance and J. V. Carlis",
  title =        "A Practical Approach to Selecting Record Access
                 Paths",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "4",
  pages =        "259--272",
  month =        dec,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356707.356709",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:04 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The process of selecting an efficient data-base design
                 is considered. It is suggested that all record storage
                 and retrieval structures of practical interest are
                 motivated by the accessing characteristics of secondary
                 storage. This architecture of secondary memory is
                 therefore analyzed in some detail. Three classes of
                 data retrieval problems are identified, and alternative
                 file structures and record search algorithms for these
                 problems are analyzed and compared. Finally, a method
                 for constructing reasonable database organizations is
                 presented: it is shown that through a series of design
                 decisions based upon application priorities, types of
                 retrieval, speed of response, and intensity of update,
                 it is possible to gather general specifications quickly
                 for a simple and efficient database organization.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data base systems",
}

@Article{Taggart:1977:SIR,
  author =       "William M. {Taggart, Jr.} and Marvin O. Tharp",
  title =        "A Survey of Information Requirements Analysis
                 Techniques",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "4",
  pages =        "273--290",
  month =        dec,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356707.356710",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:04 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This survey covers a variety of approaches to the
                 determination of information needs suggested during the
                 past decade. The presentation has two objectives: (1)
                 to review available information analysis methods with a
                 detailed look at several approaches; and (2) to suggest
                 research directions to improve the usefulness of these
                 methods.",
  acknowledgement = ack-nhfb,
  classification = "901; 912",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "information science; management science",
}

@Article{Weide:1977:SAT,
  author =       "Bruce Weide",
  title =        "A Survey of Analysis Techniques for Discrete
                 Algorithms",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "4",
  pages =        "291--313",
  month =        dec,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356707.356711",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:04 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Gaschnig:1978:SFE,Weide:1978:SFE,Bender:1979:SFR,Weide:1979:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sedgewick:1977:CPG,
  author =       "Robert Sedgewick",
  title =        "Corrigenda: {``Permutation Generation Methods''}",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "4",
  pages =        "314--314",
  month =        dec,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356707.356712",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:04 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Sedgewick:1977:PGM,Parsons:1977:SFF,MacCallum:1977:SFF}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Parsons:1977:SFF,
  author =       "Thomas W. Parsons",
  title =        "Surveyor's Forum: a Forgotten Generation of
                 Permutations",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "4",
  pages =        "315--315",
  month =        dec,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356707.356713",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:04 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Sedgewick:1977:PGM,Sedgewick:1977:CPG,MacCallum:1977:SFF}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{MacCallum:1977:SFF,
  author =       "I. R. MacCallum",
  title =        "Surveyor's Forum: a Forgotten Generation of
                 Permutations",
  journal =      j-COMP-SURV,
  volume =       "9",
  number =       "4",
  pages =        "316--317",
  month =        dec,
  year =         "1977",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356707.356714",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:04 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Sedgewick:1977:PGM,Sedgewick:1977:CPG,Parsons:1977:SFF}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1978:ATIa,
  author =       "Peter J. Denning",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356715.356716",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fitzsimmons:1978:RES,
  author =       "Ann Fitzsimmons and Tom Love",
  title =        "A Review and Evaluation of Software Science",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "1",
  pages =        "3--18",
  month =        mar,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356715.356717",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:22 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Moranda:1978:SFS,Baker:1978:SFS,Fitzsimmons:1978:SFS,Fenichel:1979:SFH,Zweben:1979:SFH}.",
  abstract =     "Review of the theory, called ``Software science'' and
                 the evidence supporting it. A brief description of a
                 related theory, called ``software physics'', is
                 included.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming; software science",
}

@Article{King:1978:CBA,
  author =       "John Leslie King and Edward L. Schrems",
  title =        "Cost-Benefit Analysis in Information Systems
                 Development and Operation",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "1",
  pages =        "19--34",
  month =        mar,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356715.356718",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:22 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Introduction and review of elements of cost-benefit
                 analysis as applied to computerized information
                 systems, and discussion of the major problems to be
                 avoided.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data processing; information science --- Information
                 Use",
}

@Article{Sandewall:1978:PIE,
  author =       "Erik Sandewall",
  title =        "Programming in an Interactive Environment: the ``{{\sc
                 Lisp}}'' Experience",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "1",
  pages =        "35--71",
  month =        mar,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356715.356719",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:22 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Stallman:1978:SFS,Sandewall:1978:SFS}.",
  abstract =     "LISP systems have been used for highly interactive
                 programming for more than a decade. During that time,
                 special properties of the LISP language (such as
                 program\slash data equivalence) have enabled a certain
                 style of interactive programming to develop,
                 characterized by powerful interactive support for the
                 programmer, nonstandard program structures, and
                 nonstandard program development methods. A summary is
                 given of the LISP style of interactive programming for
                 readers outside the LISP community, describes those
                 properties of LISP systems that were essential for the
                 development of this style, and discusses some current
                 and not yet resolved issues.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming",
}

@Article{Srodawa:1978:PEM,
  author =       "Ronald J. Srodawa",
  title =        "Positive Experiences with a Multiprocessing System",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "1",
  pages =        "73--82",
  month =        mar,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356715.356720",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Phister:1978:SFP,
  author =       "Montgomery {Phister, Jr.}",
  title =        "Surveyor's Forum: {Putting} Costs Through
                 Effectively",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "1",
  pages =        "83--83",
  month =        mar,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356715.356721",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Lipsky:1977:AQN,Lipsky:1978:SFP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lipsky:1978:SFP,
  author =       "Lester Lipsky and James D. Church",
  title =        "Surveyor's Forum: {Putting} Costs Through Effectively:
                 {Author}'s Reply",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "1",
  pages =        "83--84",
  month =        mar,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356715.356722",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Lipsky:1977:AQN,Phister:1978:SFP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Genrich:1978:SFN,
  author =       "H. J. Genrich and P. S. Thiagarajan",
  title =        "Surveyor's Forum: {Net} Progress",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "1",
  pages =        "84--85",
  month =        mar,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356715.356723",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Peterson:1977:PN,Peterson:1978:SFN}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Peterson:1978:SFN,
  author =       "James Peterson",
  title =        "Surveyor's Forum: {Net} Progress: {Author}'s Reply",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "1",
  pages =        "85--85",
  month =        mar,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356715.356724",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Peterson:1977:PN,Genrich:1978:SFN}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1978:ATIb,
  author =       "Peter J. Denning",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "2",
  pages =        "87--87",
  month =        jun,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356725.356726",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1978:EP,
  author =       "Peter J. Denning",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "2",
  pages =        "89--92",
  month =        jun,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356725.356727",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Davis:1978:SBU,
  author =       "N. C. Davis and S. E. Goodman",
  title =        "The {Soviet Bloc}'s Unified System of Computers",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "2",
  pages =        "93--122",
  month =        jun,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356725.356728",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:52 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "During the past ten years the Soviet Bloc has
                 designed, developed, and put into production a series
                 of upward-compatible third-generation computers known
                 as the Unified System or Ryad. This family is
                 effectively a reverse engineering of the IBM S/360
                 system. Although backward by current Western and
                 Japanese standards, the Unified System is of
                 considerable technological, political, and economic
                 importance. A comprehensive survey and analysis of the
                 Ryad project is presented.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer systems, digital",
}

@Article{Randell:1978:RIC,
  author =       "B. Randell and P. A. Lee and P. C. Treleaven",
  title =        "Reliability Issues in Computing System Design",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "2",
  pages =        "123--165",
  month =        jun,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356725.356729",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:52 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The various problems involved in achieving very high
                 reliability from complex computing systems are
                 surveyed, and the relationship between system
                 structuring techniques and techniques of fault
                 tolerance are discussed. Topics covered include: (1)
                 protective redundancy in hardware and software; (2) the
                 use of atomic actions to structure the activity of a
                 system to limit information flow; (3) error detection
                 techniques; (4) strategies for locating and dealing
                 with faults and for assessing the damage they have
                 caused; and (5) forward and backward error recovery
                 techniques, based on the concepts of recovery line,
                 commitment, exception, and compensation. Three specific
                 systems the JPL-STARt, the Bell Laboratories ESS No. 1A
                 processor, and the PLURIBUS are described in detail and
                 compared.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming --- Reliability; computer
                 systems, digital",
}

@Article{Verhofstad:1978:RTD,
  author =       "Joost S. M. Verhofstad",
  title =        "Recovery Techniques for Database Systems",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "2",
  pages =        "167--195",
  month =        jun,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356725.356730",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:52 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A survey of techniques and tools used in filing
                 systems, database systems, and operating systems for
                 recovery, backing out, restart, the maintenance of
                 consistency, and for the provision of crash resistance
                 is given. A particular view on the use of recovery
                 technique in a database system and a categorization of
                 different kinds of recovery and recovery techniques and
                 basic principles are presented. The purposes for which
                 these recovery techniques can be used are described.
                 Each recovery technique is illustrated by examples of
                 its application in existing systems described in the
                 literature.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data base systems, dblit reliability recovery db",
}

@Article{Zelkowitz:1978:PSE,
  author =       "Marvin V. Zelkowitz",
  title =        "Perspectives in Software Engineering",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "2",
  pages =        "197--216",
  month =        jun,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356725.356731",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Wendel:1979:SFR,Zelkowitz:1979:SFR,Alberts:1979:SFQ,Zelkowitz:1979:SFQ}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Relles:1978:SFD,
  author =       "Nathan Relles",
  title =        "Surveyor's Forum: {Devising} the Rhetoric of
                 Rhetorical Devices",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "2",
  pages =        "217--217",
  month =        jun,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356725.356732",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:22:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Graham:1978:GEO,
  author =       "G. Scott Graham",
  title =        "{Guest Editor}'s Overview\ldots Queuing Network Models
                 of Computer System Performance",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "3",
  pages =        "219--224",
  month =        sep,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356733.356734",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:13 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1978.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  annote =       "Special Issue: Queuing Network Models of Computer
                 System Performance",
  descriptors =  "Queueing Network; Performance Evaluation; computer
                 performance",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1978:OAQ,
  author =       "Peter J. Denning and Jeffrey P. Buzen",
  title =        "The Operational Analysis of Queueing Network Models",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "3",
  pages =        "225--261",
  month =        sep,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356733.356735",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:13 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1978.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Bard:1979:SFS,Buzen:1979:SFS}.",
  abstract =     "Queueing network models have proved to be cost
                 effective tools for analyzing modern computer systems.
                 This tutorial paper presents basic results using the
                 operational approach, a framework which allows the
                 analyst to test whether each assumption is met in a
                 given system. The nature of queueing network models and
                 their applications for calculating and prediction
                 performance quantities are described. The basic
                 performance quantities --- such as utilizations, mean
                 queue lengths, and mean response times --- are defined,
                 and operational relationships among them are derived.
                 Following this, the concept of job flow balance is
                 introduced and used to study asymptotic throughputs and
                 response times. The concepts of state transition
                 balance, one-step behavior, and homogeneity are then
                 used to relate the proportions of time that each system
                 state is occupied to the parameters of job demand and
                 to device characteristics. Efficient methods for
                 computing basic performance quantities are also
                 described. Finally the concept of decomposition is used
                 to simplify analyses by replacing subsystems with
                 equivalent devices.",
  acknowledgement = ack-nhfb,
  annote =       "The early sections describe the nature of queueing
                 network models and their applications for calculating
                 and predicting performance quantities. The basic
                 performance quantities- such as utilizations, mean
                 queue lengths, and mean response times- are defined and
                 operational relationships among them are derived.
                 Following this, the concept of job flow balance is
                 introduced and used to study asymptotic throughputs and
                 response times.",
  classification = "722; 723",
  country =      "USA",
  date =         "10/12/79",
  descriptors =  "Survey; reference; Queueing network; operational
                 analysis",
  enum =         "757",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer systems, digital; queueing networks",
  language =     "English",
  references =   "72",
}

@Article{Rose:1978:MPQ,
  author =       "Clifford A. Rose",
  title =        "A Measurement Procedure for Queueing Network Models of
                 Computer Systems",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "3",
  pages =        "263--280",
  month =        sep,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356733.356736",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:13 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1978.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A procedure is described for obtaining input parameter
                 values and output performance measures for a popular
                 class of queueing network models. The procedure makes
                 use of current measurement monitors as much as
                 possible. The two basic approaches to monitoring
                 computer systems (event trace and sampling) and the
                 three types of monitors (hardware, software, and
                 hybrid) are surveyed. Also surveyed are measurement
                 tools for the analytical modeling of several current
                 families of computer systems. Examples of model
                 validations and performance predictions are discussed
                 in detail to illustrate the measurement procedures and
                 the class of models.",
  acknowledgement = ack-nhfb,
  annote =       "(VBI-000913)",
  classification = "722; 723",
  country =      "USA",
  date =         "01/07/93",
  descriptors =  "Queueing network",
  enum =         "11044",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer systems, digital; queueing network models",
  language =     "English",
  references =   "0",
}

@Article{Chandy:1978:AMA,
  author =       "K. Mani Chandy and Charles H. Sauer",
  title =        "Approximate Methods for Analyzing Queueing Network
                 Models of Computing Systems",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "3",
  pages =        "281--317",
  month =        sep,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356733.356737",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:13 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The two primary issues in choosing a computing system
                 model are credibility of the model and cost of
                 developing and solving the model. It is the contention
                 of this paper that queueing network models with
                 credible assumptions can be solved approximately to
                 provide credible performance estimates at low cost.
                 This contention is supported by examples of approximate
                 solutions of queueing at low cost. This contention is
                 supported by examples of approximate solutions of
                 queueing network models. Two major approaches to
                 approximate solution, aggregation (decomposition) and
                 diffusion, are discussed.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer systems, digital; queueing network models",
}

@Article{Buzen:1978:QNM,
  author =       "Jeffrey P. Buzen",
  title =        "A Queueing Network Model of {MVS}",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "3",
  pages =        "319--331",
  month =        sep,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356733.356738",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:13 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The major resource allocation mechanisms used by the
                 MVS operating system are described, and a queueing
                 network model that represents these mechanisms is
                 presented. The model incorporates a number of
                 refinements that have not been reported previously: the
                 use of shared domains, the explicit representation of
                 separate queues for each domain, and the treatment of
                 domain migration.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer operating systems; queueing network models",
}

@Article{Bard:1978:VPP,
  author =       "Y. Bard",
  title =        "The {VM\slash 370} Performance Predictor",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "3",
  pages =        "333--342",
  month =        sep,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356733.356739",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:13 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1978.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A tool for helping system engineers configure VM\slash
                 370 systems is described. It consists of a data
                 reduction package that produces a workload
                 characterization from VM\slash 370 Monitor data, and an
                 analytic model that accepts the workload
                 characterization as an input, and provides estimated
                 performance measures as outputs. The tool is easy to
                 use and routinely achieves accuracy levels within 5
                 percent for utilizations and 30 percent for response
                 times.",
  acknowledgement = ack-nhfb,
  annote =       "(VBI-000916)",
  classification = "722; 723",
  country =      "USA",
  date =         "01/07/93",
  descriptors =  "PERFORMANCE PREDICTION",
  enum =         "9228",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer systems, digital",
  language =     "English",
  references =   "0",
}

@Article{Wong:1978:QNM,
  author =       "J. W. Wong",
  title =        "Queueing Network Modeling of Computer Communication
                 Networks",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "3",
  pages =        "343--351",
  month =        sep,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356733.356740",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:13 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The application of queueing network models to the
                 performance analysis of message-switched (or
                 packet-switched) communication networks is surveyed.
                 The main topics covered are the analysis of end-to-end
                 delay and the analysis of buffer management schemes. A
                 brief discussion on flow control is also included. A
                 queueing network model is developed for a simple
                 user-resource network. The mean response time of a host
                 computer in this network is illustrated by a numerical
                 example.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer networks; queueing network models",
}

@Article{Muntz:1978:QNC,
  author =       "Richard R. Muntz",
  title =        "Queueing Networks: a Critique of the State of the Art
                 and Directions for the Future",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "3",
  pages =        "353--359",
  month =        sep,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356733.356741",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Buzen:1979:SFP,Muntz:1979:SFP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gaschnig:1978:SFE,
  author =       "John Gaschnig",
  title =        "Surveyor's Forum: {Experimental} Analysis Discretely
                 Done",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "3",
  pages =        "361--361",
  month =        sep,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356733.356742",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Weide:1977:SAT,Weide:1978:SFE,Bender:1979:SFR,Weide:1979:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Weide:1978:SFE,
  author =       "Bruce W. Weide",
  title =        "Surveyor's Forum: {Experimental} Analysis Discretely
                 Done: {Author}'s Reply",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "3",
  pages =        "361--362",
  month =        sep,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356733.356743",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Weide:1977:SAT,Gaschnig:1978:SFE,Bender:1979:SFR,Weide:1979:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1978:ATIc,
  author =       "Peter J. Denning",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "4",
  pages =        "363--364",
  month =        dec,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356744.356745",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Special Issue: Graphics Standards",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Newman:1978:RET,
  author =       "William M. Newman and Andries van Dam",
  title =        "Recent Efforts Towards Graphics Standardization",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "4",
  pages =        "365--380",
  month =        dec,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356744.356746",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "standards",
}

@Article{Michener:1978:FOC,
  author =       "James C. Michener and Andries {van Dam}",
  title =        "Functional Overview of the {Core System} with
                 Glossary",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "4",
  pages =        "381--387",
  month =        dec,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356744.356747",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:43 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The Core System was developed by the ACM\slash
                 SIGGRAPH Graphics Standards Planning Committee to
                 promote application program portability and
                 device-independence. The Core System defines graphics
                 software capabilities that support a wide variety of
                 applications. The functional capabilities of the Core
                 System are summarized. Grouping of functions into
                 levels of implementation is motivated and described. A
                 glossary is given of terms that are used in this
                 article and the companion articles on the Core System
                 in this issue.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer graphics; computer programming, Core;
                 standards",
}

@Article{Bergeron:1978:GPU,
  author =       "R. Daniel Bergeron and Peter R. Bono and James D.
                 Foley",
  title =        "Graphics Programming Using the {Core System}",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "4",
  pages =        "389--443",
  month =        dec,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356744.356748",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:43 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.78.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Ths principal concepts of interactive graphics
                 programming using the Core Graphics System are
                 presented. The Core System is a subroutine package
                 which provides with extensive examples facilities for
                 creating arbitrary views of two-and three-dimensional
                 objects and for supporting interaction between the
                 application program and its user.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming; Core; standards, computer
                 graphics",
}

@Article{Michener:1978:SMI,
  author =       "James C. Michener and James D. Foley",
  title =        "Some Major Issues in the Design of the {Core Graphics
                 System}",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "4",
  pages =        "445--463",
  month =        dec,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356744.356749",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:43 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.78.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Design issues of the Core System, a proposed standard
                 graphics programming system, are presented. Alternative
                 resolutions for each issue are set forth, together with
                 their motivating arguments. In each case, the
                 alternative that was selected is made clear. The issues
                 presented here were chosen because they must be
                 considered in the design of any interactive graphics
                 package and because they help in understanding the
                 design of the Core System.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming; Core; standards, computer
                 graphics",
}

@Article{Carlbom:1978:PGP,
  author =       "Ingrid Carlbom and Joseph Paciorek",
  title =        "Planar Geometric Projections and Viewing
                 Transformations",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "4",
  pages =        "465--502",
  month =        dec,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356744.356750",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:43 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Christiaen:1979:SFP,Carlbom:1979:SFP,Carlbom:1979:CGP}.",
  abstract =     "In computer graphics one is often concerned with
                 representing three-dimensional objects on a
                 two-dimensional display surface. The choice of such a
                 representation depends on several factors, including
                 the purpose for which the representation is intended,
                 the visual effects that are desired, and the shape of
                 the object. This paper describes how two-dimensional
                 views can be obtained using planar geometric
                 projections such as perspective and parallel
                 projections. It discusses how these projections can be
                 generated from a three-dimensional representation of an
                 object in a manner suitable for computer graphics
                 systems. In particular, it shows how these projections
                 can be generated using the viewing transformations of
                 the Core Graphics System. The factors that affect the
                 choice of projection are also discussed, and some
                 guidelines for making such a choice are given.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer graphics",
}

@Article{Moranda:1978:SFS,
  author =       "Paul B. Moranda",
  title =        "Surveyor's Forum: {Is} Software Science Hard?",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "4",
  pages =        "503--504",
  month =        dec,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356744.356751",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Fitzsimmons:1978:RES,Baker:1978:SFS,Fitzsimmons:1978:SFS,Fenichel:1979:SFH,Zweben:1979:SFH}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Baker:1978:SFS,
  author =       "T. P. Baker",
  title =        "Surveyor's Forum: {Is} Software Science Hard?",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "4",
  pages =        "504--504",
  month =        dec,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356744.356752",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Fitzsimmons:1978:RES,Moranda:1978:SFS,Fitzsimmons:1978:SFS,Fenichel:1979:SFH,Zweben:1979:SFH}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fitzsimmons:1978:SFS,
  author =       "Ann Fitzsimmons and Tom Love",
  title =        "Surveyor's Forum: {Is} Software Science Hard?",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "4",
  pages =        "504--505",
  month =        dec,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356744.356753",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Fitzsimmons:1978:RES,Moranda:1978:SFS,Baker:1978:SFS,Fenichel:1979:SFH,Zweben:1979:SFH}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Stallman:1978:SFS,
  author =       "Richard M. Stallman",
  title =        "Surveyor's Forum: {Structured} Editing with a {Lisp}",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "4",
  pages =        "505--507",
  month =        dec,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356744.356754",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Sandewall:1978:PIE,Sandewall:1978:SFS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sandewall:1978:SFS,
  author =       "Erik Sandewall",
  title =        "Surveyor's Forum: {Structured} Editing with a {{\sc
                 Lisp}}",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "4",
  pages =        "507--508",
  month =        dec,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356744.356755",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Sandewall:1978:PIE,Stallman:1978:SFS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ramamoorthy:1978:CPA,
  author =       "C. V. Ramamoorthy and H. F. Li",
  title =        "Corrigenda: {``Pipeline Architecture''}",
  journal =      j-COMP-SURV,
  volume =       "10",
  number =       "4",
  pages =        "508--508",
  month =        dec,
  year =         "1978",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356744.356756",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:23:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Ramamoorthy:1977:PA}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1979:AIL,
  author =       "Peter J. Denning",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "1",
  pages =        "1--1",
  month =        mar,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356757.356758",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bernard:1979:MIC,
  author =       "Dan Bernard",
  title =        "Management Issues in Cooperative Computing",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "1",
  pages =        "3--17",
  month =        mar,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356757.356759",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Badler:1979:DRH,
  author =       "Norman I. Badler and Stephen W. Smoliar",
  title =        "Digital Representations of Human Movement",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "1",
  pages =        "19--38",
  month =        mar,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356757.356760",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:19 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Buck-Lew:1979:SFD}.",
  abstract =     "The general issue of movement representation is
                 approached from two point of view: notation systems
                 designed for recording movement and animation systems
                 designed for the display of movement. The
                 interpretation of one particular notation system,
                 Labanotation, is examined to extract a set of
                 ``primitive movement concepts'' which can be used to
                 animate a realistic human body on a graphics display.
                 The body is represented computationally as a network of
                 special-purpose processors --- one processor situated
                 at each joint of the body --- each with an instruction
                 set designed around the movement concepts derived from
                 Labanotation. Movement is achieved by simulating the
                 behavior of these processors as they interpret their
                 respective programs.",
  acknowledgement = ack-nhfb,
  classification = "461; 723; 901",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer graphics; human engineering; kinesiology;
                 Labanotation, Applications",
}

@Article{Dasgupta:1979:OMS,
  author =       "Subrata Dasgupta",
  title =        "The Organization of Microprogram Stores",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "1",
  pages =        "39--65",
  month =        mar,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356757.356761",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:19 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A central issued in microprogramming is the
                 organization of the control store, the memory from
                 which a microprogram is executed. The structure of this
                 store has a major influence on the economy (in both
                 time and memory space) of the target machine
                 implementation, on the overall complexity of the host
                 machine organization, and on its microprogrammability.
                 Some aspects of control store architectures are
                 surveyed, including the organization of
                 microinstruction words, and the effects of different
                 timing schemes on the complexity of both control store
                 and host machine organizations. Some recent algorithms
                 for optimizing the width and length of control stores
                 are reviewed.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer architecture",
}

@Article{Bender:1979:SFR,
  author =       "Edward A. Bender",
  title =        "Surveyor's Forum: a Recurrent Problem",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "1",
  pages =        "67--68",
  month =        mar,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356757.356762",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Weide:1977:SAT,Weide:1978:SFE,Weide:1979:SFR,Gaschnig:1978:SFE}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Weide:1979:SFR,
  author =       "Bruce W. Weide",
  title =        "Surveyor's Forum: a Recurrent Problem",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "1",
  pages =        "68--68",
  month =        mar,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356757.356763",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Weide:1977:SAT,Weide:1978:SFE,Gaschnig:1978:SFE,Bender:1979:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wendel:1979:SFR,
  author =       "Irving K. Wendel",
  title =        "Surveyor's Forum: {The} Real Costs of Software",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "1",
  pages =        "68--68",
  month =        mar,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356757.356764",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Zelkowitz:1978:PSE,Zelkowitz:1979:SFR,Alberts:1979:SFQ,Zelkowitz:1979:SFQ}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zelkowitz:1979:SFR,
  author =       "Marvin Zelkowitz",
  title =        "Surveyor's Forum: {The} Real Costs of Software",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "1",
  pages =        "69--69",
  month =        mar,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356757.356765",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Zelkowitz:1978:PSE,Wendel:1979:SFR,Alberts:1979:SFQ,Zelkowitz:1979:SFQ}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bard:1979:SFS,
  author =       "Yonathan Bard",
  title =        "Surveyor's Forum: {Stochastic} or Operational?",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "1",
  pages =        "69--70",
  month =        mar,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356757.356766",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Denning:1978:OAQ,Buzen:1979:SFS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Buzen:1979:SFS,
  author =       "Jeffrey P. Buzen and Peter J. Denning",
  title =        "Surveyor's Forum: {Stochastic} or Operational?",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "1",
  pages =        "70--70",
  month =        mar,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356757.356767",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Denning:1978:OAQ,Bard:1979:SFS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Buzen:1979:SFP,
  author =       "Jeffrey P. Buzen",
  title =        "Surveyor's Forum: a Predictable Problem",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "1",
  pages =        "71--72",
  month =        mar,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356757.356768",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Muntz:1978:QNC,Muntz:1979:SFP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Muntz:1979:SFP,
  author =       "Richard R. Muntz",
  title =        "Surveyor's Forum: a Predictable Problem",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "1",
  pages =        "72--72",
  month =        mar,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356757.356769",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Muntz:1978:QNC,Buzen:1979:SFP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1979:AILa,
  author =       "Adele Goldberg",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "2",
  pages =        "73--74",
  month =        jun,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356770.356771",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:49 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1979:EP,
  author =       "Adele Goldberg",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "2",
  pages =        "75--78",
  month =        jun,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356770.356772",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:49 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cohen:1979:NDA,
  author =       "Jacques Cohen",
  title =        "Non-De\-ter\-min\-is\-tic Algorithms",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "2",
  pages =        "79--94",
  month =        jun,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356770.356773",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:49 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Wilson:1980:SFD,Cohen:1980:SFD}.",
  abstract =     "Primitive commands representing the concepts of
                 choice, failure, and success are used to describe
                 non-deterministic algorithms for solving a variety of
                 problems. First, the role of the primitives is
                 explained in a manner appealing to the reader's
                 intuition. Then, a solution to the classical 8-queens
                 problem is presented as a non-deterministic program,
                 and its implementation is described. Two examples
                 follow, showing the usefulness of the primitives in
                 computer-aided problem solving: the first is a simple
                 question-answering program; the other is a parser for a
                 context-sensitive language. Finally, a brief survey of
                 current and related work is presented which includes:
                 additional desirable primitives, implementation,
                 correctness, efficiency, and theoretical
                 implications.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "non-deterministic, computer programming",
}

@Article{Molina:1979:SRD,
  author =       "Francisco Walter Molina",
  title =        "A Survey of Resource Directive Decomposition in
                 Mathematical Programming",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "2",
  pages =        "95--104",
  month =        jun,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356770.356774",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:49 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Resource-directive decomposition methods of
                 mathematical programming problems have attracted
                 considerable attention in recent years. A review of the
                 specialized literature is presented, and the features
                 and drawbacks of the most representative
                 resource-directive methods are analyzed. To give an
                 appropriate chronological and technical perspective,
                 early general methods, such as the ones of
                 Dantzig-Wolfe and Benders, are also included in the
                 survey.",
  acknowledgement = ack-nhfb,
  classification = "921",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "mathematical programming",
}

@Article{McKell:1979:CCR,
  author =       "Lynn J. McKell and James V. Hansen and Lester E.
                 Heitger",
  title =        "Charging for Computing Resources",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "2",
  pages =        "105--120",
  month =        jun,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356770.356775",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:49 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Modern computer configurations are often designed to
                 share a host of resources among many users who may be
                 simultaneously competing for their utilization. A
                 substantive issue in computer management focuses on how
                 to effectively allocate computing resources and
                 subsequently charge for them in this competing
                 environment. The issue is generally made more complex
                 by the dependencies in resource availability stemming
                 from the hardware configuration. This paper surveys
                 significant charging mechanisms which have been
                 proposed. The paper does not discuss specific
                 commercial software available to implement charging
                 approaches, but rather is written as a basic survey for
                 readers with an interest in both computers and
                 management science.",
  acknowledgement = ack-nhfb,
  classification = "723; 912",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computers; management science",
}

@Article{Comer:1979:UBT,
  author =       "Douglas Comer",
  title =        "Ubiquitous {B}-Tree",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "2",
  pages =        "121--137",
  month =        jun,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356770.356776",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:49 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Comer:1979:SFT}.",
  abstract =     "B-trees have become, de facto, a standard for file
                 organization. File indexes of users, dedicated database
                 systems, and general-purpose access methods have all
                 been proposed and implemented using B-trees. This paper
                 reviews B-trees and shows why they have been so
                 successful. It discusses the major variations of the
                 B-tree, especially the B** plus -tree, contrasting the
                 relative merits and costs of each implementation. It
                 illustrates a general purpose access method which uses
                 a B-tree.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "b-trees; data processing",
}

@Article{Nagy:1979:GDP,
  author =       "George Nagy and Sharad Wagle",
  title =        "Geographic Data Processing",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "2",
  pages =        "139--181",
  month =        jun,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356770.356777",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:24:49 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/79.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This survey attempts to provide a unified framework
                 for the constituent elements of geographical data
                 processing systems. External aspects of such systems,
                 as perceived by potential users, are discussed with
                 regard to extent, coordinate system and base map, range
                 of applications, input\slash output mechanisms,
                 computer configuration, command and interaction,
                 documentation, and administration. The internal
                 aspects, which would concern the system designer, are
                 analyzed in terms of the type of spatial variables
                 involved and of their interrelationship with respect to
                 common operations. This point of view is shown to lead
                 to a workable classification of two-dimensional
                 geometric algorithms and data structures. To provide
                 concrete examples, ten representative geographic data
                 processing systems, ranging from automated cartography
                 to interactive decision support, are described. Some
                 comparisons are drawn between geographical data
                 processing systems and their conventional
                 business-oriented counterparts.",
  acknowledgement = ack-nhfb,
  classification = "405; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data processing; geography and programming support;
                 maps and mapping --- Computer Application,
                 Applications",
}

@Article{Goldberg:1979:AILb,
  author =       "Adele Goldberg",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "3",
  pages =        "183--183",
  month =        sep,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356778.356779",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kim:1979:RDS,
  author =       "Won Kim",
  title =        "Relational Database Systems",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "3",
  pages =        "187--211",
  month =        sep,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356778.356780",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Fernandez:1980:SFR,Kim:1980:SFR,Friesen:1980:SFR}.",
  abstract =     "This paper first surveys all the relational database
                 systems which have been reported, highlighting their
                 most noteworthy features and concepts. It then surveys
                 and classifies proposals for implementing each of the
                 requisite functional components of a hypothetical,
                 comprehensive relational database system. It concludes
                 with some general observations about user responses to
                 relational systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "cellular associative processor; concurrency control;
                 distributed database; integrity assertions; integrity
                 control; natural language interface; recovery from
                 crashes; relational algebra; relational calculus;
                 relational database; relational interface optimization;
                 relational model of data; selective access control;
                 snapshots; user views",
}

@Article{Dale:1979:DMS,
  author =       "A. G. Dale",
  title =        "Database Management Systems Development in the
                 {USSR}",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "3",
  pages =        "213--226",
  month =        sep,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356778.356781",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1979:DS,
  author =       "Dorothy E. Denning and Peter J. Denning",
  title =        "Data Security",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "3",
  pages =        "227--249",
  month =        sep,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356778.356782",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mohanty:1979:MMQ,
  author =       "Siba N. Mohanty",
  title =        "Models and Measurements for Quality Assessment of
                 Software",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "3",
  pages =        "251--275",
  month =        sep,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356778.356783",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:12 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1979.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Dunn:1980:SFW,Mohanty:1980:SFW}.",
  acknowledgement = ack-nhfb,
  annote =       "Several software quality assessment methods which span
                 the software life cycle are discussed. The quality of a
                 system design can be estimated by measuring the system
                 entropy function or the system work function. The
                 quality improvement due to reconfiguration can be
                 determined by calculating system entropy loading
                 measures. Software science and Zipf's law are shown to
                 be useful for estimating program length and
                 implementation time.",
  country =      "USA",
  date =         "11/10/79",
  descriptors =  "Software; design; software engineering; reliability;
                 measurement; model; fundamentals in statistics;
                 performance evaluation",
  enum =         "2189",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  language =     "English",
  references =   "65",
}

@Article{Fenichel:1979:SFH,
  author =       "Robert Fenichel",
  title =        "Surveyor's Forum: {Heads I} Win, Tails You Lose",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "3",
  pages =        "277--277",
  month =        sep,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356778.356784",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Fitzsimmons:1978:RES,Moranda:1978:SFS,Baker:1978:SFS,Fitzsimmons:1978:SFS,Zweben:1979:SFH}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zweben:1979:SFH,
  author =       "Stuart H. Zweben",
  title =        "Surveyor's Forum: {Heads I} Win, Tails You Lose",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "3",
  pages =        "277--278",
  month =        sep,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356778.356785",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Fitzsimmons:1978:RES,Moranda:1978:SFS,Baker:1978:SFS,Fitzsimmons:1978:SFS,Fenichel:1979:SFH}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Christiaen:1979:SFP,
  author =       "H. Christiaen",
  title =        "Surveyor's Forum: {Projecting} Problems",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "3",
  pages =        "278--279",
  month =        sep,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356778.356786",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Carlbom:1978:PGP,Carlbom:1979:SFP,Carlbom:1979:CGP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Carlbom:1979:SFP,
  author =       "Ingrid Carlbom",
  title =        "Surveyor's Forum: {Projecting} Problems",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "3",
  pages =        "279--280",
  month =        sep,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356778.356787",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Carlbom:1978:PGP,Christiaen:1979:SFP,Carlbom:1979:CGP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Carlbom:1979:CGP,
  author =       "Ingrid Carlbom and Joseph Paciorek",
  title =        "Corrigenda: {``Geometric Projection and Viewing
                 Transformations''}",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "3",
  pages =        "280--280",
  month =        sep,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356778.356788",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Carlbom:1978:PGP,Christiaen:1979:SFP,Carlbom:1979:SFP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1979:AILc,
  author =       "Adele J. Goldberg",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "281--281",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356790",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Special Issue: Cryptology",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1979:EOS,
  author =       "Peter J. Denning",
  title =        "{Editor}'s Overview --- Special Section on Data
                 Encryption",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "283--283",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356791",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lempel:1979:CT,
  author =       "Abraham Lempel",
  title =        "Cryptology in Transition",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "285--303",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356792",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Simmons:1979:SAE,
  author =       "Gustavus J. Simmons",
  title =        "Symmetric and Asymmetric Encryption",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "305--330",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356793",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Popek:1979:ESC,
  author =       "Gerald J. Popek and Charles S. Kline",
  title =        "Encryption and Secure Computer Networks",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "331--356",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356794",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bright:1979:QRN,
  author =       "Herbert S. Bright and Richard L. Enison",
  title =        "Quasi-Random Number Sequences from a Long-Period {TLP}
                 Generator with Remarks on Application to Cryptography",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "357--370",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356795",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sockut:1979:DRP,
  author =       "Gary H. Sockut and Robert P. Goldberg",
  title =        "Database Reorganization --- Principles and Practice",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "371--395",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356796",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Also published in/as: US Department of Commerce,
                 National Bureau of Standards, Washington DC, Spec.
                 Publ. 500-47, April 1979.",
  abstract =     "Database reorganization can be defined as changing
                 some aspect of the way in which a database is arranged
                 logically and/or physically. An example is changing
                 from a one-to-one to a one-to-many relationship.
                 Reorganization is a necessary function in a database
                 system. This paper introduces the basic concepts of
                 reorganization, including why it is performed. Many
                 types of reorganization are described and classified
                 into logical/physical levels. Then pragmatic issues
                 such as reorganization strategies, a survey of several
                 commercial reorganization facilities, case studies, and
                 database administration considerations are covered.
                 Finally, several research efforts are surveyed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "database; database management; file maintenance;
                 reorganization; restructuring",
}

@Article{Bentley:1979:DSR,
  author =       "Jon Louis Bentley and Jerome H. Friedman",
  title =        "Data Structures for Range Searching",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "397--409",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356797",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "cells; k-d trees; k-ranges; multidimensional binary
                 search trees; orthogonal range queries; projection",
}

@Article{Alberts:1979:SFQ,
  author =       "David S. Alberts",
  title =        "Surveyor's Forum: a Question of Transition",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "411--411",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356798",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Zelkowitz:1978:PSE,Wendel:1979:SFR,Zelkowitz:1979:SFQ,Zelkowitz:1979:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zelkowitz:1979:SFQ,
  author =       "Marvin V. Zelkowitz",
  title =        "Surveyor's Forum: a Question of Transition",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "411--412",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356799",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Zelkowitz:1978:PSE,Alberts:1979:SFQ,Wendel:1979:SFR,Zelkowitz:1979:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Comer:1979:SFT,
  author =       "Douglas Comer",
  title =        "Surveyor's Forum: {The} Tree Branches",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "412--412",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356800",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Comer:1979:UBT}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Buck-Lew:1979:SFD,
  author =       "Maylun Buck-Lew",
  title =        "Surveyor's Forum: a Dance Prelude",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "412--413",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356801",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Badler:1979:DRH}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1980:AILa,
  author =       "Adele J. Goldberg",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356802.356803",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:26:29 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Maryanski:1980:BDS,
  author =       "Fred J. Maryanski",
  title =        "Backend Database Systems",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "1",
  pages =        "3--25",
  month =        mar,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356802.356804",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:26:29 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  annote =       "Tutorial examines basic structure, their potential
                 benefits and drawbacks and the problems facing
                 developers of such systems. Several prototype systems
                 are described: XDMS, IDMS backend, GE MADMAN, Kansas
                 State University systems.",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ellis:1980:OIS,
  author =       "Clarence A. Ellis and Gary J. Nutt",
  title =        "Office Information Systems and Computer Science",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "1",
  pages =        "27--60",
  month =        mar,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356802.356805",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:26:29 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  annote =       "Office information systems are defined as entities
                 within a distributed environment.",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kling:1980:SAC,
  author =       "Rob Kling",
  title =        "Social Analyses of Computing: {Theoretical}
                 Perspectives in Recent Empirical Research",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "1",
  pages =        "61--110",
  month =        mar,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356802.356806",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:26:29 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fernandez:1980:SFR,
  author =       "E. B. Fernandez",
  title =        "Surveyor's Forum: {Related} Information",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "1",
  pages =        "111--112",
  month =        mar,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356802.356807",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:26:29 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Kim:1979:RDS,Kim:1980:SFR,Friesen:1980:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kim:1980:SFR,
  author =       "Won Kim",
  title =        "Surveyor's Forum: {Related} Information",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "1",
  pages =        "112--112",
  month =        mar,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356802.356808",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:26:29 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Kim:1979:RDS,Fernandez:1980:SFR,Friesen:1980:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Friesen:1980:SFR,
  author =       "Oris D. Friesen",
  title =        "Surveyor's Forum: {Related} Information",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "1",
  pages =        "112--113",
  month =        mar,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356802.356809",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:26:29 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Kim:1979:RDS,Fernandez:1980:SFR,Kim:1980:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1980:AILb,
  author =       "Adele J. Goldberg",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "2",
  pages =        "115--116",
  month =        jun,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356810.356811",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1980:EP,
  author =       "Adele J. Goldberg",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "2",
  pages =        "117--120",
  month =        jun,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356810.356812",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jones:1980:EUM,
  author =       "Anita K. Jones and Peter Schwarz",
  title =        "Experience Using Multiprocessor Systems --- a Status
                 Report",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "2",
  pages =        "121--165",
  month =        jun,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356810.356813",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wong:1980:MEH,
  author =       "C. K. Wong",
  title =        "Minimizing Expected Head Movement in One-Dimensional
                 and Two-Dimensional Mass Storage Systems",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "2",
  pages =        "167--178",
  month =        jun,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356810.356814",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:10 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Teorey:1980:LRA,
  author =       "Toby J. Teorey and James P. Fry",
  title =        "The Logical Record Access Approach to Database
                 Design",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "2",
  pages =        "179--211",
  month =        jun,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356810.356815",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Teorey:1980:CLR}.",
  abstract =     "Database management systems have evolved to the point
                 of general acceptance and wide application; however a
                 major problem still facing the user is the effective
                 utilization of these systems. Important to achieving
                 effective database usability and responsiveness is the
                 design of the database. This paper presents a practical
                 stepwise database design methodology that derives a
                 DBMS-processable database structure from a set of user
                 information and processing requirements. Although the
                 methodology emphasizes the logical design step, the
                 activities of requirements analysis and physical design
                 are also addressed. The methodology is illustrated with
                 a detailed example. Performance trade-offs among
                 multiple users of a single integrated database are
                 considered, and the relationship between short-term
                 design and design for flexibility to changing
                 requirements is discussed. Many steps in the database
                 design process can be assisted with proper use of
                 computer modeling techniques and other tools, such as
                 requirements analysis software. The example design
                 problem and its solution steps serve to point out when
                 and where current technology can be effectively used.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "analytical models; database administrator; database
                 design; database management systems; performance
                 evaluation; requirements analysis",
}

@Article{Erman:1980:HIS,
  author =       "Lee D. Erman and Frederick Hayes-Roth and Victor R.
                 Lesser and D. Raj Reddy",
  title =        "The {Hearsay-II} Speech-Understanding System:
                 Integrating Knowledge to Resolve Uncertainty",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "2",
  pages =        "213--253",
  month =        jun,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356810.356816",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dunn:1980:SFW,
  author =       "Stanley Dunn",
  title =        "Surveyor's Forum: {Working} on Interpretations",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "2",
  pages =        "255--255",
  month =        jun,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356810.356817",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Mohanty:1979:MMQ,Mohanty:1980:SFW}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mohanty:1980:SFW,
  author =       "Siba Mohanty",
  title =        "Surveyor's Forum: {Working} on Interpretations",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "2",
  pages =        "256--256",
  month =        jun,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356810.356818",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Mohanty:1979:MMQ,Dunn:1980:SFW}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1980:AILc,
  author =       "Adele J. Goldberg",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "3",
  pages =        "257--258",
  month =        sep,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356819.356820",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Habib:1980:SSM,
  author =       "Stanley Habib",
  title =        "Special Section on Microprogramming",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "3",
  pages =        "259--259",
  month =        sep,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356819.356821",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Landskov:1980:LMC,
  author =       "David Landskov and Scott Davidson and Bruce Shriver
                 and Patrick W. Mallett",
  title =        "Local Microcode Compaction Techniques",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "3",
  pages =        "261--294",
  month =        sep,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356819.356822",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dasgupta:1980:SAH,
  author =       "Subrata Dasgupta",
  title =        "Some Aspects of High-Level Microprogramming",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "3",
  pages =        "295--323",
  month =        sep,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356819.356823",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Clark:1980:EML,
  author =       "Wesley A. Clark",
  title =        "From Electron Mobility to Logical Structure: a View of
                 Integrated Circuits",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "3",
  pages =        "325--356",
  month =        sep,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356819.356824",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wilson:1980:SFD,
  author =       "Walter Wilson",
  title =        "Surveyor's Forum: {Determining} a Search",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "3",
  pages =        "357--358",
  month =        sep,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356819.356825",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Cohen:1979:NDA,Cohen:1980:SFD}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cohen:1980:SFD,
  author =       "Jacques Cohen",
  title =        "Surveyor's Forum: {Determining} a Search",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "3",
  pages =        "358--358",
  month =        sep,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356819.356826",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:27:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Cohen:1979:NDA,Wilson:1980:SFD}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1980:AILd,
  author =       "Adele J. Goldberg",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "4",
  pages =        "359--360",
  month =        dec,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356827.356828",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:28:11 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wetherell:1980:PLR,
  author =       "C. S. Wetherell",
  title =        "Probabilistic Languages: a Review and Some Open
                 Questions",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "4",
  pages =        "361--379",
  month =        dec,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356827.356829",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:28:11 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hall:1980:ASM,
  author =       "Patrick A. V. Hall and Geoff R. Dowling",
  title =        "Approximate String Matching",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "4",
  pages =        "381--402",
  month =        dec,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356827.356830",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:28:11 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bird:1980:TTR,
  author =       "R. S. Bird",
  title =        "Tabulation Techniques for Recursive Programs",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "4",
  pages =        "403--417",
  month =        dec,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356827.356831",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:28:11 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Richter:1981:SFR,Bird:1981:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lueker:1980:STS,
  author =       "George S. Lueker",
  title =        "Some Techniques for Solving Recurrences",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "4",
  pages =        "419--436",
  month =        dec,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356827.356832",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:28:11 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Keenan:1981:SFG,Lueker:1981:SFG}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Requicha:1980:RRS,
  author =       "Aristides A. G. Requicha",
  title =        "Representations for Rigid Solids: {Theory}, Methods,
                 and Systems",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "4",
  pages =        "437--464",
  month =        dec,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356827.356833",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:28:11 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Steinberg:1981:SFU,Requicha:1981:SFU}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "general references surveys and Methodologies; Modeling
                 geometric design/modeling and shape modeling and
                 Algorithmic Aspects solids representation; Techniques",
}

@Article{Teorey:1980:CLR,
  author =       "Toby J. Teorey and James P. Fry",
  title =        "Corrigenda: {``The Logical Record Access Approach to
                 Database Design''}",
  journal =      j-COMP-SURV,
  volume =       "12",
  number =       "4",
  pages =        "465--465",
  month =        dec,
  year =         "1980",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356827.356834",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:28:11 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Teorey:1980:LRA}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Moran:1981:GEI,
  author =       "Thomas P. Moran",
  title =        "{Guest Editor}'s Introduction: an Applied Psychology
                 of the User",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "1",
  pages =        "1--11",
  month =        mar,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356835.356836",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:28:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Special Issue: The Psychology of Human-Computer
                 Interaction. See also
                 \cite{Floyd:1981:SFA,Moran:1981:SFA}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Reisner:1981:HFS,
  author =       "Phyllis Reisner",
  title =        "Human Factors Studies of Database Query Languages: a
                 Survey and Assessment",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "1",
  pages =        "13--31",
  month =        mar,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356835.356837",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:28:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Empirical studies have been undertaken to measure the
                 ease-of-use of a query language, compare two or more
                 such languages for ease-of-use, study controversial
                 issues in query language design, and provide feedback
                 to designers for improving a language. Some primitive
                 attempts at constructing abstract models related to
                 query languages also exist. This paper discusses some
                 of the techniques that have been used and results
                 obtained. A primary goal is to show the reader
                 unfamiliar with behavioral research what the results do
                 and do not mean.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "behavioral science; data models; database systems;
                 evaluation of ease-of-use; human factors; improving
                 language design; procedurality; query languages;
                 syntax",
}

@Article{Embley:1981:BAT,
  author =       "David W. Embley and George Nagy",
  title =        "Behavioral Aspects of Text Editors",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "1",
  pages =        "33--70",
  month =        mar,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356835.356838",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:28:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Leverett:1981:SFI,Embley:1981:SFI}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rouse:1981:HCI,
  author =       "William B. Rouse",
  title =        "Human-Computer Interaction in the Control of Dynamic
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "1",
  pages =        "71--99",
  month =        mar,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356835.356839",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:28:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Modes of human-computer interaction in the control of
                 dynamic systems are discussed, and the problem of
                 allocating tasks between human and computer considered.
                 Models of human performance in a variety of tasks
                 associated with the control of dynamic systems are
                 reviewed. These models are evaluated in the context of
                 a design example involving human-computer interaction
                 in aircraft operations. Other examples include power
                 plants, chemical plants, and ships.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "aircraft; control; dynamic systems; human-computer
                 interaction; mathematical models; system design; task
                 analysis",
}

@Article{Sheil:1981:PSP,
  author =       "B. A. Sheil",
  title =        "The Psychological Study of Programming",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "1",
  pages =        "101--120",
  month =        mar,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356835.356840",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:28:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mayer:1981:PHN,
  author =       "Richard E. Mayer",
  title =        "The Psychology of How Novices Learn Computer
                 Programming",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "1",
  pages =        "121--141",
  month =        mar,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356835.356841",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:28:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1981:AILa,
  author =       "Adele Goldberg",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "2",
  pages =        "143--144",
  month =        jun,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356842.356843",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:03 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1981:EP,
  author =       "Adele Goldberg",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "2",
  pages =        "145--148",
  month =        jun,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356842.356844",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:03 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kohler:1981:STS,
  author =       "Walter H. Kohler",
  title =        "A Survey of Techniques for Synchronization and
                 Recovery in Decentralized Computer Systems",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "2",
  pages =        "149--183",
  month =        jun,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356842.356845",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:03 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Reed:1982:SFR,Kohler:1982:SFR}.",
  abstract =     "Two related and fundamental problems in designing
                 decentralized systems which support an object model of
                 computation are introduced, and proposed solution
                 techniques are surveyed. The first problem is
                 synchronizing access to shared objects while allowing a
                 high degree of concurrency. The second is the recovery
                 of objects in spite of user errors, application errors,
                 or partial system failure. The synchronization problem
                 is a generalization of the concurrency control problem
                 which arises in database and transaction-processing
                 systems. Concurrency control methods which use locking,
                 timestamps, circulating permit, tickets, conflict
                 analysis, and reservations are presented and compared.
                 The proposed approach to solving the recovery problem
                 is based on a software structuring abstraction called
                 the atomic action, a type of generalized transaction.
                 Requirements and techniques for implementing atomic
                 actions in a decentralized environment are discussed.",
  acknowledgement = ack-nhfb,
  annote =       "The concurrency problem is described, as is its
                 statement, in terms of the notion of a serial
                 linearized schedule of atomic actions (transactions).
                 The role of atomic actions in recovery. A survey is
                 given of the techniques used for providing concurrency
                 control and recovery. The concurrency controls
                 discussed are locking, time-stamps, conflict analysis,
                 and a notion called `reservations'. `Ticketing' and its
                 use in distributed systems is also described briefly.",
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer systems, digital",
}

@Article{Bernstein:1981:CCD,
  author =       "Philip A. Bernstein and Nathan Goodman",
  title =        "Concurrency Control in Distributed Database Systems",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "2",
  pages =        "185--221",
  month =        jun,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356842.356846",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:03 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Also published in/as: Auerbach Annual 1980,
                 North-Holland 1981. See also
                 \cite{Bender:1982:SFT,Gifford:1982:SFT,Bernstein:1982:SFT}.",
  abstract =     "The state of the art in distributed database
                 concurrency control is presented. The heart of our
                 analysis is a decomposition of the concurrency control
                 problem into two major subproblems: read-write and
                 write-write synchronization. A series of
                 synchronization techniques is described for solving
                 each subproblem and show how to combine these
                 techniques into algorithms for solving the entire
                 concurrency control problem. Such algorithms are called
                 ``concurrency control methods''. 48 principal methods
                 are described including all practical algorithms that
                 have appeared in the literature plus several new
                 ones.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data base systems",
}

@Article{Gray:1981:RMS,
  author =       "Jim Gray and Paul McJones and Mike Blasgen and Bruce
                 Lindsay and Raymond Lorie and Tom Price and Franco
                 Putzolu and Irving Traiger",
  title =        "The {Recovery Manager} of the {System R Database
                 Manager}",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "2",
  pages =        "223--242",
  month =        jun,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356842.356847",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:03 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The recovery subsystem of an experimental data
                 management system is described and evaluated. The
                 transaction concept allows application programs to
                 commit, abort, or partially undo their effects. The
                 DO-UNDO-REDO protocol allows new recoverable types and
                 operations to be added to the recovery system.
                 Application programs can record data in the transaction
                 log to facilitate application-specific recovery.
                 Transaction undo and redo are based on records kept in
                 a transaction log. The checkpoint mechanism is based on
                 differential files (shadows). The recovery log is
                 recorded on disk rather than tape.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data base systems",
}

@Article{Bird:1981:SFR,
  author =       "R. S. Bird",
  title =        "Surveyor's Forum: a Recurring Bug",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "2",
  pages =        "243--243",
  month =        jun,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356842.356848",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:03 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Bird:1980:TTR,Richter:1981:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Richter:1981:SFR,
  author =       "Helmut Richter",
  title =        "Surveyor's Forum: a Recurring Bug",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "2",
  pages =        "243--243",
  month =        jun,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356842.356849",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:03 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Bird:1980:TTR,Bird:1981:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1981:AILb,
  author =       "Adele Goldberg",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "3",
  pages =        "245--245",
  month =        sep,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356850.356851",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:28 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Landwehr:1981:FMC,
  author =       "Carl E. Landwehr",
  title =        "Formal Models for Computer Security",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "3",
  pages =        "247--278",
  month =        sep,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356850.356852",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:28 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This paper reviews the need for formal security
                 models, describes the structure and operation of
                 military security controls, considers how automation
                 has affected security problems, surveys models that
                 have been proposed and applied to date, and suggests
                 possible directions for future models.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer security; computer systems, digital; data
                 processing",
}

@Article{Cheheyl:1981:VS,
  author =       "Maureen Harris Cheheyl and Morrie Gasser and George A.
                 Huff and Jonathan K. Millen",
  title =        "Verifying Security",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "3",
  pages =        "279--339",
  month =        sep,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356850.356853",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:28 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Four automated specification and verification
                 environments are surveyed and compared: HDM, FDM,
                 Gypsy, and AFFIRM. The emphasis of the comparison is on
                 the way these systems could be used to prove security
                 properties of an operating system design.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer operating systems --- Design; data
                 processing; security verification",
}

@Article{Cohen:1981:GCL,
  author =       "Jacques Cohen",
  title =        "Garbage Collection of Linked Data Structures",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "3",
  pages =        "341--367",
  month =        sep,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356850.356854",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:28 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A concise and unified view of the numerous existing
                 algorithms for performing garbage collection of linked
                 data structures is presented. The emphasis is on
                 garbage collection proper, rather than on storage
                 allocation. First, the classical garbage collection
                 algorithms are reviewed, and their marking and
                 collecting phases, with and without compacting, are
                 discussed. Algorithms describing these phases are
                 classified according to the type of cells to be
                 collected: those for collecting single-sized cells are
                 simpler than those for varisized cells. Recently
                 proposed algorithms are presented and compared with the
                 classical ones. Special topics in garbage collection
                 are also covered. A bibliography with topical
                 annotations is included.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming --- Subroutines; data processing;
                 garbage collection",
}

@Article{Requicha:1981:SFU,
  author =       "Aristides A. G. Requicha",
  title =        "Surveyor's Forum: an Update on {SynthaVision}",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "3",
  pages =        "369--369",
  month =        sep,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356850.356855",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:28 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Requicha:1980:RRS,Steinberg:1981:SFU}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Steinberg:1981:SFU,
  author =       "Herbert A. Steinberg",
  title =        "Surveyor's Forum: an Update on {SynthaVision}",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "3",
  pages =        "369--369",
  month =        sep,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356850.356856",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:28 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Requicha:1980:RRS,Requicha:1981:SFU}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Keenan:1981:SFG,
  author =       "Douglas J. Keenan",
  title =        "Surveyor's Forum: Generating Solutions",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "3",
  pages =        "370--370",
  month =        sep,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356850.356857",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:28 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Lueker:1980:STS,Lueker:1981:SFG}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lueker:1981:SFG,
  author =       "George S. Lueker",
  title =        "Surveyor's Forum: Generating Solutions",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "3",
  pages =        "370--370",
  month =        sep,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356850.356858",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:28 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Lueker:1980:STS,Keenan:1981:SFG}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1981:AILc,
  author =       "Adele Goldberg",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "4",
  pages =        "371--372",
  month =        dec,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356859.356860",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:55 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ahuja:1981:IM,
  author =       "Narendra Ahuja and B. J. Schachter",
  title =        "Image Models",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "4",
  pages =        "373--397",
  month =        dec,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356859.356861",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:55 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Sharma:1983:SFI,Ahuja:1983:SFI}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Srihari:1981:RTD,
  author =       "Sargur N. Srihari",
  title =        "Representation of Three-Dimensional Digital Images",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "4",
  pages =        "399--424",
  month =        dec,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356859.356862",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:55 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "I35 digital images and I35 3-D digital images",
}

@Article{Frank:1981:TDC,
  author =       "Edward H. Frank and Robert F. Sproull",
  title =        "Testing and Debugging Custom Integrated Circuits",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "4",
  pages =        "425--451",
  month =        dec,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356859.356863",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:55 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tanenbaum:1981:NP,
  author =       "Andrew S. Tanenbaum",
  title =        "Network Protocols",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "4",
  pages =        "453--489",
  month =        dec,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356859.356864",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:55 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Floyd:1981:SFA,
  author =       "Christiane Floyd and Reinhard Keil and Erhard
                 Nullmeier",
  title =        "Surveyor's Forum: Augmentation or Dehumanization?",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "4",
  pages =        "491--492",
  month =        dec,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356859.356865",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:55 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Moran:1981:GEI,Moran:1981:SFA}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Moran:1981:SFA,
  author =       "Thomas P. Moran",
  title =        "Surveyor's Forum: {Augmentation} or Dehumanization?",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "4",
  pages =        "492--493",
  month =        dec,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356859.356866",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:55 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Moran:1981:GEI,Floyd:1981:SFA}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Leverett:1981:SFI,
  author =       "Bruce Leverett",
  title =        "Surveyor's Forum: {Interpreting} Experimental Data",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "4",
  pages =        "493--494",
  month =        dec,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356859.356867",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:55 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Embley:1981:BAT,Embley:1981:SFI}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Embley:1981:SFI,
  author =       "David W. Embley and George Nagy",
  title =        "Surveyor's Forum: {Interpreting} Experimental Data",
  journal =      j-COMP-SURV,
  volume =       "13",
  number =       "4",
  pages =        "494--494",
  month =        dec,
  year =         "1981",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356859.356868",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:29:55 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Embley:1981:BAT,Leverett:1981:SFI}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1982:AILa,
  author =       "Adele Goldberg",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356869.356870",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Brady:1982:CAI,
  author =       "Michael Brady",
  title =        "Computational Approaches to Image Understanding",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "1",
  pages =        "3--71",
  month =        mar,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356869.356871",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:24 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Recent theoretical developments in image understanding
                 are surveyed. Among the issues discussed are edge
                 finding, region finding, texture, shape from shading,
                 shape from texture, shape from contour, and the
                 representations of surfaces and objects. Much of the
                 work described was developed in the DARPA Image
                 Understanding project.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "I35 image understanding, image processing",
}

@Article{Feuer:1982:CPL,
  author =       "Alan R. Feuer and Narain H. Gehani",
  title =        "Comparison of the Programming Languages {C} and
                 {Pascal}",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "1",
  pages =        "73--92",
  month =        mar,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356869.356872",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:24 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Peterson:1982:SFI,Feuer:1982:SFI}.",
  abstract =     "The languages C and PASCAL are growing in popularity,
                 particularly among programmers of small computers. The
                 two languages are summarized and compared, including
                 their design philosophies, their handling of data
                 types, the programming facilities they provide, the
                 impact of these facilities on the quality of programs,
                 and how useful the facilities are for programming in a
                 variety of application domains.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming languages",
}

@Article{Treleaven:1982:DDD,
  author =       "Philip C. Treleaven and David R. Brownbridge and
                 Richard P. Hopkins",
  title =        "Data-Driven and Demand-Driven Computer Architecture",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "1",
  pages =        "93--143",
  month =        mar,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356869.356873",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:24 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Novel data-driven and demand-driven computer
                 architectures are under development in a large number
                 of laboratories in the United States, Japan, and
                 Europe. The concepts and relationships that exist both
                 within and between the two areas of research are
                 identified by examining data-driven and demand-driven
                 architecture at three levels: computation organization,
                 (stored) program organizations, and machine
                 organization. Finally, a survey of various novel
                 computer architectures under development is given.",
  acknowledgement = ack-nhfb,
  annote =       "The aim of this paper is to identify the concepts and
                 relationships that exist both within and between the
                 two areas of research of data-driven and demand-driven
                 architectures.",
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer architecture",
}

@Article{Reed:1982:SFR,
  author =       "David P. Reed",
  title =        "Surveyor's Forum: {Recovering} an Error",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "1",
  pages =        "145--146",
  month =        mar,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356869.356874",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Kohler:1981:STS,Kohler:1982:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kohler:1982:SFR,
  author =       "Walter H. Kohler",
  title =        "Surveyor's Forum: {Recovering} an Error",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "1",
  pages =        "146--147",
  month =        mar,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356869.356875",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Kohler:1981:STS,Reed:1982:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1982:AILb,
  author =       "Adele J. Goldberg",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "2",
  pages =        "149--150",
  month =        jun,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356876.356877",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1982:EP,
  author =       "Adele J. Goldberg",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "2",
  pages =        "151--157",
  month =        jun,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356876.356878",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Adrion:1982:VVT,
  author =       "W. Richards Adrion and Martha A. Branstad and John C.
                 Cherniavsky",
  title =        "Validation, Verification, and Testing of Computer
                 Software",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "2",
  pages =        "159--192",
  month =        jun,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356876.356879",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:43 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Current verification, validation, and testing
                 approaches are surveyed, and their strengths,
                 weaknesses, and life-cycle usage are discussed. In
                 conjunction with these, the paper describes automated
                 tools used to implement validation, verification, and
                 testing. In the discussion of new research thrusts,
                 emphasis is given to the continued need to develop a
                 stronger theoretical basis for testing and the need to
                 employ combinations of tools and techniques that may
                 vary over each application.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer software",
}

@Article{Howden:1982:VSP,
  author =       "William E. Howden",
  title =        "Validation of Scientific Programs",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "2",
  pages =        "193--227",
  month =        jun,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356876.356880",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:43 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A comprehensive approach to the validation of computer
                 programs which concentrates on the use of informal
                 validation methods, such as testing and static analysis
                 is described. Although many of the methods are general
                 and can be applied to any software system, the emphasis
                 is on the validation of individual scientific
                 subroutines. Most of the examples are in FORTRAN and
                 some of the described techniques are closely related to
                 features of the FORTRAN language. Methods for detecting
                 programming errors are described, the validation of
                 specifications and design, as well as their use in
                 generating test data are discussed.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming",
}

@Article{Dunlop:1982:CAF,
  author =       "Douglas D. Dunlop and Victor R. Basili",
  title =        "A Comparative Analysis of Functional Correctness",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "2",
  pages =        "229--244",
  month =        jun,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356876.356881",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:43 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The functional correctness technique is presented and
                 discussed. It is also explained that the underlying
                 theory has an implication for the derivation of loop
                 invariants. The functional verification conditions
                 concerning program loops are then shown to be a
                 specialization of the commonly used inductive assertion
                 verification conditions. Next, the functional technique
                 is compared and contrasted with subgoal induction.
                 Finally, the difficulty of proving initialized loop
                 programs is examined in light of both the inductive
                 assertion and functional correctness theories.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming",
}

@Article{Allen:1982:IDD,
  author =       "Frank W. Allen and Mary E. S. Loomis and Michael V.
                 Mannino",
  title =        "The Integrated {Dictionary\slash Directory System}",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "2",
  pages =        "245--286",
  month =        jun,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356876.356882",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:43 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The concept of an integrated Dictionary\slash
                 Directory (D/D) System is discussed in detail, and the
                 state of current systems in both the centralized and
                 distributed database environments is surveyed. For the
                 centralized database environment, three aspects are
                 emphasized: (1) the software interfaces between the D/D
                 System and the other software packages, (2) the convert
                 functions of the D/D System, and (3) the environmental
                 dependency between the D/D System and a Database
                 Management System (DBMS). For the distributed database
                 environment, the article elucidates the necessary
                 extensions to the centralized D/D, the additional
                 software interfaces required, and the use of the D/D as
                 a distributed database. An example of a commercial D/D
                 System that is integrated with a distributed DBMS is
                 presented.",
  acknowledgement = ack-nhfb,
  annote =       "A comprehensive survey of dictionary\slash directory
                 system features with examples from commercial systems",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data base systems",
}

@Article{Dowdy:1982:CMF,
  author =       "Lawrence W. Dowdy and Derrell V. Foster",
  title =        "Comparative Models of the File Assignment Problem",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "2",
  pages =        "287--313",
  month =        jun,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356876.356883",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:43 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Kollias:1983:SFF,Dowdy:1983:SFF}.",
  abstract =     "The optimal distribution of files among storage nodes
                 is a major problem in computer system optimization.
                 Differing design goals, varying system assumptions, and
                 contrasting solution techniques yield a disparity of
                 optimal file assignments. This paper views the
                 differing file assignment models in a uniform manner.
                 Relative advantages and weaknesses of the various
                 models become immediately apparent. This perspective
                 exposes the further research which is necessary in
                 order to provide a truly satisfactory solution of the
                 file assignment problem.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer systems, digital; distributed file systems",
}

@Article{Bender:1982:SFT,
  author =       "Heinz Bender",
  title =        "Surveyor's Forum: {Technical} Transactions",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "2",
  pages =        "315--316",
  month =        jun,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356876.356884",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Bernstein:1981:CCD,Gifford:1982:SFT,Bernstein:1982:SFT}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gifford:1982:SFT,
  author =       "David Gifford",
  title =        "Surveyor's Forum: {Technical} Transactions",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "2",
  pages =        "316--316",
  month =        jun,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356876.356885",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Bernstein:1981:CCD,Bender:1982:SFT,Bernstein:1982:SFT}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bernstein:1982:SFT,
  author =       "Philip Bernstein and Nathan Goodman",
  title =        "Surveyor's Forum: {Technical} Transactions",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "2",
  pages =        "317--318",
  month =        jun,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356876.356886",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:30:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Bernstein:1981:CCD,Bender:1982:SFT,Gifford:1982:SFT}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1982:AILc,
  author =       "Adele J. Goldberg",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "3",
  pages =        "319--320",
  month =        sep,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356887.356888",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:31:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Meyrowitz:1982:IESa,
  author =       "Norman Meyrowitz and Andries {Van Dam}",
  title =        "Interactive Editing Systems: {Part I}",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "3",
  pages =        "321--352",
  month =        sep,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356887.356889",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:31:12 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Computer-based interactive editing systems, which
                 allow users to change the state of targets such as
                 manuscripts and programs are examined. User and system
                 views of the editing process are provided, a historical
                 perspective is presented, and the functional
                 capabilities of editors are discussed, with emphasis on
                 user-level rather than implementation-level
                 considerations. References are given at the end of Part
                 II.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer software; interactive editing",
}

@Article{Meyrowitz:1982:IESb,
  author =       "Norman Meyrowitz and Andries {van Dam}",
  title =        "Interactive Editing Systems: {Part II}",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "3",
  pages =        "353--415",
  month =        sep,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356887.356890",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:31:12 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The state of the art of computer-based interactive
                 editing systems is surveyed. Numerous examples are
                 presented of systems in both the academic and
                 commercial arenas, covering line editors, screen
                 editors, interactive editor\slash formatters, structure
                 editors, syntax-directed editors, and commercial
                 word-processing editors. Pertinent issues in the field
                 are discussed, some observations about the future of
                 interactive editing are presented.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer software; interactive editing",
}

@Article{Furuta:1982:DFS,
  author =       "Richard Furuta and Jeffrey Scofield and Alan Shaw",
  title =        "Document Formatting Systems: {Survey}, Concepts, and
                 Issues",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "3",
  pages =        "417--472",
  month =        sep,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356887.356891",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:31:12 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Formatting systems are concerned with the physical
                 layout of a document for hard-and soft-copy media. This
                 paper characterize the formatting problem and its
                 relation to other aspects of document processing,
                 describes and evaluates several representative and
                 seminal systems, and discusses some issues and problems
                 relevant to future systems. The emphasis is on topics
                 related to the specification of document formats; these
                 include the underlying document and processing models,
                 functions performed by a formatter, the formatting
                 language and user interface, variety of document
                 objects, the integration of formatters with other
                 document processing tasks, and implementation
                 questions.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data processing",
}

@Article{Smith:1982:CM,
  author =       "Alan Jay Smith",
  title =        "Cache Memories",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "3",
  pages =        "473--530",
  month =        sep,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356887.356892",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:31:12 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The various aspects of cache memories are explained,
                 and the design features and trade-offs are discussed in
                 some detail. A large number of original, trace-driven
                 simulation results are presented. Consideration is
                 given to practical implementation questions as well as
                 to more abstract design issues. Specific aspects of
                 cache memories that are investigated include: the cache
                 fetch algorithm (demand versus prefetch), the placement
                 and replacement algorithms, line size, store-through
                 versus copy-back updating of main memory, cold-start
                 versus warm-start miss ratios, multicache consistency,
                 the effect of input\slash output through the cache, the
                 behavior of split data\slash instruction caches, and
                 cache size.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "cache memories; computer systems, digital; memory
                 structures",
}

@Article{Goldberg:1982:AILd,
  author =       "Adele J. Goldberg",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "4",
  pages =        "531--532",
  month =        dec,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356893.356894",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:31:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Marsland:1982:PSS,
  author =       "T. A. Marsland and M. Campbell",
  title =        "Parallel Search of Strongly Ordered Game Trees",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "4",
  pages =        "533--551",
  month =        dec,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356893.356895",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:31:39 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Over the past decade major enhancements to the
                 alpha-beta algorithm have been developed by people
                 building game-playing programs, and many of these
                 methods are surveyed and compared here. Contemporary
                 methods for searching chess game trees in parallel,
                 using an arbitrary number of independent processors are
                 studied. To make efficient use of these processors, one
                 must have a clear understanding of the basic properties
                 of the trees actually transversed when alpha-beta
                 cutoffs occur. This paper provides such insights and
                 concludes with a brief description of the author's
                 refinement to a standard parallel search algorithm for
                 this problem. 33 refs.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming",
}

@Article{Barnard:1982:CS,
  author =       "Stephen T. Barnard and Martin A. Fischler",
  title =        "Computational Stereo",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "4",
  pages =        "553--572",
  month =        dec,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356893.356896",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:31:39 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Computational stereo is broadly defined as the
                 recovery of the three-dimensional characteristics of a
                 scene from multiple images taken from different points
                 of view. First, each of the functional components of
                 the computational stereo paradigm --- image
                 acquisition, camera modeling, feature acquisition,
                 image matching, depth determination, and interpolation
                 --- is identified and discussed. Then, the criteria
                 that are important for evaluating the effectiveness of
                 various computational stereo techniques are presented.
                 Finally a representative sampling of computational
                 stereo research is provided.",
  acknowledgement = ack-nhfb,
  classification = "723; 741",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "pattern recognition; vision",
}

@Article{Ganapathi:1982:RCC,
  author =       "Mahadevan Ganapathi and Charles N. Fischer and John L.
                 Hennessy",
  title =        "Retargetable Compiler Code Generation",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "4",
  pages =        "573--592",
  month =        dec,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356893.356897",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:31:39 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Wulf:1983:SFR,Ganapathi:1983:SFRa,Fraser:1983:SFR,Ganapathi:1983:SFRb}.",
  abstract =     "A classification of automated retargetable code
                 generation techniques and a survey of the work on these
                 techniques is presented. Retargetable code generation
                 research is classified into three categories:
                 interpretive code generation, pattern-matched code
                 generation, and table-driven code generation.
                 Interpretive code generation approaches generate code
                 for a virtual machine and then expand into real target
                 code. Pattern-matched code generation approaches
                 separate the machine description from the code
                 generation algorithm. Table-driven code generation
                 approaches employ a formal machine description and use
                 a code-generator generator to produce code generators
                 automatically. An analysis of these techniques and a
                 critique of automatic code generation algorithms are
                 presented.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming languages",
}

@Article{Moret:1982:DTD,
  author =       "Bernard M. E. Moret",
  title =        "Decision Trees and Diagrams",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "4",
  pages =        "593--623",
  month =        dec,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356893.356898",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:31:39 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Decision trees and diagrams (also known as sequential
                 evaluation procedures) have widespread applications in
                 databases, decision table programming, concrete
                 complexity theory, switching theory, pattern
                 recognition, and taxonomy --- in short, wherever
                 discrete functions must be evaluated sequentially. In
                 this tutorial survey a common framework of definitions
                 and notation is established, the contributions of the
                 main fields of application are reviewed, recent results
                 and extensions are presented, and areas of ongoing and
                 future research are discussed.",
  acknowledgement = ack-nhfb,
  classification = "921; 922",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "I35 decision trees, decision theory and analysis;
                 mathematical techniques --- Trees",
}

@Article{Peterson:1982:SFI,
  author =       "James L. Peterson",
  title =        "Surveyor's Forum: {Idiomatic} Programming",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "4",
  pages =        "625--625",
  month =        dec,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356893.356899",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:31:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Feuer:1982:CPL,Feuer:1982:SFI}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Feuer:1982:SFI,
  author =       "Alan R. Feuer and Narain H. Gehani",
  title =        "Surveyor's Forum: {Idiomatic} Programming",
  journal =      j-COMP-SURV,
  volume =       "14",
  number =       "4",
  pages =        "625--626",
  month =        dec,
  year =         "1982",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356893.356900",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:31:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Feuer:1982:CPL,Peterson:1982:SFI}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1983:AILa,
  author =       "Anthony I. Wasserman",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356901.356902",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:32:05 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Andrews:1983:CNC,
  author =       "Gregory R. Andrews and Fred B. Schneider",
  title =        "Concepts and Notations for Concurrent Programming",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "1",
  pages =        "3--43",
  month =        mar,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356901.356903",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:32:05 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Atkins:1983:SFN,Andrews:1983:SFN,Andrews:1983:CCN}.",
  abstract =     "This paper identifies the major concepts of concurrent
                 programming and describes some of the more important
                 language notations for writing concurrent programs. The
                 roles of processes, communication, and synchronization
                 are discussed. Language notations for expressing
                 concurrent execution and for specifying process
                 interaction are surveyed. Synchronization primitives
                 based on shared variables and on message passing are
                 described. Finally, three general classes of concurrent
                 programming languages are identified and compared.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming",
}

@Article{March:1983:TSD,
  author =       "Salvatore T. March",
  title =        "Techniques for Structuring Database Records",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "1",
  pages =        "45--79",
  month =        mar,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356901.356904",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:32:05 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Structuring database records by considering data item
                 usage can yield substantial efficiencies in the
                 operating cost of database systems. However, since the
                 number of possible physical record structures for
                 database of practical significance is enormous, and
                 their evaluation is extremely complex, determining
                 efficient record structures by full enumeration is
                 generally infeasible. This paper discusses the
                 techniques of mathematical clustering, iterative
                 grouping refinement, mathematical programming, and
                 hierarchic aggregation, which can be used to quickly
                 determine efficient record structures for large, shared
                 databases.",
  acknowledgement = ack-nhfb,
  annote =       "First segmentation, then clustering (dedicated vs.
                 paged, Seq. vs. sec. indexes (partial and all)),
                 hierarchical aggregation.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "database systems",
}

@Article{Kollias:1983:SFF,
  author =       "J. (Yiannis) G. Kollias and Michalis Hatzopoulos",
  title =        "Surveyor's Forum: {The} File Assignment Problem",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "1",
  pages =        "81--82",
  month =        mar,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356901.356905",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:32:05 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Dowdy:1982:CMF,Dowdy:1983:SFF}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dowdy:1983:SFF,
  author =       "Lawrence W. Dowdy and Derrell V. Foster",
  title =        "Surveyor's Forum: {The} File Assignment Problem",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "1",
  pages =        "82--82",
  month =        mar,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356901.356906",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:32:05 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Dowdy:1982:CMF,Kollias:1983:SFF}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sharma:1983:SFI,
  author =       "Govind Sharma",
  title =        "Surveyor's Forum: {Image} Models",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "1",
  pages =        "83--84",
  month =        mar,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356901.356907",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:32:05 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Ahuja:1981:IM,Ahuja:1983:SFI}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ahuja:1983:SFI,
  author =       "Narendra Ahuja and B. J. Schachter",
  title =        "Surveyor's Forum: {Image} Models",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "1",
  pages =        "84--84",
  month =        mar,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356901.356908",
  ISSN =         "0010-4892",
  bibdate =      "Thu Jun 19 09:32:05 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Ahuja:1981:IM,Sharma:1983:SFI}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

%%% ====================================================================
%%% NB: The ISSN changed from 0010-4892 to 0360-0300 at the June 1983
%%% issue, for no obvious reason: the journal title is exactly the same.
%%% ====================================================================
@Article{Wasserman:1983:AILb,
  author =       "Anthony I. Wasserman",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "2",
  pages =        "85--86",
  month =        jun,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356909.356910",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1983:EP,
  author =       "Anthony I. Wasserman",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "2",
  pages =        "87--94",
  month =        jun,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356909.356911",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Broomell:1983:CCH,
  author =       "George Broomell and J. Robert Heath",
  title =        "Classification Categories and Historical Development
                 of Circuit Switching Topologies",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "2",
  pages =        "95--133",
  month =        jun,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356909.356912",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:27 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1983.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A broad tutorial survey is given of the various
                 topologies available for use in circuit switching
                 systems for tightly coupled parallel\slash distributed
                 computer systems. Terminology and issues of circuit
                 switching as related to parallel\slash distributed
                 processing are first discussed. Circuit switching
                 networks are then classified according to connection
                 capability, topological geometry, and basis of
                 development. Topological relationships of specific
                 networks are addressed.",
  acknowledgement = ack-nhfb,
  classification = "722; 723",
  country =      "USA",
  date =         "01/11/83",
  descriptors =  "Switching; circuit switching; survey",
  enum =         "416",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer systems, digital",
  language =     "English",
  references =   "0",
}

@Article{Voydock:1983:SMH,
  author =       "Victor L. Voydock and Stephen T. Kent",
  title =        "Security Mechanisms in High-Level Network Protocols",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "2",
  pages =        "135--171",
  month =        jun,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356909.356913",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:27 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The implications of adding security mechanisms to
                 high-level network protocols operating in an
                 open-system environment are analyzed. First the threats
                 to security that may arise in such an environment are
                 described, and then a set of goals for communications
                 security measures is established. This is followed by a
                 brief description of the two basic approaches to
                 communications security, link-oriented measures and
                 end-to-end measures, which concludes that end-to-end
                 measures are more appropriate in an open-system
                 environment. Next, relevant properties of data
                 encryption --- the fundamental technique on which all
                 communications security mechanisms are based --- are
                 discussed. The remainder of the paper describes how
                 end-to-end measures can be used to achieve each of the
                 security goals previously established.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "security os networks, computer networks",
}

@Article{Wasserman:1983:AILc,
  author =       "Anthony I. Wasserman",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "3",
  pages =        "173--174",
  month =        sep,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356914.356915",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:37 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Abadir:1983:FTS,
  author =       "Magdy S. Abadir and Hassan K. Reghbati",
  title =        "Functional Testing of Semiconductor Random Access
                 Memories",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "3",
  pages =        "175--198",
  month =        sep,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356914.356916",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:37 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "An overview is presented of the problem of testing
                 semiconductor random access memories (RAMs). An
                 important aspect of this test procedure is the
                 detection of permanent faults that cause the memory to
                 function incorrectly. Functional-level fault models are
                 very useful for describing a wide variety of RAM
                 faults. Several fault models are discussed, including
                 the stuck-at-0/1 faults, coupled-cell faults, and
                 single-cell pattern-sensitive faults. Test procedures
                 for these fault models are presented and their fault
                 coverage and execution times are discussed. The paper
                 is intended for the general computer science audience
                 and presupposes no background in the hardware testing
                 area.",
  acknowledgement = ack-nhfb,
  classification = "714; 721; 722",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data storage, digital --- Random Access; data storage,
                 semiconductor",
}

@Article{Partsch:1983:PTS,
  author =       "H. Partsch and R. Steinbr{\"u}ggen",
  title =        "Program Transformation Systems",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "3",
  pages =        "199--236",
  month =        sep,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356914.356917",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:37 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/Dcs-1.0.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This paper reviews and classifies transformation
                 systems and is intended to acquaint the reader with the
                 current state of the art and provide a basis for
                 comparing the different approaches. It is also designed
                 to provide easy access to specific details of the
                 various methodologies.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming",
}

@Article{Angluin:1983:IIT,
  author =       "Dana Angluin and Carl H. Smith",
  title =        "Inductive Inference: {Theory} and Methods",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "3",
  pages =        "237--269",
  month =        sep,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356914.356918",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:37 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "There has been a great deal of theoretical and
                 experimental work in computer science on inductive
                 inference systems, that is, systems that try to infer
                 general rules from examples. However a complete and
                 applicable theory of such systems is still a distant
                 goal. This survey highlights and explains the main
                 ideas that have been developed in the study of
                 inductive inference, with special emphasis on the
                 relations between the general theory and the specific
                 algorithms and implementations.",
  acknowledgement = ack-nhfb,
  classification = "723; 912",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "systems science and cybernetics",
}

@Article{Lientz:1983:ISM,
  author =       "Bennet P. Lientz",
  title =        "Issues in Software Maintenance",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "3",
  pages =        "271--278",
  month =        sep,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356914.356919",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:37 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Some of the major issues that surfaced during several
                 extensive operational software studies are highlighted.
                 These studies have raised significant questions about
                 the roles of the users in operations and maintenance,
                 the management of maintenance, and the kinds of tools
                 and techniques that are needed for maintenance.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer software",
}

@Article{Wulf:1983:SFR,
  author =       "William A. Wulf and Joe Newcomer and Bruce Leverett
                 and Rick Cattell and Paul Knueven",
  title =        "Surveyor's Forum: {Retargetable} Code Generators",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "3",
  pages =        "279--280",
  month =        sep,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356914.356920",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:37 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  note =         "See
                 \cite{Ganapathi:1982:RCC,Ganapathi:1983:SFRa,Fraser:1983:SFR,Ganapathi:1983:SFRb}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ganapathi:1983:SFRa,
  author =       "M. Ganapathi and J. L. Hennessy and C. N. Fischer",
  title =        "Surveyor's Forum: {Retargetable} Code Generators",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "3",
  pages =        "280--281",
  month =        sep,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356914.356921",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:37 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  note =         "See
                 \cite{Ganapathi:1982:RCC,Wulf:1983:SFR,Fraser:1983:SFR,Ganapathi:1983:SFRb}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fraser:1983:SFR,
  author =       "Christopher W. Fraser",
  title =        "Surveyor's Forum: {Retargetable} Code Generators",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "3",
  pages =        "281--283",
  month =        sep,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356914.356922",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:37 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  note =         "See
                 \cite{Ganapathi:1982:RCC,Wulf:1983:SFR,Ganapathi:1983:SFRa,Ganapathi:1983:SFRb}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ganapathi:1983:SFRb,
  author =       "M. Ganapathi and J. L. Hennessy and C. N. Fischer",
  title =        "Surveyor's Forum: {Retargetable} Code Generators",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "3",
  pages =        "283--284",
  month =        sep,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356914.356923",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:37 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  note =         "See
                 \cite{Ganapathi:1982:RCC,Wulf:1983:SFR,Ganapathi:1983:SFRa,Fraser:1983:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1983:AILd,
  author =       "Anthony I. Wasserman",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "4",
  pages =        "285--286",
  month =        dec,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289.357839",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:07 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Haerder:1983:PTO,
  author =       "Theo Haerder and Andreas Reuter",
  title =        "Principles of Transaction Oriented Database Recovery",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "4",
  pages =        "287--317",
  month =        dec,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289.291",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:07 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Also published in/as: Res. R No. 50-82, April 1982.
                 Reprinted in M. Stonebraker, Readings in Database
                 Systems, Morgan Kaufmann, San Mateo, CA, 1988",
  abstract =     "A terminological framework is provided for describing
                 different transaction-oriented recovery schemes for
                 database systems in a conceptual rather than an
                 implementation-dependent way. By introducing the terms
                 materialized database, propagation strategy, and
                 checkpoint, we obtain a means for classifying arbitrary
                 implementations from a unified viewpoint. This is
                 complemented by a classification scheme for logging
                 techniques, which are precisely defined by using the
                 other terms. It is shown that these criteria are
                 related to all relevant questions such as speed and
                 scope of recovery and amount of redundant information
                 required. In addition, an adequate and precise
                 terminology is established for this topic.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "database systems, dblit transactions recovery
                 reliability",
}

@Article{King:1983:CVD,
  author =       "John Leslie King",
  title =        "Centralized versus decentralized
                 computing:organizational considerations and management
                 options",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "4",
  pages =        "319--349",
  month =        dec,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289.290",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:07 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/misc.1.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The long-standing debate over whether to centralize or
                 decentralize computing is examined in terms of the
                 fundamental organizational and economic factors at
                 stake. The traditional debate is evaluated, and found
                 to focus predominantly on issues of efficiency versus
                 effectiveness, with solutions based on a rationalistic
                 strategy of optimizing in this trade-off. A behavioral
                 assessment suggests that the driving issues in the
                 debate are the politics of organization and resources,
                 centering on the issue of control. The economics of
                 computing deployment decisions are presented as an
                 important issue, but one that often serves as a field
                 of argument in which political concerns are dealt with.
                 The debate in this light appears to be unresolvable in
                 the long run, although effective strategies can be
                 developed when the larger issues are recognized. The
                 current situation facing managers of computing, given
                 the advent of small and comparatively inexpensive
                 computers, is examined in detail, and a set of
                 management options for dealing with this persistent
                 issue is presented.",
  acknowledgement = ack-nhfb,
  classification = "722; 723; 912",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computers, digital; management",
}

@Article{Lee:1983:VRS,
  author =       "D. L. Lee and F. H. Lochovsky",
  title =        "Voice Response Systems",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "4",
  pages =        "351--374",
  month =        dec,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289.292",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:07 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Common techniques for representing speech in voice
                 response systems are surveyed. Two major classes of
                 techniques --- waveform coding and parametric coding
                 --- and their variants are presented. The encoding,
                 decoding, and synthesis techniques as well as the
                 advantages and disadvantages of each method are
                 discussed. Also surveyed are two types of voice
                 response systems: systems with limited vocabulary and
                 systems with unlimited vocabulary. Some examples of the
                 latter type of system are described and discussed.
                 Finally, some applications of voice response systems
                 are discussed.",
  acknowledgement = ack-nhfb,
  classification = "751",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; theory, speech",
  review =       "ACM CR 8411-0897",
  subject =      "B.4.2 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Input/Output Devices, Voice \\ I.5 Computing
                 Methodologies, PATTERN RECOGNITION, Applications",
}

@Article{Atkins:1983:SFN,
  author =       "M. Stella Atkins",
  title =        "Surveyor's Forum: Notations for Concurrent
                 Programming",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "4",
  pages =        "375--376",
  month =        dec,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289.357841",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:07 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Andrews:1983:CNC,Andrews:1983:SFN,Andrews:1983:CCN}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Andrews:1983:SFN,
  author =       "Gregory R. Andrews and Fred B. Schneider",
  title =        "Surveyor's Forum: Notations for Concurrent
                 Programming",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "4",
  pages =        "376--377",
  month =        dec,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289.357842",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:07 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Andrews:1983:CNC,Atkins:1983:SFN,Andrews:1983:CCN}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Andrews:1983:CCN,
  author =       "Gregory R. Andrews and Fred B. Schneider",
  title =        "Corrigenda: {``Concepts and notations for concurrent
                 programs''}",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "4",
  pages =        "377--377",
  month =        dec,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289.357845",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:07 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Andrews:1983:CNC,Atkins:1983:SFN,Andrews:1983:SFN}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1984:AILa,
  author =       "Anthony I. Wasserman",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/861.360084",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:31 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Stallings:1984:LN,
  author =       "William Stallings",
  title =        "Local Networks",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "1",
  pages =        "3--41",
  month =        mar,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/861.871",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:31 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/networking.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The rapidly evolving field of local network technology
                 has produced a steady stream of local network products
                 in recent years. The IEEE 802 standards that are now
                 taking shape, because of their complexity, do little to
                 narrow the range of alternative technical approaches
                 and at the same time encourage more vendors into the
                 field. The purpose of this paper is to present a
                 systematic, organized overview of the alternative
                 architectures for and design approaches to local
                 networks.\par

                 The key elements that determine the cost and
                 performance of a local network are its topology,
                 transmission medium, and medium access control
                 protocol. Transmission media include twisted pair,
                 baseband and broadband coaxial cable, and optical
                 fiber. Topologies include bus, tree, and ring. Medium
                 access control protocols include CSMA/CD, token bus,
                 token ring, register insertion, and slotted ring. Each
                 of these areas is examined in detail, comparisons are
                 drawn between competing technologies, and the current
                 status of standards is reported.",
  acknowledgement = ack-nhfb,
  classification = "723; 902",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer networks; standards",
}

@Article{Kurose:1984:MAP,
  author =       "James F. Kurose and Mischa Schwartz and Yechiam
                 Yemini",
  title =        "Multiple-Access Protocols and Time-Con\-strained
                 Communication",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "1",
  pages =        "43--70",
  month =        mar,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/861.870",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:31 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/networking.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "During the past ten years, the field of
                 multiple-access communication has developed into a
                 major area of both practical and theoretical interest
                 within the field of computer communications. The
                 multiple-access problem arises from the necessity of
                 sharing a single communication channel among a
                 community of distributed users. The distributed
                 algorithm used by the stations to share the channel is
                 known as the multiple-access protocol. In this paper we
                 examine the multiple-access problem and various
                 approaches to its resolution.\par

                 In this survey we first define the multiple-access
                 problem and then present the underlying issues and
                 difficulties in achieving multiple-access
                 communication. A taxonomy for multiple-access protocols
                 is then developed in order to characterize common
                 approaches and to provide a framework within which
                 these protocols can be compared and contrasted.
                 Different proposed protocols are then described and
                 discussed, and aspects of their performance are
                 examined. The use of multiple-access protocols for
                 'real- time' or 'time-constrained' communication
                 applications, such as voice transmission, is examined
                 next. Issues in time-constrained communication are
                 identified, and recent work in the design of
                 time-constrained multiple-access protocols is
                 surveyed.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer networks; multiple-access protocols;
                 real-time communication; time-constrained
                 communication, time-constrained",
}

@Article{Kim:1984:HAS,
  author =       "Won Kim",
  title =        "Highly Available Systems for Database Applications",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "1",
  pages =        "71--98",
  month =        mar,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/861.866",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:31 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "As users entrust more and more of their applications
                 to computer systems, the need for systems that are
                 continuously operational (24 hours per day) has become
                 even greater. This paper presents a survey and analysis
                 of representative architectures and techniques that
                 have been developed for constructing highly available
                 systems for database applications. It then proposes a
                 design of a distributed software subsystem that can
                 serve as a unified framework for constructing database
                 application systems that meet various requirements for
                 high availability.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "concurrency control; database recovery; database
                 systems; relational database",
}

@Article{Wasserman:1984:AILb,
  author =       "Anthony I. Wasserman",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "2",
  pages =        "99--100",
  month =        jun,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356924.356925",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1984:AAa,
  author =       "Anthony I. Wasserman",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "2",
  pages =        "101--102",
  month =        jun,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356924.356926",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1984:EP,
  author =       "Anthony I. Wasserman",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "2",
  pages =        "103--110",
  month =        jun,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356924.356927",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jarke:1984:QOD,
  author =       "Matthias Jarke and J{\"u}rgen Koch",
  title =        "Query Optimization in Database Systems",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "2",
  publisher =    "acm",
  pages =        "111--152",
  month =        jun,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356924.356928",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:52 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Efficient methods of processing unanticipated queries
                 are a crucial prerequisite for the success of
                 generalized database management systems. A wide variety
                 of approaches to improve the performance of query
                 evaluation algorithms have been proposed: logic-based
                 and semantic transformations, fast implementations of
                 basic operations, and combinatorial or heuristic
                 algorithms for generating alternative access plans and
                 choosing among them.\par

                 These methods are presented in the framework of a
                 general query evaluation procedure using the relational
                 calculus representation of queries. In addition,
                 nonstandard query optimization issues such as higher
                 level query evaluation, query optimization in
                 distributed databases, and use of database machines are
                 addressed. The focus, however, is on query optimization
                 in centralized database systems.",
  acknowledgement = ack-nhfb,
  affiliation =  "New York Univ, Graduate Sch of Business
                 Administration, New York, NY, USA",
  affiliationaddress = "New York Univ, Graduate Sch of Business
                 Administration, New York, NY, USA",
  annote =       "Representation, transformation, mapping to elementary
                 operations, choice.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Algorithms; database implementation; performance;
                 query evaluation; query optimization; query
                 simplification, database systems; relational
                 calculation",
  owner =        "manning",
}

@Article{Gallaire:1984:LDD,
  author =       "Herv{\'e} Gallaire and Jack Minker and Jean-Marie
                 Nicolas",
  title =        "Logic and Databases: a Deductive Approach",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "2",
  pages =        "153--185",
  month =        jun,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356924.356929",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:52 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The purpose of this paper is to show that logic
                 provides a convenient formalism for studying classical
                 database problems. There are two main parts to the
                 paper, devoted respectively to conventional databases
                 and deductive databases. In the first part, we focus on
                 query languages, integrity modeling and maintenance,
                 query optimization, and data dependencies. The second
                 part deals mainly with the representation and
                 manipulation of deduced facts and incomplete
                 information.",
  acknowledgement = ack-nhfb,
  affiliation =  "Compagnie Generale d'{\'E}lectricit{\'e}, Lab de
                 Marcoussis, Marcoussis, Fr",
  affiliationaddress = "Compagnie Generale d'{\'E}lectricit{\'e}, Lab de
                 Marcoussis, Marcoussis, Fr",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer metatheory --- Formal Logic; Deductive
                 Databases; deductive databases; Indefinite Data;
                 indefinite data; Logic and Databases; Null Values;
                 relational databases; Relational Databases, database
                 systems",
  owner =        "curtis",
}

@Article{Samet:1984:QRH,
  author =       "Hanan Samet",
  title =        "The Quadtree and Related Hierarchical Data
                 Structures",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "2",
  pages =        "187--260",
  month =        jun,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356924.356930",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:33:52 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A tutorial survey is presented of the quadtree and
                 related hierarchical data structures. They are based on
                 the principle of recursive decomposition. The emphasis
                 is on the representation of data used in applications
                 in image processing, computer graphics, geographic
                 information systems, and robotics. There is a greater
                 emphasis on region data (i.e., two-dimensional shapes)
                 and to a lesser extent on point, curvilinear, and
                 three-dimensional data. A number of operations in which
                 such data structures find use are examined in greater
                 detail.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Maryland, at College Point, Computer Science
                 Dep, College Park, MD, USA",
  affiliationaddress = "Univ of Maryland, at College Point, Computer
                 Science Dep, College Park, MD, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer graphics; Data Structures; database systems;
                 geographic information systems; hierarchical data
                 structures; I35 Quadtrees, data processing; image
                 databases; image processing; pattern recognition;
                 quadtree; robotics",
}

@Article{Wasserman:1984:ATIc,
  author =       "Anthony I. Wasserman",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "3",
  pages =        "261--262",
  month =        sep,
  year =         "1984",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 24 23:14:56 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1984:AAb,
  author =       "Anthony I. Wasserman",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "3",
  pages =        "263--264",
  month =        sep,
  year =         "1984",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 24 23:21:25 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shneiderman:1984:RTD,
  author =       "Ben Shneiderman",
  title =        "Response Time and Display Rate in Human Performance
                 with Computers",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "3",
  pages =        "265--285",
  month =        sep,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2514.2517",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:34:24 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This paper reviews the theory and reports on
                 experimental results concerning display rates, response
                 time expectations and attitudes, user productivity, and
                 variability. The decomposition of concerns and tasks
                 helps to clarify the issues, but substantial effort
                 remains before a predictive model can emerge. In
                 general, the results indicate that frequent users
                 prefer response times of less than a second for most
                 tasks, and that productivity does increase as response
                 time decreases. However, error rates increase with too
                 short or too long a response time. Users pick up the
                 pace of the system, but the profile of commands may
                 change with the speed of the system.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Maryland, Dep of Computer Science, College
                 Park, MD, USA",
  affiliationaddress = "Univ of Maryland, Dep of Computer Science,
                 College Park, MD, USA",
  classification = "461; 722; 723; 901",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer interfaces; computer programming; computer
                 systems, digital --- Interactive Operation; display
                 rate; human engineering; human/computer interaction;
                 response time",
}

@Article{Bitton:1984:TPS,
  author =       "Dina Bitton and David J. DeWitt and David K. Hsiao and
                 Jaishankar Menon",
  title =        "A Taxonomy of Parallel Sorting",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "3",
  pages =        "287--318",
  month =        sep,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2514.2516",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:34:24 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The authors propose a taxonomy of parallel sorting
                 that encompasses a broad range of array-and
                 file-sorting algorithms. They analyze how research on
                 parallel sorting has evolved, from the earliest sorting
                 networks to shared memory algorithms and VLSI sorters.
                 In the context of sorting networks, the authors
                 describe two fundamental parallel merging schemes: the
                 odd-even and the bitonic merge. They discuss sorting
                 algorithms that evolved from these merging schemes for
                 parallel computers, whose processors communicate
                 through interconnection networks such as the perfect
                 shuffle, the mesh, and a number of other sparse
                 networks. They describe how faster algorithms have been
                 derived from parallel enumeration sorting schemes,
                 where, with a shared memory model of parallel
                 computation, keys are first ranked and then rearranged
                 according to their rank. Parallel sorting algorithms
                 are evaluated according to several criteria related to
                 both the time complexity of an algorithm and its
                 feasibility from the viewpoint of computer
                 architecture.",
  acknowledgement = ack-nhfb,
  affiliation =  "Weizmann Inst of Science, Dep of Applied Mathematics,
                 Rehovot, Isr",
  affiliationaddress = "Weizmann Inst of Science, Dep of Applied
                 Mathematics, Rehovot, Isr",
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "bitonic merge sorting, prll; computer systems
                 programming; computer systems, digital --- Parallel
                 Processing; odd-even sorting; parallel sorting;
                 Sorting; sorting",
}

@Article{Quinn:1984:PGA,
  author =       "Michael J. Quinn and Narsingh Deo",
  title =        "Parallel Graph Algorithms",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "3",
  pages =        "319--348",
  month =        sep,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2514.2515",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:34:24 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Algorithms and data structures developed to solve
                 graph problems on parallel computers are surveyed. The
                 problems discussed relate to searching graphs and
                 finding connected components, maximal cliques, maximum
                 cardinality matchings, minimum spanning trees, shortest
                 paths, and traveling salesman tours. The algorithms are
                 based on a number of models of parallel computation,
                 including systolic arrays, associative processors,
                 array processors, and multiple CPU computers. The most
                 popular model is a direct extension of the standard RAM
                 model of sequential computation. It may not, however,
                 be the best basis for the study of parallel algorithms.
                 More emphasis has been focused recently on
                 communications issues in the analysis of the complexity
                 of parallel algorithms; thus parallel models are coming
                 to be more complementary to implementable
                 architectures. Most algorithms use relatively simple
                 data structures, such as the adjacency matrix and
                 adjacency lists, although a few algorithms using linked
                 lists, heaps, and trees are also discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "Washington State Univ, Computer Science Dep, Pullman,
                 WA, USA",
  affiliationaddress = "Washington State Univ, Computer Science Dep,
                 Pullman, WA, USA",
  classification = "722; 723; 921",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Algorithms; computer programming; computer systems,
                 digital --- Parallel Processing; mathematical
                 techniques --- Graph Theory; parallel graph
                 algorithms",
}

@Article{Wasserman:1984:ATId,
  author =       "Anthony I. Wasserman",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "4",
  pages =        "349--350",
  month =        dec,
  year =         "1984",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 24 23:21:25 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1984:AAc,
  author =       "Anthony I. Wasserman",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "4",
  pages =        "351--351",
  month =        dec,
  year =         "1984",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 24 23:21:25 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Svobodova:1984:FSN,
  author =       "Liba Svobodova",
  title =        "File Servers for Network-Based Distributed Systems",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "4",
  pages =        "353--398",
  month =        dec,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3872.3873",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:34:36 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A file server provides remote centralized storage of
                 data to workstations connected to it via a
                 communication network; it facilitates data sharing
                 among autonomous workstations and support of
                 inexpensive workstations that have limited or no
                 secondary storage. Various characteristics of file
                 servers and the corresponding implementation issues
                 based on a survey of a number of experimental file
                 servers are discussed and evaluated in this paper.
                 Particular emphasis is placed on the problem of atomic
                 update of data stored in a file server. The design
                 issues related to the scope of atomic transactions and
                 the granularity of data access supported by a file
                 server are studied in detail.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Zurich Research Lab, Rueschlikon, Switz",
  affiliationaddress = "IBM, Zurich Research Lab, Rueschlikon, Switz",
  annote =       "Mainly WFS (Woodstock), XDFS, CFS (Cambridge), FELIX,
                 SWALLOW, CMCFS, ALPINE; also Datacomputer, IFS, ACORN,
                 Z-ring (Zurich), VICE (CMU-ITC), LOCUS, DOMAIN
                 (Apollo), F-UNIX, R*, ENCOMPASS.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer operating systems; computer systems, digital
                 --- Distributed; design; file servers; network-based
                 distributed systems; reliability, computer networks",
  review =       "ACM CR 8601-0037",
  subject =      "C.2.2 Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
                 Protocol architecture \\ D.4.1 Software, OPERATING
                 SYSTEMS, Process Management, Concurrency \\ D.4.1
                 Software, OPERATING SYSTEMS, Process Management,
                 Deadlocks \\ D.4.2 Software, OPERATING SYSTEMS, Storage
                 Management, Allocation/deallocation strategies \\ D.4.3
                 Software, OPERATING SYSTEMS, File Systems Management,
                 Distributed file systems \\ D.4.3 Software, OPERATING
                 SYSTEMS, File Systems Management, File organization",
}

@Article{Yu:1984:DQP,
  author =       "C. T. Yu and C. C. Chang",
  title =        "Distributed Query Processing",
  journal =      j-COMP-SURV,
  volume =       "16",
  number =       "4",
  pages =        "399--433",
  month =        dec,
  year =         "1984",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3872.3874",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:34:36 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Various techniques for optimizing queries in
                 distributed databases are presented. Although no
                 attempt is made to cover all proposed algorithms on
                 this topic, quite a few ideas extracted from existing
                 algorithms are outlined. It is hoped that large-scale
                 experiments will be conducted to verify the usefulness
                 of these ideas and that they will be integrated to
                 construct a powerful algorithm for distributed query
                 processing.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Illinois at Chicago Circle, Dep of Electrical
                 Engineering \& Computer Science, Chicago, IL, USA",
  affiliationaddress = "Univ of Illinois at Chicago Circle, Dep of
                 Electrical Engineering \& Computer Science, Chicago,
                 IL, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming --- Algorithms; CTYU
                 optimization, database systems; Distributed;
                 distributed query processing; heuristic algorithms;
                 query optimization; semijoins",
}

@Article{Wasserman:1985:ATIa,
  author =       "Anthony I. Wasserman",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1985",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 24 23:25:27 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1985:AAa,
  author =       "Anthony I. Wasserman",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "1",
  pages =        "3--4",
  month =        mar,
  year =         "1985",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 24 23:25:27 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gupta:1985:RRD,
  author =       "Gopal K. Gupta and Ron Sacks-Davis and Peter E.
                 Tischer",
  title =        "A Review of Recent Developments in Solving {ODEs}",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "1",
  pages =        "5--47",
  month =        mar,
  year =         "1985",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/4078.4079",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:34:46 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/4079.html",
  abstract =     "Mathematical models when simulating the behavior of
                 physical, chemical, and biological systems often
                 include one or more ordinary differential equations
                 (ODEs). To study the system behavior predicted by a
                 model, these equations are usually solved numerically.
                 Although many of the current methods for solving ODEs
                 were developed around the turn of the century, the past
                 15 years or so has been a period of intensive research.
                 The emphasis of this survey is on the methods and
                 techniques used in software for solving ODEs. ODEs can
                 be classified as stiff or nonstiff, and may be stiff
                 for some parts of an interval and nonstiff for others.
                 We discuss stiff equations, why they are difficult to
                 solve, and methods and software for solving both
                 nonstiff and stiff equations. We conclude this review
                 by looking at techniques for dealing with special
                 problems that may arise in some ODEs, for example,
                 discontinuities. Although important theoretical
                 developments have also taken place, we report only
                 those developments which have directly affected the
                 software and provide a review of this research. We
                 present the basic concepts involved but assume that the
                 reader has some background in numerical computing, such
                 as a first course in numerical methods.",
  acknowledgement = ack-nhfb,
  affiliation =  "Monash Univ, Dep of Computer Science, Clayton, Aust",
  affiliationaddress = "Monash Univ, Dep of Computer Science, Clayton,
                 Aust",
  classification = "723; 921",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer software; Differential Equations;
                 mathematical software, algorithms; mathematical
                 techniques; numerical methods; ordinary differential
                 equations; performance; theory",
  subject =      "{\bf G.1.7}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, Ordinary Differential Equations. {\bf G.4}:
                 Mathematics of Computing, MATHEMATICAL SOFTWARE.",
}

@Article{Faloutsos:1985:AMT,
  author =       "Christos Faloutsos",
  title =        "Access Methods for Text",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "1",
  pages =        "49--74",
  month =        mar,
  year =         "1985",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/4078.4080",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:34:46 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Also published in/as: ``{Multiattribute} Hashing Using
                 Gray Codes'', ACM SIGMOD, 1986.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/4080.html",
  abstract =     "This paper compares text retrieval methods intended
                 for office systems. The operational requirements of the
                 office environment are discussed, and retrieval methods
                 from database systems and from information retrieval
                 systems are examined. We classify these methods and
                 examine the most interesting representatives of each
                 class. Attempts to speed up retrieval with special
                 purpose hardware are also presented, and issues such as
                 approximate string matching and compression are
                 discussed. A qualitative comparison of the examined
                 methods is presented. The signature file method is
                 discussed in more detail.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Toronto, Computer Systems Research Inst,
                 Toronto, Ont, Can",
  affiliationaddress = "Univ of Toronto, Computer Systems Research Inst,
                 Toronto, Ont, Can",
  annote =       "Signature files.",
  classification = "723; 901",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "database systems; design, information science;
                 document retrieval; Information Retrieval; office
                 automation; text retrieval",
  review =       "ACM CR 8601-0058",
  subject =      "{\bf H.3.3}: Information Systems, INFORMATION STORAGE
                 AND RETRIEVAL, Information Search and Retrieval. {\bf
                 H.2.2}: Information Systems, DATABASE MANAGEMENT,
                 Physical Design, Access methods. {\bf H.3.6}:
                 Information Systems, INFORMATION STORAGE AND RETRIEVAL,
                 Library Automation. {\bf H.4.1}: Information Systems,
                 INFORMATION SYSTEMS APPLICATIONS, Office Automation.
                 {\bf I.7.m}: Computing Methodologies, TEXT PROCESSING,
                 Miscellaneous.",
}

@Article{Besl:1985:TDO,
  author =       "Paul J. Besl and Ramesh C. Jain",
  title =        "Three-Dimensional Object Recognition",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "1",
  pages =        "75--145",
  month =        mar,
  year =         "1985",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/4078.4081",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:34:46 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/Reverse.eng.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/4081.html",
  abstract =     "A general purpose computer vision system must be
                 capable of recognizing three-dimensional (3-D) objects.
                 This paper proposes a precise definition of the 3-D
                 object recognition problem, discusses basic concepts
                 associated with this problem, and reviews the relevant
                 literature. Because range images (or depth maps) are
                 often used as sensor input instead of intensity images,
                 techniques for obtaining, processing, and
                 characterizing range data are also surveyed.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Michigan, Dep of Electrical Engineering \&
                 Computer Science, Ann Arbor, MI, USA",
  affiliationaddress = "Univ of Michigan, Dep of Electrical Engineering
                 \& Computer Science, Ann Arbor, MI, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; computer vision; design; image processing;
                 scene analysis; theory, pattern recognition;
                 three-dimensional object recognition",
  subject =      "{\bf I.5.4}: Computing Methodologies, PATTERN
                 RECOGNITION, Applications, Computer vision. {\bf
                 I.2.10}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Vision and Scene Understanding,
                 Intensity, color, photometry, and thresholding. {\bf
                 I.2.10}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Vision and Scene Understanding, Modeling
                 and recovery of physical attributes. {\bf I.2.10}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Vision and Scene Understanding, Perceptual reasoning.
                 {\bf I.2.10}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Vision and Scene Understanding,
                 Representations, data structures, and transforms. {\bf
                 I.3.5}: Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling, Curve,
                 surface, solid, and object representations. {\bf
                 I.4.6}: Computing Methodologies, IMAGE PROCESSING,
                 Segmentation, Edge and feature detection. {\bf I.4.6}:
                 Computing Methodologies, IMAGE PROCESSING,
                 Segmentation, Pixel classification. {\bf I.4.6}:
                 Computing Methodologies, IMAGE PROCESSING,
                 Segmentation, Region growing, partitioning. {\bf
                 I.4.8}: Computing Methodologies, IMAGE PROCESSING,
                 Scene Analysis, Depth cues. {\bf I.4.8}: Computing
                 Methodologies, IMAGE PROCESSING, Scene Analysis, Range
                 data.",
}

@Article{Abbott:1985:GEI,
  author =       "Curtis Abbott",
  title =        "{Guest Editor}'s Introduction to the Special Issue on
                 Computer Music",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "2",
  pages =        "147--151",
  month =        jun,
  year =         "1985",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 24 23:25:27 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1985:AAb,
  author =       "Anthony I. Wasserman",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "2",
  pages =        "153--154",
  month =        jun,
  year =         "1985",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 24 23:25:27 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1985:EP,
  author =       "Anthony I. Wasserman",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "2",
  pages =        "155--162",
  month =        jun,
  year =         "1985",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 24 23:25:27 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Roads:1985:RMA,
  author =       "Curtis Roads",
  title =        "Research in Music and Artificial Intelligence",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "2",
  pages =        "163--190",
  month =        jun,
  year =         "1985",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/4468.4469",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:35:05 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/4469.html",
  abstract =     "Although the boundaries of artificial intelligence
                 (AI) remain elusive, computers can now perform musical
                 tasks that were formerly associated exclusively with
                 naturally intelligent musicians. After a historical
                 note, this paper sermonizes on the need for AI
                 techniques in four areas of musical research:
                 composition, performance, music theory, and digital
                 sound processing. The next part surveys recent work
                 involving AI and music. The discussion concentrates on
                 applications in the four areas of research just
                 mentioned. The final part examines how AI techniques of
                 planning and learning could be used to expand the
                 knowledge base and enrich the behavior of musically
                 intelligent systems.",
  acknowledgement = ack-nhfb,
  affiliation =  "MIT, Cambridge, MA, USA",
  affiliationaddress = "MIT, Cambridge, MA, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer music; computers, digital --- Applications;
                 design; experimentation, artificial intelligence",
  subject =      "{\bf J.5}: Computer Applications, ARTS AND HUMANITIES,
                 Music. {\bf I.2.1}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Applications and Expert Systems.",
}

@Article{Gordon:1985:SAC,
  author =       "John W. Gordon",
  title =        "System Architectures for Computer Music",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "2",
  pages =        "191--233",
  month =        jun,
  year =         "1985",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/4468.4996",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:35:05 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/4996.html",
  abstract =     "Computer music is a relatively new field. While a
                 large proportion of the public is aware of computer
                 music in one form or another, there seems to be a need
                 for a better understanding of its capabilities and
                 limitations in terms of synthesis, performance, and
                 recording hardware. This article addresses that need by
                 surveying and discussing the architecture of existing
                 computer music systems. System requirements vary
                 according to what the system will be used for. Common
                 uses for computer music systems include composition,
                 performance, research, home entertainment, and studio
                 recording/mixing. This paper outlines system components
                 with this wide diversity of possible uses in mind.
                 Current synthesis and analysis techniques, and the
                 different way in which these techniques can be
                 implemented in special-purpose hardware, are
                 comprehensively reviewed. Design specifications are
                 given for certain digital-to-analog (and
                 analog-to-digital) converters, disk interfaces, system
                 organization, control hardware and software, and
                 numerical precision. Several synthesis systems are
                 described in detail, with an emphasis on theoretical
                 developments and innovative design. Commercial
                 synthesizers and other architectures are also briefly
                 mentioned.",
  acknowledgement = ack-nhfb,
  affiliation =  "Stanford Univ, Dep of Music, Stanford, CA, USA",
  affiliationaddress = "Stanford Univ, Dep of Music, Stanford, CA, USA",
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; computer music; computers, digital ---
                 Applications; design; theory, computer architecture",
  subject =      "{\bf J.5}: Computer Applications, ARTS AND HUMANITIES,
                 Music. {\bf B.0}: Hardware, GENERAL. {\bf C.3}:
                 Computer Systems Organization, SPECIAL-PURPOSE AND
                 APPLICATION-BASED SYSTEMS.",
}

@Article{Loy:1985:PLC,
  author =       "Gareth Loy and Curtis Abbott",
  title =        "Programming Languages for Computer Music Synthesis,
                 Performance, and Composition",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "2",
  pages =        "235--265",
  month =        jun,
  year =         "1985",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/4468.4485",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:35:05 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/4485.html",
  abstract =     "The development of formal, descriptive, and procedural
                 notations has become a practical concern within the
                 field of music now that computers are being applied to
                 musical tasks. Music combines the real-time demands of
                 performance with the intellectual demands of highly
                 developed symbolic systems that are quite different
                 from natural language. The richness and variety of
                 these demands makes the programming language paradigm a
                 natural one in the musical application of computers.
                 This paradigm provides musicians with a fresh
                 perspective on their work. At the same time, music is a
                 very advanced form of human endeavor, making computer
                 music applications a worthy challenge for computer
                 scientists. In this paper we outline the traditional
                 tasks and forms of representation in music, then
                 proceed with a survey of languages that deal with music
                 programming.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California, Computer Audio Research Lab, San
                 Diego, CA, USA",
  affiliationaddress = "Univ of California, Computer Audio Research Lab,
                 San Diego, CA, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer music; computer programming languages;
                 computers, digital --- Applications; music programming
                 languages, languages",
  subject =      "{\bf J.5}: Computer Applications, ARTS AND HUMANITIES,
                 Music. {\bf D.3.2}: Software, PROGRAMMING LANGUAGES,
                 Language Classifications, Data-flow languages. {\bf
                 D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Extensible languages. {\bf D.3.2}:
                 Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Very high-level languages. {\bf
                 D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Nonprocedural languages. {\bf D.3.3}:
                 Software, PROGRAMMING LANGUAGES, Language Constructs
                 and Features, Coroutines.",
}

@Article{Pennycook:1985:CMI,
  author =       "Bruce W. Pennycook",
  title =        "Computer-Music Interfaces: a Survey",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "2",
  pages =        "267--289",
  month =        jun,
  year =         "1985",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/4468.4470",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:35:05 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/4470.html",
  abstract =     "This paper is a study of the unique problems posed by
                 the use of computers by composers and performers of
                 music. The paper begins with a presentation of the
                 basic concepts involved in the musical interaction with
                 computer devices, followed by a detailed discussion of
                 three musical tasks: music manuscript preparation,
                 music language interfaces for composition, and
                 real-time performance interaction. Fundamental design
                 principles are exposed through an examination of
                 several early computer music systems, especially the
                 Structured Sound Synthesis Project. A survey of
                 numerous systems, based on the following categories, is
                 presented: compositions and synthesis languages,
                 graphics score editing, performance instruments,
                 digital audio processing tools, and computer-aided
                 instruction in music systems. An extensive reference
                 list is provided for further study in the field.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; human factors; languages",
  subject =      "{\bf J.5}: Computer Applications, ARTS AND HUMANITIES,
                 Music. {\bf I.3.6}: Computing Methodologies, COMPUTER
                 GRAPHICS, Methodology and Techniques, Interaction
                 techniques.",
}

@Article{Wasserman:1985:ATIb,
  author =       "Anthony I. Wasserman",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "3",
  pages =        "291--292",
  month =        sep,
  year =         "1985",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 24 23:31:36 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1985:AAc,
  author =       "Anthony I. Wasserman",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "3",
  pages =        "293--294",
  month =        sep,
  year =         "1985",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 24 23:31:36 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hester:1985:SOL,
  author =       "James H. Hester and Daniel S. Hirschberg",
  title =        "Self-Organizing Linear Search",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "3",
  pages =        "295--311",
  month =        sep,
  year =         "1985",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/5505.5507",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:35:21 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/5507.html",
  abstract =     "Algorithms that modify the order of linear search
                 lists are surveyed. First the problem, including
                 assumptions and restrictions, is defined. Next a
                 summary of analysis techniques and measurements that
                 apply to these algorithms is given. The main portion of
                 the survey presents algorithms in the literature with
                 absolute analyses when available. The following section
                 gives relative measures that are applied between two or
                 more algorithms. The final section presents open
                 questions.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California, Irvine, Irvine, CA, USA",
  affiliationaddress = "Univ of California, Irvine, Irvine, CA, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Algorithms; computer operating systems --- Storage
                 Allocation; computer programming; measurement;
                 performance; search algorithms, algorithms;
                 self-organizing liner search; theory",
  review =       "ACM CR 8609-0809",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES, Lists. {\bf E.1}:
                 Data, DATA STRUCTURES, Tables. {\bf D.4.2}: Software,
                 OPERATING SYSTEMS, Storage Management, Swapping. {\bf
                 F.2.2}: Theory of Computation, ANALYSIS OF ALGORITHMS
                 AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Sorting and searching. {\bf F.2.3}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Tradeoffs among Complexity Measures.",
}

@Article{Jarke:1985:FCD,
  author =       "Matthias Jarke and Yannis Vassiliou",
  title =        "A Framework for Choosing a Database Query Language",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "3",
  pages =        "313--340",
  month =        sep,
  year =         "1985",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/5505.5506",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:35:21 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/5506.html",
  abstract =     "This paper presents a systematic approach to matching
                 cate- gories of query language interfaces with the
                 requirements of certain user types. The method is based
                 on a trend model of query language development on the
                 dimensions of functional capabilities and query
                 languages, a criterion hierarchy for query language
                 evaluation, a comprehensive classification scheme of
                 query language users and their requirements, and
                 preliminary recommendations for allocating language
                 classes to user types.\par

                 The method integrates the results of existing human
                 factors studies and provides a structured framework for
                 future research in this area. Current and expected
                 developments are exemplified by the description of
                 ``new generation'' database query languages. In a
                 preselecting suitable query language types; the final
                 selection decision will also depend on
                 organization-specific factors, such as the available
                 database management system, hardware and software
                 strategies, and financial system costs.",
  acknowledgement = ack-nhfb,
  affiliation =  "New York Univ, New York, NY, USA",
  affiliationaddress = "New York Univ, New York, NY, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming languages; database systems;
                 human factors; language evaluation; languages; query
                 language; query language interfaces, databases; Query
                 Languages; user classification",
  subject =      "{\bf H.2.3}: Information Systems, DATABASE MANAGEMENT,
                 Languages, Query languages. {\bf D.3.2}: Software,
                 PROGRAMMING LANGUAGES, Language Classifications, Very
                 high-level languages. {\bf H.1.2}: Information Systems,
                 MODELS AND PRINCIPLES, User/Machine Systems, Human
                 factors. {\bf H.3.3}: Information Systems, INFORMATION
                 STORAGE AND RETRIEVAL, Information Search and
                 Retrieval, Query formulation.",
}

@Article{Davidson:1985:CPN,
  author =       "Susan B. Davidson and Hector Garcia-Molina and Dale
                 Skeen",
  title =        "Consistency in Partitioned Networks",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "3",
  pages =        "341--370",
  month =        sep,
  year =         "1985",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/5505.5508",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:35:21 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Also published in/as: University of Pennsylvania, TR
                 No. Management Science, Journal of TIMS-Conference on
                 Information Systems, sponsored by Machine Intelligence,
                 eds: Meltzer, and Michie, vars. Publishers, TIMS, ACM
                 SIGBDP-84-04, Aug. 1984. Also published in/as:
                 Princeton University, TR EECS 320, 1984.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/5508.html",
  abstract =     "Recently, several strategies have been proposed for
                 transaction processing in partitioned distributed
                 database systems with replicated data. These strategies
                 are surveyed in light of the competing goals of
                 maintaining correctness and achieving high
                 availability. Extensions and combinations are then
                 discussed, and guidelines are presented for selecting
                 strategies for particular applications.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Pennsylvania, Philadelphia, PA, USA",
  affiliationaddress = "Univ of Pennsylvania, Philadelphia, PA, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; computer programming --- Algorithms;
                 consistency; Distributed; partitioned networks;
                 performance; reliability, database systems",
  review =       "ACM CR 8809-0690",
  subject =      "{\bf D.4.3}: Software, OPERATING SYSTEMS, File Systems
                 Management, File organization. {\bf C.4}: Computer
                 Systems Organization, PERFORMANCE OF SYSTEMS,
                 Reliability, availability, and serviceability. {\bf
                 H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Transaction processing. {\bf H.2.4}:
                 Information Systems, DATABASE MANAGEMENT, Systems,
                 Distributed systems.",
  xxtitle =      "Consistency in a partitioned network: a survey",
}

@Article{Wasserman:1985:ATIc,
  author =       "Anthony I. Wasserman",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "4",
  pages =        "375--376",
  month =        dec,
  year =         "1985",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 24 23:34:40 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1985:AAd,
  author =       "Anthony I. Wasserman",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "4",
  pages =        "377--378",
  month =        dec,
  year =         "1985",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 24 23:34:40 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Quarterman:1985:EUS,
  author =       "John S. Quarterman and Abraham Silberschatz and James
                 L. Peterson",
  title =        "{4.2BSD} and {4.3BSD} as Examples of the {UNIX}
                 System",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "4",
  pages =        "379--418",
  month =        dec,
  year =         "1985",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/6041.6043",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:35:33 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/6043.html",
  abstract =     "This paper presents an in-depth examination of the 4.2
                 Berkeley Software Distribution, Virtual VAX-11 Version
                 (4.2BSD), which is a version of the UNIX Time-Sharing
                 System. There are notes throughout on 4.3BSD, the
                 forthcoming system from the University of California at
                 Berkeley. We trace the historical development of the
                 UNIX system from its conception in 1969 until today,
                 and describe the design principles that have guided
                 this development. We then present the internal data
                 structures and algorithms used by the kernel to support
                 the user interface. In particular, we describe process
                 management, memory management, the file system, the I/O
                 system, and communications. These are treated in as
                 much detail as the UNIX licenses will allow. We
                 conclude with a brief description of the user interface
                 and a set of bibliographic notes.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Texas, Austin, TX, USA",
  affiliationaddress = "Univ of Texas, Austin, TX, USA",
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "4.2BSD UNIX; 4.3BSD UNIX; computer operating systems;
                 computer systems, digital --- Distributed; distributed
                 operating systems, design; performance; reliability;
                 security; theory",
  review =       "ACM CR 8706-0484",
  subject =      "{\bf D.4.0}: Software, OPERATING SYSTEMS, General,
                 UNIX. {\bf D.4.7}: Software, OPERATING SYSTEMS,
                 Organization and Design, Interactive systems. {\bf
                 K.2}: Computing Milieux, HISTORY OF COMPUTING.",
}

@Article{Tanenbaum:1985:DOS,
  author =       "Andrew S. Tanenbaum and Robbert {van Renesse}",
  title =        "Distributed Operating Systems",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "4",
  pages =        "419--470",
  month =        dec,
  year =         "1985",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/6041.6074",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:35:33 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/Mach.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/6074.html",
  abstract =     "Distributed operating systems have many aspects in
                 common with centralized ones, but they also differ in
                 certain ways. This paper is intended as an introduction
                 to distributed operating systems, and especially to
                 current university research about them. After a
                 discussion of what constitutes a distributed operating
                 system and how it is distinguished from a computer
                 network, various key design issues are discussed. Then
                 several examples of current research projects are
                 examined in some detail, namely, the Cambridge
                 Distributed Computing System, Amoeba, V, and Eden.",
  acknowledgement = ack-nhfb,
  affiliation =  "Vrije Univ, Amsterdam, Neth",
  affiliationaddress = "Vrije Univ, Amsterdam, Neth",
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Amoeba system; Cambridge distributed computing system;
                 computer operating systems; computer systems, digital
                 --- Distributed; design; distributed operating systems;
                 Eden system, algorithms; reliability; Research;
                 security; V system",
  review =       "ACM CR 8612-1093",
  subject =      "{\bf D.4.7}: Software, OPERATING SYSTEMS, Organization
                 and Design, Distributed systems. {\bf D.4.3}: Software,
                 OPERATING SYSTEMS, File Systems Management, Distributed
                 file systems. {\bf D.4.5}: Software, OPERATING SYSTEMS,
                 Reliability, Fault-tolerance. {\bf D.4.6}: Software,
                 OPERATING SYSTEMS, Security and Protection, Access
                 controls. {\bf D.4.0}: Software, OPERATING SYSTEMS,
                 General. {\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Network operating systems.",
}

@Article{Cardelli:1985:UTD,
  author =       "Luca Cardelli and Peter Wegner",
  title =        "On Understanding Types, Data Abstraction, and
                 Polymorphism",
  journal =      j-COMP-SURV,
  volume =       "17",
  number =       "4",
  pages =        "471--522",
  month =        dec,
  year =         "1985",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/6041.6042",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:35:33 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/6042.html",
  abstract =     "Our objective is to understand the notion of type in
                 programming languages, present a model of typed,
                 polymorphic programming languages that reflects recent
                 research in type theory, and examine the relevance of
                 recent research to the design of practical programming
                 languages. Object-oriented languages provide both a
                 framework and a motivation for exploring the
                 interaction among the concepts of type, data
                 abstraction, and polymorphism, since they extend the
                 notion of type to data abstraction and since type
                 inheritance is an important form of polymorphism. We
                 develop a $ \lambda $-calculus-based model for type
                 systems that allows us to explore these interactions in
                 a simple setting, unencumbered by complexities of
                 production programming languages. The evolution of
                 languages from untyped universes to monomorphic and
                 then polymorphic type systems is reviewed. Mechanisms
                 for polymorphism such as overloading, coercion,
                 subtyping, and parameterization are examined. A
                 unifying framework for polymorphic type systems is
                 developed in terms of the typed $ \lambda $-calculus
                 augmented to include binding of types by quantification
                 as well as binding of values by abstraction. The typed
                 $ \lambda $-calculus is augmented by universal
                 quantification to model generic functions with type
                 parameters, existential quantification and packaging
                 (information hiding) to model abstract data types, and
                 bounded quantification to model subtypes and type
                 inheritance. In this way we obtain a simple and precise
                 characterization of a powerful type system that
                 includes abstract data types, parametric polymorphism,
                 and multiple inheritance in a single consistent
                 framework. The mechanisms for type checking for the
                 augmented $ \lambda $-calculus are discussed. The
                 augmented typed $ \lambda $-calculus is used as a
                 programming language for a variety of illustrative
                 examples. We christen this language Fun because fun
                 instead of $ \lambda $ is the functional abstraction
                 keyword and because it is pleasant to deal with. Fun is
                 mathematically simple and can serve as a basis for the
                 design and implementation of real programming languages
                 with type facilities that are more powerful and
                 expressive than those of existing programming
                 languages. In particular, it provides a basis for the
                 design of strongly typed object-oriented languages.",
  acknowledgement = ack-nhfb,
  affiliation =  "AT\&T Bell Lab, Murray Hill, NJ, USA",
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  annote =       "Ada examples, full set of type inference rules.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer metatheory; computer programming languages;
                 data abstraction; lambda-calculus, languages;
                 polymorphism; Theory; theory; type",
  review =       "ACM CR 8703-0173",
  subject =      "{\bf D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Abstract data types. {\bf
                 F.3.3}: Theory of Computation, LOGICS AND MEANINGS OF
                 PROGRAMS, Studies of Program Constructs, Type
                 structure. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Lambda calculus and related systems. {\bf
                 D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Data types and structures.",
}

@Article{Wasserman:1986:ATIa,
  author =       "Anthony I. Wasserman",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1986",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 00:50:39 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1986:AAa,
  author =       "Anthony I. Wasserman",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "1",
  pages =        "3--4",
  month =        mar,
  year =         "1986",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 00:50:39 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Perrott:1986:SL,
  author =       "R. H. Perrott and A. Zarea-Aliabadi",
  title =        "Supercomputer Languages",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "1",
  pages =        "5--22",
  month =        mar,
  year =         "1986",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/6462.6463",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:35:52 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/6463.html",
  abstract =     "The high-level languages proposed for supercomputers,
                 such as vector and array processors, have been designed
                 using one of the following two approaches: (1) an
                 existing sequential language is adapted, (2) a new
                 language based on the hardware is developed. Recently,
                 there has emerged a third approach, which does not
                 require the programmer to be aware of the sequential
                 nature of the language or the hardware characteristics.
                 Examples of these language groups are examined to
                 illustrate their main features and what is required of
                 a programmer when using such languages. The study
                 therefore enables a comparison of the different
                 language approaches to be made.",
  acknowledgement = ack-nhfb,
  affiliation =  "Queen's Univ of Belfast, Belfast, North Irel",
  affiliationaddress = "Queen's Univ of Belfast, Belfast, North Irel",
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming languages; computer systems,
                 digital --- Parallel Processing; Fortran; languages;
                 Pascal, design; supercomputer languages",
  review =       "ACM CR 8703-0162",
  subject =      "{\bf C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors). {\bf D.1.3}: Software, PROGRAMMING
                 TECHNIQUES, Concurrent Programming. {\bf D.3.2}:
                 Software, PROGRAMMING LANGUAGES, Language
                 Classifications, FORTRAN. {\bf D.3.3}: Software,
                 PROGRAMMING LANGUAGES, Language Constructs and
                 Features. {\bf C.5.1}: Computer Systems Organization,
                 COMPUTER SYSTEM IMPLEMENTATION, Large and Medium
                 (``Mainframe'') Computers, Super (very large)
                 computers. {\bf D.3.2}: Software, PROGRAMMING
                 LANGUAGES, Language Classifications, ACTUS.",
}

@Article{Galil:1986:EAF,
  author =       "Zvi Galil",
  title =        "Efficient Algorithms for Finding Maximum Matching in
                 Graphs",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "1",
  pages =        "23--38",
  month =        mar,
  year =         "1986",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/6462.6502",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:35:52 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/6502.html",
  abstract =     "This paper surveys the techniques used for designing
                 the most efficient algorithms for finding a maximum
                 cardinality or weighted matching in (general or
                 bipartite) graphs. It also lists some open problems
                 concerning possible improvements in existing algorithms
                 and the existence of fast parallel algorithms for these
                 problems.",
  acknowledgement = ack-nhfb,
  affiliation =  "Columbia Univ, New York, NY, USA",
  affiliationaddress = "Columbia Univ, New York, NY, USA",
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Algorithms; computer programming; computer systems,
                 digital --- Parallel Processing; mathematical
                 techniques --- Graph Theory; maximum cardinality;
                 maximum matching; parallel algorithms, algorithms;
                 theory; verification; weighted matching",
  review =       "ACM CR 8702-0084",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Computations on discrete
                 structures. {\bf G.2.2}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Graph Theory, Graph algorithms.",
}

@Article{Misra:1986:DDE,
  author =       "Jayadev Misra",
  title =        "Distributed Discrete-Event Simulation",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "1",
  pages =        "39--65",
  month =        mar,
  year =         "1986",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/6462.6485",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:35:52 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/6485.html",
  abstract =     "Traditional discrete-event simulations employ an
                 inherently sequential algorithm. In practice,
                 simulations of large systems are limited by this
                 sequentiality, because only a modest number of events
                 can be simulated. Distributed discrete-event simulation
                 (carried out on a network of processors with
                 asynchronous message-communicating capabilities) is
                 proposed as an alternative; it may provide better
                 performance by partitioning the simulation among the
                 component processors. The basic distributed simulation
                 scheme, which uses time encoding, is described. Its
                 major shortcoming is a possibility of deadlock. Several
                 techniques for deadlock avoidance and deadlock
                 detection are suggested. The focus of this work is on
                 the theory of distributed discrete-event simulation.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Texas at Austin, Austin, TX, USA",
  affiliationaddress = "Univ of Texas at Austin, Austin, TX, USA",
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "codes, symbolic --- Encoding; computer programming ---
                 Algorithms; computer simulation; computer systems,
                 digital --- Distributed; deadlock detection and
                 recovery; deadlock prevention; distributed
                 discrete-event simulation; message communicating
                 processes, algorithms; theory; verification",
  review =       "ACM CR 8706-0513",
  subject =      "{\bf I.6.1}: Computing Methodologies, SIMULATION AND
                 MODELING, Simulation Theory. {\bf D.1.3}: Software,
                 PROGRAMMING TECHNIQUES, Concurrent Programming. {\bf
                 D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Deadlocks. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed applications.",
}

@Article{Chin:1986:MBR,
  author =       "Roland T. Chin and Charles R. Dyer",
  title =        "Model-Based Recognition in Robot Vision",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "1",
  pages =        "67--108",
  month =        mar,
  year =         "1986",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/6462.6464",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:35:52 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/6464.html",
  abstract =     "This paper presents a comparative study and survey of
                 model-based object-recognition algorithms for robot
                 vision. The goal of these algorithms is to recognize
                 the identity, position, and orientation of randomly
                 oriented industrial parts. In one form this is commonly
                 referred to as the 'bin-picking' problem, in which the
                 parts to be recognized are presented in a jumbled bin.
                 The paper is organized according to 2-D, $ 2 \frac
                 {1}{2} $-D, and 3-D object representations, which are
                 used as the basis for the recognition algorithms. Three
                 central issues common to each category, namely, feature
                 extraction, modeling, and matching, are examined in
                 detail. An evaluation and comparison of existing
                 industrial part-recognition systems and algorithms is
                 given, providing insights for progress toward future
                 robot vision systems.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Wisconsin, Madison, WI, USA",
  affiliationaddress = "Univ of Wisconsin, Madison, WI, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer programming --- Algorithms; computer vision;
                 design; industrial part recognition, algorithms;
                 model-based recognition; object recognition; pattern
                 recognition; performance; robot vision; robotics ---
                 Vision Systems; robots, industrial --- Vision Systems",
  review =       "ACM CR 8703-0210",
  subject =      "{\bf I.2.10}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Vision and Scene Understanding, Modeling
                 and recovery of physical attributes. {\bf I.5.4}:
                 Computing Methodologies, PATTERN RECOGNITION,
                 Applications, Computer vision. {\bf I.4.6}: Computing
                 Methodologies, IMAGE PROCESSING, Segmentation. {\bf
                 I.4.7}: Computing Methodologies, IMAGE PROCESSING,
                 Feature Measurement. {\bf I.2.9}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Robotics,
                 Sensors. {\bf I.4.8}: Computing Methodologies, IMAGE
                 PROCESSING, Scene Analysis.",
}

@Article{Wasserman:1986:ATIb,
  author =       "Anthony I. Wasserman",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "2",
  pages =        "113--114",
  month =        jun,
  year =         "1986",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 00:50:39 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1986:AAb,
  author =       "Anthony I. Wasserman",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "2",
  pages =        "115--116",
  month =        jun,
  year =         "1986",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 00:50:39 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasserman:1986:EP,
  author =       "Anthony I. Wasserman",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "2",
  pages =        "117--124",
  month =        jun,
  year =         "1986",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 00:50:39 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Leveson:1986:SSW,
  author =       "Nancy G. Leveson",
  title =        "Software Safety: Why, What, and How",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "2",
  pages =        "125--163",
  month =        jun,
  year =         "1986",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/7474.7528",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:36:09 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/7528.html",
  abstract =     "Software safety issues become important when computers
                 are used to control real-time, safety-critical
                 processes. This survey attempts to explain why there is
                 a problem, what the problem is, and what is known about
                 how to solve it. Since this is a relatively new
                 software research area, emphasis is placed on
                 delineating the outstanding issues and research
                 topics.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California, Irvine, CA, USA",
  affiliationaddress = "Univ of California, Irvine, CA, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computers --- Applications; design; human factors;
                 measurement; real-time processes; reliability;
                 Reliability; safety-critical processes; security,
                 computer software; software safety",
  review =       "ACM CR 8706-0480",
  subject =      "{\bf D.2.0}: Software, SOFTWARE ENGINEERING, General.
                 {\bf K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Social Issues. {\bf J.7}: Computer Applications,
                 COMPUTERS IN OTHER SYSTEMS. {\bf D.2.10}: Software,
                 SOFTWARE ENGINEERING, Design.",
}

@Article{Hirschheim:1986:EPV,
  author =       "R. A. Hirschheim",
  title =        "The Effect of {{\em A Priori\/}} Views on the Social
                 Implications of Computing: The Case of Office
                 Automation",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "2",
  pages =        "165--195",
  month =        jun,
  year =         "1986",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/7474.7476",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:36:09 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/7476.html",
  abstract =     "Office automation impact has received considerable
                 attention in the literature recently. Unfortunately,
                 that which has appeared is diverse and contradictory.
                 The relevant literature is reviewed, summarized, and
                 placed in a framework containing three positions on
                 office automation impact: optimism, pessimism, and
                 relativism. The basic assumptions and empirical support
                 for each position are noted and analyzed. It is
                 proposed that these positions are based on a number of
                 a priori views which guide the reporting and beliefs
                 about technological impact.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Oxford, Oxford, Engl",
  affiliationaddress = "Univ of Oxford, Oxford, Engl",
  classification = "723; 901; 913",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "economics; human factors; information systems;
                 management; performance; privacy; productivity; quality
                 of work life; social implications of computing;
                 technology --- Economic and Sociological Effects;
                 theory, office automation",
  review =       "ACM CR 8706-0508",
  subject =      "{\bf H.4.1}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Office Automation. {\bf H.4.3}:
                 Information Systems, INFORMATION SYSTEMS APPLICATIONS,
                 Communications Applications. {\bf K.4.3}: Computing
                 Milieux, COMPUTERS AND SOCIETY, Organizational Impacts.
                 {\bf K.4.0}: Computing Milieux, COMPUTERS AND SOCIETY,
                 General.",
}

@Article{Teorey:1986:LDM,
  author =       "Toby J. Teorey and Dongqing Yang and James P. Fry",
  title =        "A Logical Design Methodology for Relational Databases
                 Using the Extended Entity-Relationship Model",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "2",
  pages =        "197--222",
  month =        jun,
  year =         "1986",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/7474.7475",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:36:09 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Segev:1987:SFT,Teorey:1987:SFT}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/7475.html",
  abstract =     "A database design methodology is defined for the
                 design of large relational databases. First, the data
                 requirements are conceptualized using an extended
                 entity-relationship model, with the extensions being
                 additional semantics such as ternary relationships,
                 optional relationships, and the generalization
                 abstraction. The extended entity-relationship model is
                 then decomposed according to a set of basic
                 entity-relationship constructs, and these are
                 transformed into candidate relations. A set of basic
                 transformations has been developed for the three types
                 of relations: entity relations, extended entity
                 relations, and relationship relations. Candidate
                 relations are further analyzed and modified to attain
                 the highest degree of normalization desired.\par

                 The methodology produces database designs that are not
                 only accurate representations of reality, but flexible
                 enough to accommodate future processing requirements.
                 It also reduces the number of data dependencies that
                 must be analyzed, using the extended ER model
                 conceptualization, and maintains data integrity through
                 normalization. This approach can be implemented
                 manually or in a simple software package as long as a
                 ``good'' solution is acceptable and absolute optimality
                 is not required.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Michigan, Ann Arbor, MI, USA",
  affiliationaddress = "Univ of Michigan, Ann Arbor, MI, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "database design, databases; database systems; design;
                 entity-relationship model; extended entity-relationship
                 model; integrity; logical design; management;
                 Relational; relational databases",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models.",
}

@Article{March:1986:ATIa,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "3",
  pages =        "227--228",
  month =        sep,
  year =         "1986",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:03:07 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1986:AAa,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "3",
  pages =        "229--229",
  month =        sep,
  year =         "1986",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:03:07 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mili:1986:FMS,
  author =       "Ali Mili and Jules Desharnais and Jean Raymond
                 Gagn{\'e}",
  title =        "Formal Models of Stepwise Refinement of Programs",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "3",
  pages =        "231--276",
  month =        sep,
  year =         "1986",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/27632.28054",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  MRclass =      "68N05",
  MRnumber =     "896 093",
  bibdate =      "Thu Jun 19 09:36:22 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Mili:1987:CFM}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/28054.html",
  abstract =     "Of the many ways to express program specifications,
                 three of the most common are: as a pair of assertions,
                 an input assertion and an output assertion; as a
                 function mapping legal inputs to correct outputs; or as
                 a relation containing the input\slash output pairs that
                 are considered correct. The construction of programs
                 consists of mapping a potentially complex specification
                 into a program by recursively decomposing complex
                 specifications into simpler ones. We show how this
                 decomposition takes place in all three modes of
                 specification and draw some conclusions on the nature
                 of programming.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Tunis, Belvedere, Tunisia",
  affiliationaddress = "Univ of Tunis, Belvedere, Tunisia",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; computer metatheory; decomposition of
                 specifications; design; languages; program
                 specifications; software specifications; stepwise
                 refinement; Theory; theory; verification, computer
                 programming",
  review =       "ACM CR 8805-0349",
  subject =      "{\bf F.3.1}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs. {\bf D.1.4}: Software,
                 PROGRAMMING TECHNIQUES, Sequential Programming. {\bf
                 D.2.1}: Software, SOFTWARE ENGINEERING,
                 Requirements/Specifications. {\bf D.2.2}: Software,
                 SOFTWARE ENGINEERING, Tools and Techniques. {\bf
                 D.2.4}: Software, SOFTWARE ENGINEERING, Program
                 Verification. {\bf D.3.3}: Software, PROGRAMMING
                 LANGUAGES, Language Constructs and Features. {\bf
                 F.3.3}: Theory of Computation, LOGICS AND MEANINGS OF
                 PROGRAMS, Studies of Program Constructs.",
}

@Article{Ryder:1986:EAD,
  author =       "Barbara G. Ryder and Marvin C. Paull",
  title =        "Elimination Algorithms for Data Flow Analysis",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "3",
  pages =        "277--316",
  month =        sep,
  year =         "1986",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/27632.27649",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:36:22 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/27649.html",
  abstract =     "A unified model of a family of data flow algorithms,
                 called elimination methods, is presented. The
                 algorithms, which gather information about the
                 definition and use of data in a program or a set of
                 programs, are characterized by the manner in which they
                 solve the systems of equations that describe data flow
                 problems of interest. The unified model provides
                 implementation-independent descriptions of the
                 algorithms to facilitate comparisons among them and
                 illustrate the sources of improvement in worst case
                 complexity bounds. This tutorial provides a study in
                 algorithm design, as well as a new view of these
                 algorithms and their interrelationships.",
  acknowledgement = ack-nhfb,
  affiliation =  "Rutgers Univ, New Brunswick, NJ, USA",
  affiliationaddress = "Rutgers Univ, New Brunswick, NJ, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithm design; Algorithms; algorithms; computer
                 software --- Design; data flow algorithms; elimination
                 methods; languages, computer programming",
  review =       "ACM CR 8803-0190",
  subject =      "{\bf D.3.4}: Software, PROGRAMMING LANGUAGES,
                 Processors, Optimization. {\bf F.2.0}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, General.",
}

@Article{March:1986:ATIb,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "4",
  pages =        "319--319",
  month =        dec,
  year =         "1986",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:06:07 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1986:AAb,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "4",
  pages =        "321--321",
  month =        dec,
  year =         "1986",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:06:07 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Batini:1986:CAM,
  author =       "C. Batini and M. Lenzerini and S. B. Navathe",
  title =        "A Comparative Analysis of Methodologies for Database
                 Schema Integration",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "4",
  pages =        "323--364",
  month =        dec,
  year =         "1986",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/27633.27634",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:36:30 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/27634.html",
  abstract =     "One of the fundamental principles of the database
                 approach is that a database allows a nonredundant,
                 unified representation of all data managed in an
                 organization. This is achieved only when methodologies
                 are available to support integration across
                 organizational and application
                 boundaries.\par

                 Methodologies for database design usually perform the
                 design activity by separately producing several
                 schemas, representing parts of the application, which
                 are subsequently merged. Database schema integration is
                 the activity of integrating the schemas of existing or
                 proposed databases in a global, unified schema.\par

                 The aim of the paper is to provide first a unifying
                 framework for the problem of schema integration, then a
                 comparative review of the work done thus far in this
                 area. Such a framework, with the associated analysis of
                 the existing approaches, provides a basis for
                 identifying strengths and weaknesses of individual
                 methodologies, as well as general guidelines for future
                 improvements and extensions.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Rome, Rome, Italy",
  affiliationaddress = "Univ of Rome, Rome, Italy",
  annote =       "Comparisons of 12 established schema integration
                 methodologies. Examples include relational, structural,
                 extended E-R model.",
  annote2 =      "A very good comparison of different approaches to
                 schema migration. Formal treatment of the semantics is
                 given. Definitions of concepts of equivalence of
                 schemas created. Categorization of problems in Schema
                 integration. Overview and metrics of existing
                 systems.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "conceptual database design, conceptual database
                 design; database integration; database management;
                 database schema integration; database systems; Design;
                 design; information systems; information systems
                 design; management; models; view integration",
  review =       "ACM CR 8802-0107",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Schema and subschema. {\bf H.2.1}:
                 Information Systems, DATABASE MANAGEMENT, Logical
                 Design, Data models. {\bf D.2.1}: Software, SOFTWARE
                 ENGINEERING, Requirements/Specifications,
                 Methodologies. {\bf H.2.5}: Information Systems,
                 DATABASE MANAGEMENT, Heterogeneous Databases.",
}

@Article{Veen:1986:DMA,
  author =       "Arthur H. Veen",
  title =        "Dataflow Machine Architecture",
  journal =      j-COMP-SURV,
  volume =       "18",
  number =       "4",
  pages =        "365--396",
  month =        dec,
  year =         "1986",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/27633.28055",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:36:30 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/28055.html",
  abstract =     "Dataflow machines are programmable computers of which
                 the hardware is optimized for fine-grain data-driven
                 parallel computation. The principles and complications
                 of data-driven execution are explained, as well as the
                 advantages and costs of fine-grain parallelism. A
                 general model for a dataflow machine is presented and
                 the major design options are discussed.\par

                 Most dataflow machines described in the literature are
                 surveyed on the basis of this model and its associated
                 technology. For general-purpose computing the most
                 promising dataflow machines are those that employ
                 packet-switching communication and support general
                 recursion. Such a recursion mechanism requires an
                 extremely fast mechanism to map a sparsely occupied
                 virtual space to a physical space of realistic size. No
                 solution has yet proved fully satisfactory.\par

                 A working prototype of one processing element is
                 described in detail. On the basis of experience with
                 this prototype, some of the objections raised against
                 the dataflow approach are discussed. It appears that
                 the overhead due to fine-grain parallelism can be made
                 acceptable by sophisticated compiling and employing
                 special hardware for the storage of data structures.
                 Many computing-intensive programs show sufficient
                 parallelism. In fact, a major problem is to restrain
                 parallelism when machine resources tend to get
                 overloaded. Another issue that requires further
                 investigation is the distribution of computation and
                 data structures over the processing elements.",
  acknowledgement = ack-nhfb,
  affiliation =  "Cent for Mathematics \& Computer Science, Amsterdam,
                 Neth",
  affiliationaddress = "Cent for Mathematics \& Computer Science,
                 Amsterdam, Neth",
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer architecture --- Reviews; data structure
                 storage; data-driven architectures; data-flow
                 computers; dataflow machines; design; packet-switching
                 communication; Parallel Processing; performance,
                 computer systems, digital; recursion mechanism",
  subject =      "{\bf C.1.3}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Other Architecture Styles, Data-flow
                 architectures. {\bf C.1.2}: Computer Systems
                 Organization, PROCESSOR ARCHITECTURES, Multiple Data
                 Stream Architectures (Multiprocessors),
                 Multiple-instruction-stream, multiple-data-stream
                 processors (MIMD). {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Design studies.",
}

@Article{March:1987:ATIa,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "1",
  pages =        "1--1",
  month =        mar,
  year =         "1987",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:09:13 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1987:AAa,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "1",
  pages =        "3--3",
  month =        mar,
  year =         "1987",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:09:13 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lyytinen:1987:DPI,
  author =       "Kalle Lyytinen",
  title =        "Different Perspectives on Information Systems:
                 Problems and Solutions",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "1",
  pages =        "5--46",
  month =        mar,
  year =         "1987",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/28865.28867",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:36:41 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/28867.html",
  abstract =     "The paper puts information systems (IS) research
                 dealing with IS problems into perspective. IS problems
                 are surveyed and classified. Using the IS research
                 framework suggested by Ives, Hamilton, and Davis,
                 research into IS problems is classified into several
                 perspectives whose relevance in coping with the
                 problems is discussed. Research perspectives focusing
                 on IS operations environment, IS development process,
                 IS development organization, IS development methods,
                 and IS theories are distinguished. The paper concludes
                 with suggestions for future research and how to deal
                 with IS problems in practice.",
  acknowledgement = ack-nhfb,
  annote =       "Model types for system specification.",
  classification = "723; 912",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer system measurement; data processing,
                 business; database systems; economics; human factors;
                 information systems; management, management",
  subject =      "{\bf D.2.1}: Software, SOFTWARE ENGINEERING,
                 Requirements/Specifications. {\bf D.2.2}: Software,
                 SOFTWARE ENGINEERING, Tools and Techniques. {\bf
                 D.2.6}: Software, SOFTWARE ENGINEERING, Programming
                 Environments. {\bf D.2.9}: Software, SOFTWARE
                 ENGINEERING, Management. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design. {\bf
                 H.2.7}: Information Systems, DATABASE MANAGEMENT,
                 Database Administration. {\bf K.4.3}: Computing
                 Milieux, COMPUTERS AND SOCIETY, Organizational Impacts.
                 {\bf K.6.0}: Computing Milieux, MANAGEMENT OF COMPUTING
                 AND INFORMATION SYSTEMS, General. {\bf K.6.1}:
                 Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, Project and People Management.
                 {\bf K.6.3}: Computing Milieux, MANAGEMENT OF COMPUTING
                 AND INFORMATION SYSTEMS, Software Management. {\bf
                 K.6.4}: Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, System Management.",
}

@Article{Kemper:1987:AGM,
  author =       "Alfons Kemper and Mechtild Wallrath",
  title =        "An Analysis of Geometric Modeling in Database
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "1",
  pages =        "47--91",
  month =        mar,
  year =         "1987",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/28865.28866",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:36:41 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/28866.html",
  abstract =     "The data-modeling and computational requirements for
                 integrated computer aided manufacturing (CAM) databases
                 are analyzed, and the most common representation
                 schemes for modeling solid geometric objects in a
                 computer are described. The primitive instancing model,
                 the boundary representation, and the constructive solid
                 geometry model are presented from the viewpoint of
                 database representation. Depending on the
                 representation scheme, one can apply geometric
                 transformations to the stored geometric objects. The
                 standard transformations, scaling, translation, and
                 rotation, are outlined with respect to the data
                 structure aspects. Some of the more recent developments
                 in the area of engineering databases with regard to
                 supporting these representation schemes are then
                 explored, and a classification scheme for technical
                 database management systems is presented that
                 distinguishes the systems according to their level of
                 object orientation: structural or behavioral object
                 orientation. First, several systems that are extensions
                 to the relational model are surveyed, then the
                 functional data model DAPLEX, the nonnormalized
                 relational model NF$^2$, and the database system $ R^2
                 D^2$ that provides abstract data types in the NF$^2$
                 model are described.",
  acknowledgement = ack-nhfb,
  annote =       "requirements for CAM. Functional, nested relations
                 (NFNF), RRDD models.",
  classification = "723; 921",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "boundary representation; computer aided manufacturing;
                 constructive solid geometry, design; database systems;
                 geometric modeling; languages; mathematical models;
                 mathematical techniques --- Geometry; primitive
                 instancing model",
  review =       "ACM CR 8808-0605",
  subject =      "{\bf D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Abstract data types. {\bf
                 H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models. {\bf H.2.3}: Information
                 Systems, DATABASE MANAGEMENT, Languages. {\bf J.6}:
                 Computer Applications, COMPUTER-AIDED ENGINEERING. {\bf
                 I.3.5}: Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling, Hierarchy
                 and geometric transformations.",
}

@Article{March:1987:ATIb,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "2",
  pages =        "93--93",
  month =        jun,
  year =         "1987",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:12:35 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1987:AAb,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "2",
  pages =        "95--95",
  month =        jun,
  year =         "1987",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:12:35 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1987:EP,
  author =       "Salvatore T. March",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "2",
  pages =        "97--104",
  month =        jun,
  year =         "1987",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:12:35 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Atkinson:1987:TPD,
  author =       "Malcolm P. Atkinson and O. Peter Buneman",
  title =        "Types and Persistence in Database Programming
                 Languages",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "2",
  pages =        "105--190",
  month =        jun,
  year =         "1987",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/62070.45066",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:36:51 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/45066.html",
  abstract =     "Traditionally, the interface between a programming
                 language and a database has either been through a set
                 of relatively low-level subroutine calls, or it has
                 required some form of embedding of one language in
                 another. Recently, the necessity of integrating
                 database and programming language techniques has
                 received some long-overdue recognition. In response, a
                 number of attempts have been made to construct
                 programming languages with completely integrated
                 database management systems. These languages, which we
                 term database programming languages, are the subject of
                 this review. The design of these languages is still in
                 its infancy, and the purpose of writing this review is
                 to identify the areas in which further research is
                 required. In particular, we focus on the problems of
                 providing a uniform type system and mechanisms for data
                 to persist. Of particular importance in solving these
                 problems are issues of polymorphism, type inheritance,
                 object identity, and the choice of structures to
                 represent sets of similar values. Our conclusion is
                 that there are areas of programming language research
                 --- modules, polymorphism, persistence, and inheritance
                 --- that must be developed and applied to achieve the
                 goal of a useful and consistent database programming
                 language. Other research areas of equal importance,
                 such as implementation, transaction handling, and
                 concurrency, are not examined here in any detail.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Glasgow, Glasgow, Scotl",
  affiliationaddress = "Univ of Glasgow, Glasgow, Scotl",
  annote =       "Illustrated with 4 tasks. Polymorphism, type
                 inheritance, object identity, and the choice of
                 structures to represent sets of similar values.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data models; data types; database programming
                 languages; database systems; design; Design; languages,
                 computer programming languages; object-oriented
                 programming; type inheritance",
  review =       "ACM CR 8904-0224",
  subject =      "{\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Specialized application languages.
                 {\bf D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features. {\bf H.2.3}: Information
                 Systems, DATABASE MANAGEMENT, Languages.",
}

@Article{Segev:1987:SFT,
  author =       "Arie Segev",
  title =        "Surveyor's Forum: Transitive Dependencies",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "2",
  pages =        "191--192",
  month =        jun,
  year =         "1987",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:12:35 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Teorey:1986:LDM,Teorey:1987:SFT}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Teorey:1987:SFT,
  author =       "Toby J. Teorey",
  title =        "Surveyor's Forum: Transitive Dependencies",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "2",
  pages =        "193--193",
  month =        jun,
  year =         "1987",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:12:35 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Teorey:1986:LDM,Segev:1987:SFT}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mili:1987:CFM,
  author =       "Ali Mili and Jules Desharnais and Jean Raymond
                 Gagn{\'e}",
  title =        "Corrigendum: {``Formal Models of Stepwise Refinements
                 of Programs''}",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "2",
  pages =        "195--195",
  month =        jun,
  year =         "1987",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 22:25:51 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Mili:1986:FMS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1987:ATIc,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "3",
  pages =        "197--198",
  month =        sep,
  year =         "1987",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:16:37 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1987:AAc,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "3",
  pages =        "199--199",
  month =        sep,
  year =         "1987",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:16:37 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hull:1987:SDM,
  author =       "Richard Hull and Roger King",
  title =        "Semantic Database Modeling: Survey, Applications, and
                 Research Issues",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "3",
  pages =        "201--260",
  month =        sep,
  year =         "1987",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/45072.45073",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:36:57 MDT 2008",
  bibsource =    "ACM Computing Archive;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Also published in/as: USC, TR-CRI 87-20, March 1987
                 (revised) and USC, TR-CRI 86-21, March 1986.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/45073.html",
  abstract =     "Most common database management systems represent
                 information in a simple record-based format. Semantic
                 modeling provides richer data structuring capabilities
                 for database applications. In particular, research in
                 this area has articulated a number of constructs that
                 provide mechanisms for representing structurally
                 complex interrelations among data typically arising in
                 commercial applications. In general terms, semantic
                 modeling complements work on knowledge representation
                 (in artificial intelligence) and on the new generation
                 of database models based on the object-oriented
                 paradigm of programming languages. This paper presents
                 an in-depth discussion of semantic data modeling. It
                 reviews the philosophical motivations of semantic
                 models, including the need for high-level modeling
                 abstractions and the reduction of semantic overloading
                 of data type constructors. It then provides a tutorial
                 introduction to the primary components of semantic
                 models, which are the explicit representation of
                 objects, attributes of and relationships among objects,
                 type constructors for building complex types, ISA
                 relationships, and derived schema components. Next, a
                 survey of the prominent semantic models in the
                 literature is presented. Further, since a broad area of
                 research has developed around semantic modeling, a
                 number of related topics based on these models are
                 discussed, including data languages, graphical
                 interfaces, theoretical investigations, and physical
                 implementation strategies.",
  acknowledgement = ack-nhfb,
  annote =       "A good overview of semantics and data models. It draws
                 contrasts between different types of semantic models,
                 and between OO and semantic extensions to DBMS. A
                 tutorial on the basic concepts is also presented. Also
                 considered is the relations between semantic data
                 models and AI constructs. \ldots{} Hierarchic, network
                 and relational. Semantic data models. IFO model. Paper
                 difficult to read. The original developers'
                 presentations are the basis of discussion.",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; languages",
  review =       "ACM CR 8904-0250",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models. {\bf H.2.0}: Information
                 Systems, DATABASE MANAGEMENT, General. {\bf H.2.3}:
                 Information Systems, DATABASE MANAGEMENT, Languages,
                 Data description languages (DDL). {\bf I.2.4}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Knowledge Representation Formalisms and Methods.",
}

@Article{Lelewer:1987:DC,
  author =       "Debra A. Lelewer and Daniel S. Hirschberg",
  title =        "Data Compression",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "3",
  pages =        "261--296",
  month =        sep,
  year =         "1987",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/45072.45074",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:36:57 MDT 2008",
  bibsource =    "ACM Computing Archive;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/45074.html",
  abstract =     "This paper surveys a variety of data compression
                 methods spanning almost 40 years of research, from the
                 work of Shannon, Fano, and Huffman in the late 1940s to
                 a technique developed in 1986. The aim of data
                 compression is to reduce redundancy in stored or
                 communicated data, thus increasing effective data
                 density. Data compression has important application in
                 the areas of file storage and distributed systems.
                 Concepts from information theory as they relate to the
                 goals and evaluation of data compression methods are
                 discussed briefly. A framework for evaluation and
                 comparison of methods is constructed and applied to the
                 algorithms presented. Comparisons of both theoretical
                 and empirical natures are reported, and possibilities
                 for future research are suggested.",
  acknowledgement = ack-nhfb,
  annote =       "Reviews techniques that are reversible.",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "adaptive coding; algorithms; data compression; Huffman
                 coding; text compression; theory",
  review =       "ACM CR 8902-0069",
  subject =      "{\bf E.4}: Data, CODING AND INFORMATION THEORY, Data
                 compaction and compression. {\bf H.3.2}: Information
                 Systems, INFORMATION STORAGE AND RETRIEVAL, Information
                 Storage. {\bf D.4.3}: Software, OPERATING SYSTEMS, File
                 Systems Management, Distributed file systems.",
}

@Article{March:1987:ATId,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "4",
  pages =        "299--299",
  month =        dec,
  year =         "1987",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:18:57 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1987:AAd,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "4",
  pages =        "301--301",
  month =        dec,
  year =         "1987",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:18:57 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Knapp:1987:DDD,
  author =       "Edgar Knapp",
  title =        "Deadlock Detection in Distributed Databases",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "4",
  pages =        "303--328",
  month =        dec,
  year =         "1987",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/45075.46163",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:37:09 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/CCR.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/46163.html",
  abstract =     "The problem of deadlock detection in distributed
                 systems has undergone extensive study. An important
                 application relates to distributed database systems. A
                 uniform model in which published algorithms can be cast
                 is given, and the fundamental principles on which
                 distributed deadlock detection schemes are based are
                 presented. These principles represent mechanisms for
                 developing distributed algorithms in general and
                 deadlock detection schemes in particular. In addition,
                 a hierarchy of deadlock models is presented; each model
                 is characterized by the restrictions that are imposed
                 upon the form resource requests can assume. The
                 hierarchy includes the well-known models of resource
                 and communication deadlock. Algorithms are classified
                 according to both the underlying principles and the
                 generality of resource requests they permit. A number
                 of algorithms are discussed in detail, and their
                 complexity in terms of the number of messages employed
                 is compared. The point is made that correctness proofs
                 for such algorithms using operational arguments are
                 cumbersome and error prone and, therefore, that only
                 completely formal proofs are sufficient for
                 demonstrating correctness.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Texas at Austin, Austin, TX, USA",
  affiliationaddress = "Univ of Texas at Austin, Austin, TX, USA",
  annote =       "Four main types: 1. path-pushing algorithms, 2.
                 edge-chasing algorithms, 3. diffusing computations and
                 4. global state detection algorithms. Point about many
                 path-pushing were found to be incorrect. In
                 edge-chasing, a probe message is forwarded to all
                 processes that the receiving process waits for. A
                 deadlock exists if a probe message makes its way back
                 to the originating process.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; computer programming --- Algorithms;
                 correctness proofs; deadlock detection; design,
                 database systems; Distributed; hierarchy of deadlock
                 models; transaction processing",
  review =       "ACM CR 8902-0066",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Deadlocks. {\bf D.4.1}: Software, OPERATING
                 SYSTEMS, Process Management, Concurrency. {\bf C.2.4}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Distributed Systems. {\bf C.2.4}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed databases. {\bf
                 D.4.7}: Software, OPERATING SYSTEMS, Organization and
                 Design, Distributed systems. {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Distributed
                 systems.",
}

@Article{Mills:1987:RTC,
  author =       "Carol Bergfeld Mills and Linda J. Weldon",
  title =        "Reading Text from Computer Screens",
  journal =      j-COMP-SURV,
  volume =       "19",
  number =       "4",
  pages =        "329--358",
  month =        dec,
  year =         "1987",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/45075.46162",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:37:09 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/46162.html",
  abstract =     "This paper reviews empirical studies concerning the
                 readability of text from computer screens. The review
                 focuses on the form and physical attributes of complex,
                 realistic displays of text material. Most studies
                 comparing paper and computer screen readability show
                 that screens are less readable than paper. There are
                 many factors that could affect the readability of
                 computer screens. The factors explored in this review
                 are the features of characters, the formatting of the
                 screen, the contrast and color of the characters and
                 background, and dynamic aspects of the screen. Numerous
                 areas for future research are pinpointed.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Maryland, College Park, MD, USA",
  affiliationaddress = "Univ of Maryland, College Park, MD, USA",
  classification = "722",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer screens; display devices --- Human Factors;
                 experimentation; Human Factors; human factors, computer
                 interfaces; readability of text; screen design; text
                 presentation",
  review =       "ACM CR 8907-0453",
  subject =      "{\bf B.4.2}: Hardware, INPUT/OUTPUT AND DATA
                 COMMUNICATIONS, Input/Output Devices, Image display.
                 {\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems, Human factors. {\bf
                 H.1.2}: Information Systems, MODELS AND PRINCIPLES,
                 User/Machine Systems, Human information processing.
                 {\bf H.4.3}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Communications Applications.",
}

@Article{March:1988:ATIa,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "1",
  pages =        "1--1",
  month =        mar,
  year =         "1988",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:22:08 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1988:AAa,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "1",
  pages =        "3--3",
  month =        mar,
  year =         "1988",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 01:22:08 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Takagi:1988:QAP,
  author =       "Hideaki Takagi",
  title =        "Queuing Analysis of Polling Models",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "1",
  pages =        "5--28",
  month =        mar,
  year =         "1988",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/62058.62059",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  MRclass =      "68-02 (68M10 68M20 90B22 90B35)",
  MRnumber =     "89f:68001",
  bibdate =      "Thu Jun 19 09:37:17 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1988.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/62059.html",
  abstract =     "A polling model is a system of multiple queues
                 accessed by a single server in cyclic order. Polling
                 models provide performance evaluation criteria for a
                 variety of demand-based, multiple-access schemes in
                 computer and communication systems. This paper presents
                 an overview of the state of the art of polling model
                 analysis, as well as an extensive list of references.
                 In particular, single-buffer systems and
                 infinite-buffer systems with exhaustive, gated, and
                 limited service disciplines are treated. There is also
                 some discussion of systems with a noncyclic order of
                 service and systems with priority. Applications to
                 computer networks are illustrated, and future research
                 topics are suggested.",
  acknowledgement = ack-nhfb,
  affiliation =  "Tokyo Research Lab, Tokyo, Jpn",
  affiliationaddress = "Tokyo Research Lab, Tokyo, Jpn",
  classification = "716; 717; 718; 723; 922",
  descriptors =  "Queueing system; polling; finite queue; LAN; modeling;
                 infinite queue; cyclic service; token ring; performance
                 evaluation; queueing theory",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer networks --- Mathematical Models; cyclic
                 order; infinite-buffer systems; information theory;
                 multiple queues; performance, probability; polling
                 models; Queueing Theory; single server; single-buffer
                 systems; telecommunication systems --- Analysis",
  subject =      "{\bf C.2.5}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Local Networks. {\bf
                 C.4}: Computer Systems Organization, PERFORMANCE OF
                 SYSTEMS, Modeling techniques. {\bf D.4.8}: Software,
                 OPERATING SYSTEMS, Performance, Queueing theory.",
}

@Article{Danforth:1988:TTO,
  author =       "Scott Danforth and Chris Tomlinson",
  title =        "Type Theories and Object-Oriented Programming",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "1",
  pages =        "29--72",
  month =        mar,
  year =         "1988",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/62058.62060",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  MRclass =      "68-02 (68N15 68Q65)",
  MRnumber =     "958 779",
  bibdate =      "Thu Jun 19 09:37:17 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/62060.html",
  abstract =     "Object-oriented programming is becoming a popular
                 approach to the construction of complex software
                 systems. Benefits of object orientation include support
                 for modular design, code sharing, and extensibility. In
                 order to make the most of these advantages, a type
                 theory for objects and their interactions should be
                 developed to aid checking and controlled derivation of
                 programs and to support early binding of code bodies
                 for efficiency. As a step in this direction, this paper
                 surveys a number of existing type theories and examines
                 the manner and extent to which these theories are able
                 to represent the ideas found in object-oriented
                 programming. Of primary interest are the models
                 provided by type theories for abstract data types and
                 inheritance, and the major portion of this paper is
                 devoted to these topics. Code fragments illustrative of
                 the various approaches are provided and discussed. The
                 introduction provides an overview of object-oriented
                 programming and types in programming languages; the
                 summary provides a comparative evaluation of the
                 reviewed typing systems, along with suggestions for
                 future work.",
  acknowledgement = ack-nhfb,
  affiliation =  "Systems Technology Lab, Austin, TX, USA",
  affiliationaddress = "Systems Technology Lab, Austin, TX, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "abstract data types; code sharing; codes, symbolic;
                 computer metatheory --- Programming Theory; computer
                 programming; computer software; inheritance;
                 object-oriented programming; polymorphism, languages;
                 Theory; theory; type theories",
  subject =      "{\bf D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Data types and structures.
                 {\bf F.3.3}: Theory of Computation, LOGICS AND MEANINGS
                 OF PROGRAMS, Studies of Program Constructs, Type
                 structure. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Lambda calculus and related systems.",
}

@Article{March:1988:ATIb,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "2",
  pages =        "73--73",
  month =        jun,
  year =         "1988",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:24:23 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1988:AAb,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "2",
  pages =        "75--75",
  month =        jun,
  year =         "1988",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:24:23 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1988:EP,
  author =       "Salvatore T. March",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "2",
  pages =        "77--84",
  month =        jun,
  year =         "1988",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:24:23 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Enbody:1988:DHS,
  author =       "R. J. Enbody and H. C. Du",
  title =        "Dynamic Hashing Schemes",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "2",
  pages =        "85--113",
  month =        jun,
  year =         "1988",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/46157.330532",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:37:30 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A new type of dynamic file access called {\em dynamic
                 hashing\/} has recently emerged. It promises the
                 flexibility of handling dynamic files while preserving
                 the fast access times expected from hashing. Such a
                 fast, dynamic file access scheme is needed to support
                 modern database systems. This paper surveys dynamic
                 hashing schemes and examines their critical design
                 issues.",
  acknowledgement = ack-nhfb,
  affiliation =  "Michigan State Univ, East Lansing, MI, USA",
  affiliationaddress = "Michigan State Univ, East Lansing, MI, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "database management; database systems; dynamic file
                 access; dynamic hashing; Dynamic hashing, data
                 processing; File Organization; hash-table
                 representations",
}

@Article{Kraemer:1988:CBS,
  author =       "Kenneth L. Kraemer and John Leslie King",
  title =        "Computer-Based Systems for Cooperative Work and Group
                 Decision Making",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "2",
  pages =        "115--146",
  month =        jun,
  year =         "1988",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/46157.46158",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:37:30 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/46158.html",
  abstract =     "Application of computer and communications technology
                 to cooperative work and group decision making has grown
                 out of three traditions: computer-based communications,
                 computer-based information service provision, and
                 computer-based decision support. This paper reviews the
                 group decision support systems (GDSSs) that have been
                 configured to meet the needs of groups at work, and
                 evaluates the experience to date with such systems.
                 Progress with GDSSs has proved to be slower than
                 originally anticipated because of shortcomings with
                 available technology, poor integration of the various
                 components of the computing `package,' and incomplete
                 understanding of the nature of group decision making.
                 Nevertheless, the field shows considerable promise with
                 respect to the creation of tools to aid in group
                 decision making and the development of sophisticated
                 means of studying the dynamics of decision making in
                 groups.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California, Irvine, CA, USA",
  affiliationaddress = "Univ of California, Irvine, CA, USA",
  classification = "722; 723; 901",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Applications; computer-based systems; cooperative
                 work; decision support; decision theory and analysis;
                 experimentation; group decision making; human factors;
                 management, computer systems, digital; technology ---
                 Economic and Sociological Effects; teleconferencing",
  subject =      "{\bf K.6.0}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, General. {\bf
                 K.4.3}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Organizational Impacts. {\bf J.1}: Computer
                 Applications, ADMINISTRATIVE DATA PROCESSING. {\bf
                 J.7}: Computer Applications, COMPUTERS IN OTHER
                 SYSTEMS.",
}

@Article{March:1988:ATIc,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "3",
  pages =        "149--149",
  month =        sep,
  year =         "1988",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:28:04 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1988:AAc,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "3",
  pages =        "151--151",
  month =        sep,
  year =         "1988",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:28:04 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Peckham:1988:SDM,
  author =       "Joan Peckham and Fred Maryanski",
  title =        "Semantic Data Models",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "3",
  pages =        "153--189",
  month =        sep,
  year =         "1988",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/62061.62062",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:37:37 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/62062.html",
  abstract =     "Semantic data models have emerged from a requirement
                 for more expressive conceptual data models. Current
                 generation data models lack direct support for
                 relationships, data abstraction, inheritance,
                 constraints, unstructured objects, and the dynamic
                 properties of an application. Although the need for
                 data models with richer semantics is widely recognized,
                 no single approach has won general acceptance. This
                 paper describes the generic properties of semantic data
                 models and presents a representative selection of
                 models that have been proposed since the mid-1970s. In
                 addition to explaining the features of the individual
                 models, guidelines are offered for the comparison of
                 models. The paper concludes with a discussion of future
                 directions in the area of conceptual data modeling.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Connecticut",
  affiliationaddress = "Storrs, CT, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Conceptual Data Models; Database Languages; design;
                 languages, Database Systems; Logical Database Design;
                 Semantic Data Models",
  subject =      "{\bf D.2.1}: Software, SOFTWARE ENGINEERING,
                 Requirements/Specifications, Methodologies. {\bf
                 D.2.10}: Software, SOFTWARE ENGINEERING, Design. {\bf
                 D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Design languages. {\bf H.2.1}:
                 Information Systems, DATABASE MANAGEMENT, Logical
                 Design, Data models. {\bf H.2.3}: Information Systems,
                 DATABASE MANAGEMENT, Languages, Data description
                 languages (DDL). {\bf I.2.4}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Knowledge Representation
                 Formalisms and Methods, Semantic networks. {\bf K.6.3}:
                 Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, Software Management, Software
                 development.",
}

@Article{Mannino:1988:SPE,
  author =       "Michael V. Mannino and Paicheng Chu and Thomas Sager",
  title =        "Statistical Profile Estimation in Database Systems",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "3",
  pages =        "191--221",
  month =        sep,
  year =         "1988",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/62061.62063",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:37:37 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/62063.html",
  abstract =     "A statistical profile summarizes the instances of a
                 database. It describes aspects such as the number of
                 tuples, the number of values, the distribution of
                 values, the correlation between value sets, and the
                 distribution of tuples among secondary storage units.
                 Estimation of database profiles is critical in the
                 problems of query optimization, physical database
                 design, and database performance prediction. This paper
                 describes a model of a database of profile, relates
                 this model to estimating the cost of database
                 operations, and surveys methods of estimating profiles.
                 The operators and objects in the model include build
                 profile, estimate profile, and update profile. The
                 estimate operator is classified by the relational
                 algebra operator (select, project, join), the property
                 to be estimated (cardinality, distribution of values,
                 and other parameters), and the underlying method
                 (parametric, nonparametric, and ad-hoc). The accuracy,
                 overhead, and assumptions of methods are discussed in
                 detail. Relevant research in both the database and the
                 statistics disciplines is incorporated in the detailed
                 discussion.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Texas at Austin",
  affiliationaddress = "Austin, TX, USA",
  annote =       "A statistical profile summarizes the number of tuples
                 and values, the distribution of values, the correlation
                 between value sets, and the distribution of tuples
                 among storage units.. This paper surveys methods of
                 estimating profiles (parametric, nonparametric and
                 ad-hoc methods).",
  classification = "723; 921; 922",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; Boolean Expressions; Database Profile;
                 languages; Mathematical Techniques--Estimation;
                 performance, Database Systems; Relational; Statistical
                 Methods; Statistical Profile Estimation",
  subject =      "{\bf H.0}: Information Systems, GENERAL. {\bf H.2.2}:
                 Information Systems, DATABASE MANAGEMENT, Physical
                 Design, Access methods. {\bf H.2.3}: Information
                 Systems, DATABASE MANAGEMENT, Languages, Query
                 languages. {\bf H.2.4}: Information Systems, DATABASE
                 MANAGEMENT, Systems, Query processing. {\bf H.3.3}:
                 Information Systems, INFORMATION STORAGE AND RETRIEVAL,
                 Information Search and Retrieval, Query formulation.",
}

@Article{March:1988:ATId,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "4",
  pages =        "223--224",
  month =        dec,
  year =         "1988",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:30:17 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1988:AAd,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "4",
  pages =        "225--225",
  month =        dec,
  year =         "1988",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:30:17 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Johnson:1988:SST,
  author =       "Allen M. {Johnson, Jr.} and Miroslaw Malek",
  title =        "Survey of Software Tools for Evaluating Reliability,
                 Availability, and Serviceability",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "4",
  pages =        "227--269",
  month =        dec,
  year =         "1988",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/50020.50062",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:37:47 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1988.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/50062.html",
  abstract =     "In computer design, it is essential to know the
                 effectiveness of different design options in improving
                 performance and dependability. Various software tools
                 have been created to evaluate these parameters,
                 applying both analytic and simulation techniques, and
                 this paper reviews those related primarily to
                 reliability, availability, and serviceability. The
                 purpose, type of models used, type of systems modeled,
                 inputs, and outputs are given for each package.
                 Examples of some of the key modeling elements such as
                 Markov chains, fault trees, and Petri nets are
                 discussed. The information is compiled to facilitate
                 recognition of similarities and differences between
                 various models and tools and can be used to aid in
                 selecting models and tools for a particular application
                 or designing tools for future needs. Tools included in
                 the evaluation are CARE-III, ARIES-82, SAVE, MARKl,
                 HARP, SHARPE, GRAMP, SURF, SURE, ASSIST, METASAN,
                 METFAC, ARM, and SUPER. Modeling tools, such as REL70,
                 RELCOMP, CARE, CARSRA, and CAST, that were forerunners
                 to some of the current tools are noted for their
                 contributions. Modeling elements that have gained
                 widespread use for general systems, as well as
                 fault-tolerant systems, are included. Tools capable of
                 modeling both repairable and nonrepairable systems,
                 accepting constant or time varying failure rates, and
                 predicting reliability, availability, and
                 serviceability parameters are surveyed.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM",
  affiliationaddress = "Austin, TX, USA",
  classification = "722; 723; 913",
  descriptors =  "Reliability; method; survey; Petri net",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Availability; Computer Software; Maintainability;
                 measurement; Reliability; reliability, Computer
                 Systems, Digital; Serviceability; Software Tools",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Reliability, availability, and
                 serviceability. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Measurement
                 techniques. {\bf C.4}: Computer Systems Organization,
                 PERFORMANCE OF SYSTEMS, Modeling techniques. {\bf
                 I.6.3}: Computing Methodologies, SIMULATION AND
                 MODELING, Applications.",
}

@Article{Samet:1988:HRC,
  author =       "Hanan Samet",
  title =        "Hierarchical Representations of Collections of Small
                 Rectangles",
  journal =      j-COMP-SURV,
  volume =       "20",
  number =       "4",
  pages =        "271--309",
  month =        dec,
  year =         "1988",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/50020.50021",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:37:47 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/50021.html",
  abstract =     "A tutorial survey is presented of hierarchical data
                 structures for representing collections of small
                 rectangles. Rectangles are often used as an
                 approximation of shapes for which they serve as the
                 minimum rectilinear enclosing object. They arise in
                 applications in cartography as well as very large-scale
                 integration (VLSI) design rule checking. The different
                 data structures are discussed in terms of how they
                 support the execution of queries involving proximity
                 relations. The focus is on intersection and subset
                 queries. Several types of representations are
                 described. Some are designed for use with the
                 plane-sweep paradigm, which works well for static
                 collections of rectangles. Others are oriented toward
                 dynamic collections. In this case, one representation
                 reduces each rectangle to a point in a higher
                 multidimensional space and treats the problem as one
                 involving point data. The other representation is area
                 based --- that is, it depends on the physical extent of
                 each rectangle.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Maryland",
  affiliationaddress = "College Park, MD, USA",
  classification = "405; 714; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; Cartography; Collections of Small
                 Rectangles; Data Structures; Design Rule Checking;
                 Hierarchical Representations; Image Processing;
                 Integrated Circuits, VLSI--Computer Aided Design; Maps
                 and Mapping--Computer Applications; theory, Data
                 Processing",
  subject =      "{\bf I.3.5}: Computing Methodologies, COMPUTER
                 GRAPHICS, Computational Geometry and Object Modeling,
                 Curve, surface, solid, and object representations. {\bf
                 I.3.5}: Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling, Geometric
                 algorithms, languages, and systems. {\bf B.7.2}:
                 Hardware, INTEGRATED CIRCUITS, Design Aids, Layout.
                 {\bf B.7.2}: Hardware, INTEGRATED CIRCUITS, Design
                 Aids, Placement and routing. {\bf E.1}: Data, DATA
                 STRUCTURES, Trees. {\bf E.5}: Data, FILES,
                 Organization/structure. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Geometrical problems and computations. {\bf F.2.2}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, Nonnumerical Algorithms and
                 Problems, Routing and layout. {\bf H.2.2}: Information
                 Systems, DATABASE MANAGEMENT, Physical Design, Access
                 methods. {\bf H.3.2}: Information Systems, INFORMATION
                 STORAGE AND RETRIEVAL, Information Storage, File
                 organization. {\bf I.2.10}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Vision and Scene
                 Understanding, Representations, data structures, and
                 transforms. {\bf J.6}: Computer Applications,
                 COMPUTER-AIDED ENGINEERING, Computer-aided design
                 (CAD).",
}

@Article{March:1989:ATIa,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1989",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1989:AAa,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "1",
  pages =        "3--3",
  month =        mar,
  year =         "1989",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hartson:1989:HCI,
  author =       "H. Rex Hartson and Deborah Hix",
  title =        "Human-Computer Interface Development: Concepts and
                 Systems for Its Management",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "1",
  pages =        "5--92",
  month =        mar,
  year =         "1989",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/62029.62031",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:37:55 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/62031.html",
  abstract =     "Human-computer interface management, from a computer
                 science viewpoint, focuses on the process of developing
                 quality human-computer interfaces, including their
                 representation, design, implementation, execution,
                 evaluation, and maintenance. This survey presents
                 important concepts of interface management: dialogue
                 independence, structural modeling, representation,
                 interactive tools, rapid prototyping, development
                 methodologies, and control structures. Dialogue
                 independence is the keystone concept upon which all the
                 other concepts depend. It is a characteristic that
                 separates design of the interface from design of the
                 computational component of an application system so
                 that modifications in either tend not to cause changes
                 in the other. The role of a dialogue developer, whose
                 main purpose is to create quality interfaces, is a
                 direct result of the dialogue independence concept.
                 Structural models of the human-computer interface serve
                 as frameworks for understanding the elements of
                 interfaces and for guiding the dialogue developer in
                 their construction. Representation of the
                 human-computer interface is accomplished by a variety
                 of notational schemes for describing the interface.
                 Numerous kinds of interactive tools for human-computer
                 interface development free the dialogue developer from
                 much of the tedium of 'coding' dialogue. The early
                 ability to observe behavior of the interface --- and
                 indeed that of the whole application system ---
                 provided by rapid prototyping increases communication
                 among system designers, implementors, evaluators, and
                 end-users. Methodologies for interactive system
                 development consider interface management to be an
                 integral part of the overall development process and
                 give emphasis to evaluation in the development life
                 cycle. Finally, several types of control structures
                 govern how sequencing among dialogue and computational
                 components is designed and executed. Numerous systems
                 for human-computer interface management are presented t
                 o illustrate these concepts.",
  acknowledgement = ack-nhfb,
  affiliation =  "Virginia Polytechnic Inst \& State Univ",
  affiliationaddress = "Blacksburg, VA, USA",
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; Computer Interfaces--Human Factors;
                 Computer Software--Software Engineering; design;
                 Dialogue Developer; Dialogue Independence; Human
                 Computer Interface; human factors; Interface
                 Management; Man Machine Systems; management; theory,
                 Systems Science and Cybernetics; User Interface",
  review =       "ACM CR 8911-0841",
  subject =      "{\bf K.6.1}: Computing Milieux, MANAGEMENT OF
                 COMPUTING AND INFORMATION SYSTEMS, Project and People
                 Management. {\bf H.1.2}: Information Systems, MODELS
                 AND PRINCIPLES, User/Machine Systems. {\bf D.2.2}:
                 Software, SOFTWARE ENGINEERING, Tools and Techniques.
                 {\bf D.2.10}: Software, SOFTWARE ENGINEERING, Design,
                 Methodologies.",
}

@Article{Knight:1989:UMS,
  author =       "Kevin Knight",
  title =        "Unification: a Multidisciplinary Survey",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "1",
  pages =        "93--124",
  month =        mar,
  year =         "1989",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/62029.62030",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  MRclass =      "68T15 (03B35 03B70 68N17)",
  MRnumber =     "91g:68142",
  bibdate =      "Thu Jun 19 09:37:55 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/62030.html",
  abstract =     "The unification problem and several variants are
                 presented. Various algorithms and data structures are
                 discussed. Research on unification arising in several
                 areas of computer science is surveyed; these areas
                 include theorem proving, logic programming, and natural
                 language processing. Sections of the paper include
                 examples that highlight particular uses of unification
                 and the special problems encountered. Other topics
                 covered are resolution, higher order logic, the occur
                 check, infinite terms, feature structures, equational
                 theories, inheritance, parallel algorithms,
                 generalization, lattices, and other applications of
                 unification. The paper is intended for readers with a
                 general computer science background --- no specific
                 knowledge of any of the above topics is assumed.",
  acknowledgement = ack-nhfb,
  affiliation =  "Carnegie-Mellon Univ",
  affiliationaddress = "Pittsburgh, PA, USA",
  classification = "721; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; Artificial Intelligence; Computational
                 Complexity; Computer Metatheory; Equational Theories;
                 Feature Structures; Higher Order Logic; languages,
                 Automata Theory; Logic Programming; Natural Language
                 Processing; Theorem Proving",
  review =       "ACM CR 9005-0423",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving. {\bf
                 I.1.3}: Computing Methodologies, ALGEBRAIC
                 MANIPULATION, Languages and Systems, Substitution
                 mechanisms. {\bf E.1}: Data, DATA STRUCTURES, Graphs.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Pattern matching. {\bf I.2.7}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Natural Language Processing.",
}

@Article{March:1989:ATIb,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "2",
  pages =        "125--126",
  month =        jun,
  year =         "1989",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1989:AAb,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "2",
  pages =        "127--127",
  month =        jun,
  year =         "1989",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1989:EP,
  author =       "Salvatore T. March",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "2",
  pages =        "129--136",
  month =        jun,
  year =         "1989",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Sep 29 23:55:40 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Abramson:1989:CST,
  author =       "Bruce Abramson",
  title =        "Control Strategies for Two-Player Games",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "2",
  pages =        "137--161",
  month =        jun,
  year =         "1989",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/66443.66444",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  MRclass =      "90D05",
  MRnumber =     "1 072 799",
  bibdate =      "Thu Jun 19 09:38:07 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/66444.html",
  abstract =     "Computer games have been around for almost as long as
                 computers. Most of these games, however, have been
                 designed in a rather ad hoc manner because many of
                 their basic components have never been adequately
                 defined. In this paper some deficiencies in the
                 standard model of computer games, the minimax model,
                 are pointed out and the issues that a general theory
                 must address are outlined. Most of the discussion is
                 done in the context of control strategies, or sets of
                 criteria for move selection. A survey of control
                 strategies brings together results from two fields:
                 implementations of real games and theoretical
                 predictions derived on simplified game-trees. The
                 interplay between these results suggests a series of
                 open problems that have arisen during the course of
                 both analytic experimentation and practical experience
                 as the basis for a formal theory.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Southern California",
  affiliationaddress = "Los Angeles, CA, USA",
  classification = "723; 922",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; Artificial Intelligence; Computer Games;
                 Computer Programming--Algorithms; Computer
                 Software--Applications; design; experimentation; Game
                 Theory; Mathematical Techniques--Trees; Minimax Model;
                 theory, Probability",
  review =       "ACM CR 9007-0605",
  subject =      "{\bf I.2.1}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Applications and Expert Systems, Games.
                 {\bf I.6.1}: Computing Methodologies, SIMULATION AND
                 MODELING, Simulation Theory, Model classification. {\bf
                 I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Graph and tree search strategies.",
}

@Article{Ellman:1989:EBL,
  author =       "Thomas Ellman",
  title =        "Explanation-Based Learning: a Survey of Programs and
                 Perspectives",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "2",
  pages =        "163--221",
  month =        jun,
  year =         "1989",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/66443.66445",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:38:07 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/66445.html",
  abstract =     "Explanation-based learning (EBL) is a technique by
                 which an intelligent system can learn by observing
                 examples. EBL systems are characterized by the ability
                 to create justified generalizations from single
                 training instances. They are also distinguished by
                 their reliance on background knowledge of the domain
                 under study. Although EBL is usually viewed as a method
                 for performing generalization, it can be viewed in
                 other ways as well. In particular, EBL can be seen as a
                 method that performs four different learning tasks:
                 generalization, chunking, operationalization, and
                 analogy. This paper provides a general introduction to
                 the field of explanation-based learning. Considerable
                 emphasis is placed on showing how EBL combines the four
                 learning tasks mentioned above. The paper begins with a
                 presentation of an intuitive example of the EBL
                 technique. Subsequently EBL is placed in its historical
                 context and the relation between EBL and other areas of
                 machine learning is described. The major part of this
                 paper is a survey of selected EBL programs, which have
                 been chosen to show how EBL manifests each of the four
                 learning tasks. Attempts to formalize the EBL technique
                 are also briefly discussed. The paper concludes with a
                 discussion of the limitations of EBL and the major open
                 questions in the field.",
  acknowledgement = ack-nhfb,
  affiliation =  "Columbia Univ",
  affiliationaddress = "New York, NY, USA",
  classification = "723; 731",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Applications; design; experimentation, Artificial
                 Intelligence; Explanation-Based Learning (EBL);
                 Knowledge Acquisition; Systems Science and
                 Cybernetics--Learning Systems",
  subject =      "{\bf I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning.",
}

@Article{Colbourn:1989:ACD,
  author =       "Charles J. Colbourn and Paul C. {van Oorschot}",
  title =        "Applications of Combinatorial Designs in Computer
                 Science",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "2",
  pages =        "223--250",
  month =        jun,
  year =         "1989",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/66443.66446",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  MRclass =      "68Q25 (05B05 68P05 68R05 94A60)",
  MRnumber =     "91g:68078",
  bibdate =      "Thu Jun 19 09:38:07 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Mandl:1990:SF}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/66446.html",
  abstract =     "The theory of combinatorial designs has been used in
                 widely different areas of computation concerned with
                 the design and analysis of both algorithms and
                 hardware. Combinatorial designs capture a subtle
                 balancing property that is inherent in many difficult
                 problems and hence can provide a sophisticated tool for
                 addressing these problems. The role of combinatorial
                 designs in solving many problems that are basic to the
                 field of computing is explored in this paper. Case
                 studies of many applications of designs to computation
                 are given; these constitute a first survey, which
                 provides a representative sample of uses of designs.
                 More importantly, they suggest paradigms in which
                 designs can be used profitably in algorithm design and
                 analysis.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Waterloo",
  affiliationaddress = "Waterloo, Ont, Can",
  classification = "722; 723; 921",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Algorithms; Combinatorial Design Theory, algorithms;
                 Computer Programming; Computer Science; Computer
                 Systems, Digital--Parallel Processing; Data
                 Processing--File Organization; design; Mathematical
                 Techniques--Combinatorial Mathematics; reliability;
                 security; theory",
  review =       "ACM CR 9006-0507",
  subject =      "{\bf G.2.1}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Combinatorics, Combinatorial algorithms.
                 {\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory, Network problems. {\bf
                 B.6.1}: Hardware, LOGIC DESIGN, Design Styles,
                 Combinational logic. {\bf B.6.3}: Hardware, LOGIC
                 DESIGN, Design Aids. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Routing and layout. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Sorting and
                 searching.",
}

@Article{March:1989:ATIc,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "3",
  pages =        "251--251",
  month =        sep,
  year =         "1989",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wegner:1989:ISI,
  author =       "Peter Wegner",
  title =        "{Guest Editor}'s Introduction to the Special Issue on
                 Programming Language Paradigms",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "3",
  pages =        "253--258",
  month =        sep,
  year =         "1989",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:40:15 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1989:AAc,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "3",
  pages =        "259--260",
  month =        sep,
  year =         "1989",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bal:1989:PLD,
  author =       "Henri E. Bal and Jennifer G. Steiner and Andrew S.
                 Tanenbaum",
  title =        "Programming Languages for Distributed Computing
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "3",
  pages =        "261--322",
  month =        sep,
  year =         "1989",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/72551.72552",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:38:19 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.misc.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/72552.html",
  abstract =     "When distributed systems first appeared, they were
                 programmed in traditional sequential languages, usually
                 with the addition of a few library procedures for
                 sending and receiving messages. As distributed
                 applications became more commonplace and more
                 sophisticated, this ad hoc approach became less
                 satisfactory. Researchers all over the world began
                 designing new programming languages specifically for
                 implementing distributed applications. These languages
                 and their history, their underlying principles, their
                 design, and their use are the subject of this paper. We
                 begin by giving our view of what a distributed system
                 is, illustrating with examples to avoid confusion on
                 this important and controversial point. We then
                 describe the three main characteristics that
                 distinguish distributed programming languages from
                 traditional sequential languages, namely, how they deal
                 with parallelism, communication, and partial failures.
                 Finally, we discuss 15 representative distributed
                 languages to give the flavor of each. These examples
                 include languages based on message passing, rendezvous,
                 remote procedure call, objects, and atomic
                 transactions, as well as functional languages, logic
                 languages, and distributed data structure languages.
                 The paper concludes with a comprehensive bibliography
                 listing over 200 papers on nearly 100 distributed
                 programming languages.",
  acknowledgement = ack-nhfb,
  affiliation =  "Vrije Univ",
  affiliationaddress = "Amsterdam, Neth",
  annote =       "Not a great survey, but a good one. It does not
                 mention issues closer to what people think as operating
                 system issues. But, it represents a good reference
                 point with all these languages [a few of which I've
                 never heard]: ABCL/1, Act 1, Ada, Aeolus, ALPS, AMPL,
                 Argus, Avalon, Blaze, BNR Pascal, BRAVE, Camelot
                 Library, Cantor, [Concurrent CSP] CCSP, [Xerox] Cedar,
                 CLIX, Cluster 86, CMAY, Concurrent C [2], Concurrent
                 CLU, Concurrent LISP, Concurrent PROLOG, Concurrent
                 Smalltalk, CONIC, CSM, CSP-S, CSP/80, CSP, CSPS, CSSA,
                 Delta PROLOG, Dislang, Distributed Smalltalk, DP,
                 DPL-82, ECSP, Emerald, EPL, FRANK, FX-87, GDPL, GHC,
                 GYPSY, Hybrid, Joyce, LADY, LIMP, Linda, Lisptalk,
                 LYNX, MC, Mandala, Mentat, MENYMA/S, Multilisp, NIL,
                 Oc, Occam, OIL, Ondine, Orca, Orient84/K, P*, P-PROLOG,
                 ParAlfl, PARLOG, ParMod, Pascal+CSP, Pascal-FC,
                 Pascal-m, PCL, Planet, Platon, PLITS, PML, POOL, Port
                 Language, Pronet, Quty, QLISP, Raddle, RBCSP,
                 Relational Language, SDL, SINA, Sloop, SR, StarMod,
                 Symmetric LISP, Vulcan, ZENO. It still lacks, but it
                 depends on the definition of a distributed language. No
                 mention of atomicity.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Categories and Subject Descriptors: C.2.4
                 [Computer-Communications Networks]: Distributed Systems
                 - distributed applications; Computer Programming
                 Languages; Computer Systems, Digital--Distributed;
                 Concurrent Programming; D.1.3 [Programming Techniques]:
                 Concurrent Programming; D.3.3 [Programming Languages]:
                 Language constructs - concurrent programming
                 structures; D.4.7 [Operating Systems]: Organization and
                 Design - distributed systems General Terms: Languages;
                 design; Design Additional Key Words and Phrases:
                 Distributed data structures; distributed languages;
                 Distributed Programming; distributed programming;
                 Functional Programming; functional programming;
                 languages; languages for distributed programming;
                 languages for parallel programming; Logic Programming;
                 logic programming; Object Oriented Programming,
                 algorithms; object-oriented programming; Parallel
                 Programming; parallel programming; performance; special
                 issue on programming language paradigms",
  subject =      "{\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Specialized application languages.
                 {\bf D.1.3}: Software, PROGRAMMING TECHNIQUES,
                 Concurrent Programming. {\bf D.3.3}: Software,
                 PROGRAMMING LANGUAGES, Language Constructs and
                 Features, Concurrent programming structures. {\bf
                 C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Distributed applications.",
}

@Article{Carriero:1989:HWP,
  author =       "Nicholas Carriero and David Gelernter",
  title =        "How to Write Parallel Programs: a Guide to the
                 Perplexed",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "3",
  pages =        "323--357",
  month =        sep,
  year =         "1989",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/72551.72553",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:38:19 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.misc.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/72553.html",
  abstract =     "We present a framework for parallel programming, based
                 on three conceptual classes for understanding
                 parallelism and three programming paradigms for
                 implementing parallel programs. The conceptual classes
                 are result parallelism, which centers on parallel
                 computation of all elements in a data structure; agenda
                 parallelism, which specifies an agenda of tasks for
                 parallel execution; and specialist parallelism, in
                 which specialist agents solve problems cooperatively.
                 The programming paradigms center on live data
                 structures that transform themselves into result data
                 structures; distributed data structures that are
                 accessible to many processes simultaneously; and
                 message passing, in which all data objects are
                 encapsulated within explicitly communicating processes.
                 There is a rough correspondence between the conceptual
                 classes and the programming methods, as we discuss. We
                 begin by outlining the basic conceptual classes and
                 programming paradigms, and by sketching an example
                 solution under each of the three paradigms. The final
                 section develops a simple example in greater detail,
                 presenting and explaining code and discussing its
                 performance on two commercial parallel computers, an
                 18-node shared-memory multiprocessor, and a 64-node
                 distributed-memory hypercube. The middle section
                 bridges the gap between the abstract and the practical
                 by giving an overview of how the basic paradigms are
                 implemented. We focus on the paradigms, not on machine
                 architecture or programming languages: The programming
                 methods we discuss are useful on many kinds of parallel
                 machine, and each can be expressed in several different
                 parallel programming languages. Our programming
                 discussion and the examples use the parallel language
                 C-Linda for several reasons: The main paradigms are all
                 simple to express in Linda; efficient Linda
                 implementations exist on a wide variety of parallel
                 machines; and a wide variety of parallel programs have
                 been written in Linda.",
  acknowledgement = ack-nhfb,
  affiliation =  "Yale Univ",
  affiliationaddress = "New Haven, CT, USA",
  annote =       "From page 326: It is nonetheless a subtle but
                 essential point that these approaches represent three
                 clearly separate ways of thinking about the problem:
                 Result parallelism focuses on the shape of the finished
                 product; specialist parallelism focuses on the makeup
                 of the work crew; and agenda parallelism focuses on the
                 list of tasks to be performed. Also the terms:
                 message-passing, distributed data structures or live
                 data structures. Notes that it does not deal with data
                 parallelism (ala CM) nor speculative parallelism
                 (OR-parallelism). Tries to be practical, but it does
                 admit distributed programs are harder and more complex.
                 The authors distinguish between three classes of
                 parallelism, result, agenda, and specialist, and
                 between three roughly corresponding methods for
                 implementation, live data structures, distributed
                 (shared) data structures, and message passing systems.
                 The Linda model is then introduced and related to each
                 class and method, it serves as a kind of universal
                 model for describing the essential parallelism, as
                 opposed to sequential processes. An example is treated
                 in some detail.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Additional Key Words and Phrases: Linda; ag;
                 Categories and Subject Descriptors: D.1.3 [Programming
                 Techniques]: Concurrent Programming; Computer
                 Programming; Computer Systems, Digital--Parallel
                 Processing; Concurrent Programming; D.3.2 [Programming
                 Languages]: Language classifications - parallel
                 languages; D.3.3 [Programming Languages]: Language
                 constructs - concurrent programming structures; design;
                 E.1.m [Data Structures]: Miscellaneous - distributed
                 data structures; General Terms: Algorithms;
                 grecommended91; hcc; languages; live data structures;
                 Parallel Programming; parallel programming methodology;
                 parallelism; performance; Program Design; Programming
                 Paradigms; special issue on programming language
                 paradigms, Computer Programming Languages",
  review =       "ACM CR 9006-0487",
  subject =      "{\bf D.1.3}: Software, PROGRAMMING TECHNIQUES,
                 Concurrent Programming. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf D.3.3}:
                 Software, PROGRAMMING LANGUAGES, Language Constructs
                 and Features, Concurrent programming structures. {\bf
                 D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Linda. {\bf D.3.2}: Software,
                 PROGRAMMING LANGUAGES, Language Classifications, C.",
}

@Article{Hudak:1989:CEA,
  author =       "Paul Hudak",
  title =        "Conception, Evolution, and Application of Functional
                 Programming Languages",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "3",
  pages =        "359--411",
  month =        sep,
  year =         "1989",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/72551.72554",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:38:19 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.misc.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/72554.html",
  abstract =     "The foundations of functional programming languages
                 are examined from both historical and technical
                 perspectives. Their evolution is traced through several
                 critical periods: early work on lambda calculus and
                 combinatory calculus, Lisp, Iswim, FP, ML, and modern
                 functional languages such as Miranda and Haskell. The
                 fundamental premises on which the functional
                 programming methodology stands are critically analyzed
                 with respect to philosophical, theoretical, and
                 pragmatic concerns. Particular attention is paid to the
                 main features that characterize modern functional
                 languages: higher-order functions, lazy evaluation,
                 equations and pattern matching, strong static typing
                 and type inference, and data abstraction. In addition,
                 current research areas --- such as parallelism,
                 nondeterminism, input\slash output, and state-oriented
                 computations --- are examined with the goal of
                 predicting the future development and application of
                 functional languages.",
  acknowledgement = ack-nhfb,
  affiliation =  "Yale Univ",
  affiliationaddress = "New Haven, CT, USA",
  annote =       "This is the second paper in the special issue which
                 has a section on non-determinism [along with Bal, et
                 al] which begins with a statement which would sound
                 bizarre to non-programmers or those not familiar with
                 the issues of determinacy.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "ag; APL; Categories and Subject Descriptors: D.1.1
                 [Programming Techniques]: Applicative (Functional)
                 Programming; Computer Programming Languages; D.3.2
                 [Programming Languages]: Language classifications -
                 applicative languages; Data Abstraction; data-flow
                 languages; denotative [declarative] language; F.4.1
                 [Mathematical Logic and Formal Languages]: Mathematical
                 Logic - lambda calculus and related systems; FL; FP;
                 Functional Programming Languages; grecommended91;
                 Haskell; higher-order functions; Hope; Iswim; K.2
                 [History of Computing]: software General Terms:
                 Languages; KRC; Lambda Calculus; Lambda Calculus,
                 Additional Key Words and Phrases: Data abstraction;
                 languages; lazy evaluation; Lisp; Miranda; ML;
                 non-procedural languages; referential transparency;
                 SASL; special issue on programming language paradigms;
                 types; very-high-level languages",
  review =       "ACM CR 9006-0486",
  subject =      "{\bf D.1.1}: Software, PROGRAMMING TECHNIQUES,
                 Applicative (Functional) Programming. {\bf F.4.1}:
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Mathematical Logic, Lambda calculus and
                 related systems. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency. {\bf D.3.2}: Software,
                 PROGRAMMING LANGUAGES, Language Classifications,
                 Applicative languages.",
}

@Article{Shapiro:1989:FCL,
  author =       "Ehud Shapiro",
  title =        "The Family of Concurrent Logic Programming Languages",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "3",
  pages =        "413--510",
  month =        sep,
  year =         "1989",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/72551.72555",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:38:19 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.misc.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/72555.html",
  abstract =     "Concurrent logic languages are high-level programming
                 languages for parallel and distributed systems that
                 offer a wide range of both known and novel concurrent
                 programming techniques. Being logic programming
                 languages, they preserve many advantages of the
                 abstract logic programming model, including the logical
                 reading of programs and computations, the convenience
                 of representing data structures with logical terms and
                 manipulating them using unification, and the
                 amenability to metaprogramming. Operationally, their
                 model of computation consists of a dynamic set of
                 concurrent processes, communicating by instantiating
                 shared logical variables, synchronizing by waiting for
                 variables to be instantiated, and making
                 nondeterministic choices, possibly based on the
                 availability of values of variables. This paper surveys
                 the family of concurrent logic programming languages
                 within a uniform operational framework. It demonstrates
                 the expressive power of even the simplest language in
                 the family and investigates how varying the basic
                 synchronization and control constructs affect the
                 expressiveness and efficiency of the resulting
                 languages. In addition, the paper reports on techniques
                 for sequential and parallel implementation of languages
                 in this family, mentions their applications to date,
                 and relates these languages to the abstract logic
                 programming model, to the programming language PROLOG,
                 and to other concurrent computational models and
                 programming languages.",
  acknowledgement = ack-nhfb,
  affiliation =  "Weizmann Inst of Science",
  affiliationaddress = "Rehovot, Isr",
  annote =       "One of the best subsections and a reference [paper] is
                 entitled ``X = X Considered Harmful'' from a Japanese
                 paper not likely to be seen by many in the West [for
                 the Doc, distributed Oc, language]. Almost as good as
                 Backus' von Neumann liberation Turing lecture (1978).
                 Programming language types will understand the title.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Additional Key Words and Phrases: Atomic unification;
                 algorithms; Categories and Subject Descriptors: D.1.3
                 [Programming Techniques]: Concurrent Programming;
                 computational replay; Concurrent Logic Languages;
                 Concurrent Prolog; D.3.3 [Programming Languages]:
                 Language classification - ALPS; D.3.3 [Programming
                 Languages]: Language Constructs - concurrent
                 programming structures; D.4.1 [Operating Systems]:
                 Process management - concurrency; design; distributed
                 detection; Doc; don't-know and don't-care [latter
                 called indeterminism] non-determinism; F.1.2
                 [Computation by Abstract Devices]: Modes of Computation
                 - parallelism; F.3.2 [Logics and Meanings of Programs]:
                 Semantics of Programming Languages - operational
                 semantics; F.4.1 [Mathematical Logic and Formal
                 Languages]: Mathematical Logic - logic programming;
                 FCP; General Terms: Languages; guarded Horn Clauses;
                 incomplete messages; indeterminism; input matching;
                 language embedding; languages; Logic Programming; logic
                 variable; metainterpretation; mutual exclusion;
                 P-prolog; PARLOG; performance; process structures;
                 Prolog; short-circuit; snapshots; special issue on
                 programming language paradigms; streams;
                 synchronization; theory; transformational vs. reactive
                 languages, Computer Programming Languages",
  subject =      "{\bf D.1.3}: Software, PROGRAMMING TECHNIQUES,
                 Concurrent Programming. {\bf D.3.2}: Software,
                 PROGRAMMING LANGUAGES, Language Classifications, Very
                 high-level languages. {\bf D.3.3}: Software,
                 PROGRAMMING LANGUAGES, Language Constructs and
                 Features, Concurrent programming structures. {\bf
                 D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Control structures. {\bf
                 D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Prolog. {\bf F.3.2}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS, Semantics
                 of Programming Languages, Operational semantics. {\bf
                 F.4.1}: Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Mathematical Logic, Logic
                 programming. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Alternation and nondeterminism. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Parallelism and concurrency. {\bf C.1.2}:
                 Computer Systems Organization, PROCESSOR ARCHITECTURES,
                 Multiple Data Stream Architectures (Multiprocessors),
                 Parallel processors.",
}

@Article{March:1989:ATId,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "4",
  pages =        "511--512",
  month =        dec,
  year =         "1989",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1989:AAd,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "4",
  pages =        "513--513",
  month =        dec,
  year =         "1989",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Adam:1989:SCM,
  author =       "Nabil R. Adam and John C. Wortmann",
  title =        "Security-Control Methods for Statistical Databases: a
                 Comparative Study",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "4",
  pages =        "515--556",
  month =        dec,
  year =         "1989",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/76894.76895",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:38:50 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/76895.html",
  abstract =     "This paper considers the problem of providing security
                 to statistical databases against disclosure of
                 confidential information. Security-control methods
                 suggested in the literature are classified into four
                 general approaches: conceptual, query restriction, data
                 perturbation, and output perturbation. Criteria for
                 evaluating the performance of the various
                 security-control methods are identified.
                 Security-control methods that are based on each of the
                 four approaches are discussed, together with their
                 performance with respect to the identified evaluation
                 criteria. A detailed comparative analysis of the most
                 promising methods for protecting dynamic-online
                 statistical databases is also presented. To date no
                 single security-control method prevents both exact and
                 partial disclosures. There are, however, a few
                 perturbation-based methods that prevent exact
                 disclosure and enable the database administrator to
                 exercise 'statistical disclosure control.' Some of
                 these methods, however introduce bias into query
                 responses or suffer from the 0/1 query-set-size problem
                 (i.e., partial disclosure is possible in case of null
                 query set or a query set of size 1). We recommend
                 directing future research efforts toward developing new
                 methods that prevent exact disclosure and provide
                 statistical-disclosure control, while at the same time
                 do not suffer from the bias problem and the 0/1
                 query-set-size problem. Furthermore, efforts directed
                 toward developing a bias-correction mechanism and
                 solving the general problem of small query-set-size
                 would help salvage a few of the current
                 perturbation-based methods.",
  acknowledgement = ack-nhfb,
  affiliation =  "State Univ of New Jersey",
  affiliationaddress = "Newark, NJ, USA",
  annote =       "Survey examines different approaches; no single method
                 is adequate.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Data Processing--Security of Data; Database Security;
                 design; performance; Protection; security, Database
                 Systems; Statistical Databases",
  subject =      "{\bf H.2.0}: Information Systems, DATABASE MANAGEMENT,
                 General, Security, integrity, and protection. {\bf
                 H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing.",
}

@Article{Bell:1989:MTC,
  author =       "Timothy Bell and Ian H. Witten and John G. Cleary",
  title =        "Modeling for Text Compression",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "4",
  pages =        "557--591",
  month =        dec,
  year =         "1989",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/76894.76896",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:38:50 MDT 2008",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/76896.html",
  abstract =     "The best schemes for text compression use large models
                 to help them predict which characters will come next.
                 The actual next characters are coded with respect to
                 the prediction, resulting in compression of
                 information. Models are best formed adaptively, based
                 on the text seen so far. This paper surveys successful
                 strategies for adaptive modeling that are suitable for
                 use in practical text compression systems. The
                 strategies fall into three main classes: finite-context
                 modeling, in which the last few characters are used to
                 condition the probability distribution for the next
                 one; finite-state modeling, in which the distribution
                 is conditioned by the current state (and which subsumes
                 finite-context modeling as an important special case);
                 and dictionary modeling, in which strings of characters
                 are replaced by pointers into an evolving dictionary. A
                 comparison of different methods on the same sample
                 texts is included, along with an analysis of future
                 research directions.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Canterbury",
  affiliationaddress = "Christchurch, NZ",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; Arithmetic Coding; Encoding;
                 experimentation; measurement, Codes, Symbolic; Text
                 Compression",
  subject =      "{\bf E.4}: Data, CODING AND INFORMATION THEORY, Data
                 compaction and compression. {\bf H.1.1}: Information
                 Systems, MODELS AND PRINCIPLES, Systems and Information
                 Theory, Information theory.",
}

@Article{McDowell:1989:DCP,
  author =       "Charles E. McDowell and David P. Helmbold",
  title =        "Debugging Concurrent Programs",
  journal =      j-COMP-SURV,
  volume =       "21",
  number =       "4",
  pages =        "593--622",
  month =        dec,
  year =         "1989",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/76894.76897",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:38:50 MDT 2008",
  bibsource =    "ACM Computing Archive; Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.debug.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/76897.html",
  abstract =     "The main problems associated with debugging concurrent
                 programs are increased complexity, the `probe effect',
                 nonrepeatability, and the lack of a synchronized global
                 clock. The probe effect refers to the fact that any
                 attempt to observe the behavior of a distributed system
                 may change the behavior of that system. For some
                 parallel programs, different executions with the same
                 data will result in different results even without any
                 attempt to observe the behavior. Even when the behavior
                 can be observed, in many systems the lack of a
                 synchronized global clock makes the results of the
                 observation difficult to interpret. This paper
                 discusses these and other problems related to debugging
                 concurrent programs and presents a survey of current
                 techniques used in debugging concurrent programs.
                 Systems using three general techniques are described:
                 traditional or breakpoint style debuggers, event
                 monitoring systems, and static analysis systems. In
                 addition, techniques for limiting, organizing, and
                 displaying a large amount of data produced by the
                 debugging systems are discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California at Santa Cruz",
  affiliationaddress = "Santa Cruz, CA, USA",
  annote =       "Good tables surveying the field in the Appendix.
                 Thanks Charlie.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Agora; algorithms; Amoeba; belvedere; BUGNET;
                 Categories and Subject Descriptors: A.1 [General
                 Literature]: Introductory and Survey; CBUG; cdbg;
                 Computer Systems, Digital--Distributed; Concurrent
                 Programs; D.1.3 [Programming Techniques]: Concurrent
                 Programming; D.2.4 [Software Engineering]: Program
                 Verification --assertion checkers; D.2.5 [Software
                 Engineering]: Testing and Debugging -- debugging aids;
                 dbxtool; defense; design; diagnostics; DISDEB; EDL;
                 event history; HARD; IDD; Instant; Jade; languages;
                 MAD; Meglos; monitors; mtdbx; Multibug; nondeterminism;
                 parallel processing; Parasight; pdbx; performance;
                 Pilgram; PPD; probe-effect; Program Debugging; program
                 replay; program visualization; Program Visualization;
                 RADAR; Recap; static analysis; symbolic execution;
                 tracing Additional Key Words and Phrases: Distributed
                 computing; Traveler; TSL; verification; Voyeur; YODA,
                 Computer Programming",
  subject =      "{\bf D.2.5}: Software, SOFTWARE ENGINEERING, Testing
                 and Debugging. {\bf D.1.3}: Software, PROGRAMMING
                 TECHNIQUES, Concurrent Programming. {\bf D.2.4}:
                 Software, SOFTWARE ENGINEERING, Program Verification,
                 Assertion checkers.",
}

@Article{March:1990:ATIa,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1990",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1990:AAa,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "1",
  pages =        "3--3",
  month =        mar,
  year =         "1990",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{vandeGoor:1990:ODF,
  author =       "A. J. {van de Goor} and C. A. Verruijt",
  title =        "An Overview of Deterministic Functional {RAM} Chip
                 Testing",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "1",
  pages =        "5--33",
  month =        mar,
  year =         "1990",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/78949.78950",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:39:10 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/78950.html",
  abstract =     "This paper presents an overview of deterministic
                 functional RAM chip testing. Instead of the traditional
                 ad-hoc approach toward developing memory test
                 algorithms, a hierarchy of functional faults and tests
                 is presented, which is shown to cover all likely
                 functional memory faults. This is done by presenting a
                 novel way of categorizing the faults. All (possible)
                 fault combinations are discussed. Requirements are put
                 forward under which conditions a fault combination can
                 be detected. Finally, memory test algorithms that
                 satisfy the given requirements are presented.",
  acknowledgement = ack-nhfb,
  affiliation =  "Delft Univ of Technology",
  affiliationaddress = "Delft, Neth",
  classification = "713; 721; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; Automatic Testing; Computer
                 Programming--Algorithms; design; experimentation; Fault
                 Detection; Functional ram Chip Testing; Integrated
                 Circuit Testing; Memory Testing; ram Chip Testing;
                 Random Access; reliability; Test Algorithms;
                 verification, Data Storage, Digital",
  subject =      "{\bf B.3.4}: Hardware, MEMORY STRUCTURES, Reliability,
                 Testing, and Fault-Tolerance, Test generation. {\bf
                 B.7.3}: Hardware, INTEGRATED CIRCUITS, Reliability and
                 Testing, Test generation. {\bf D.4.2}: Software,
                 OPERATING SYSTEMS, Storage Management, Main memory.
                 {\bf B.7.1}: Hardware, INTEGRATED CIRCUITS, Types and
                 Design Styles, Memory technologies.",
}

@Article{Abbott:1990:RSF,
  author =       "Russell J. Abbott",
  title =        "Resourceful Systems for Fault Tolerance, Reliability,
                 and Safety",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "1",
  pages =        "35--68",
  month =        mar,
  year =         "1990",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/78949.78951",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:39:10 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Sankar:1991:SFR,Strigini:1991:SFR,Abbott:1991:SFR}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/78951.html",
  abstract =     "Above all, it is vital to recognize that completely
                 guaranteed behavior is impossible and that there are
                 inherent risks in relying on computer systems in
                 critical environments. The unforeseen consequences are
                 often the most disastrous [Neumann 1986]. Section 1 of
                 this survey reviews the current state of the art of
                 system reliability, safety, and fault tolerance. The
                 emphasis is on the contribution of software to these
                 areas. Section 2 reviews current approaches to software
                 fault tolerance. It discusses why some of the
                 assumptions underlying hardware fault tolerance do not
                 hold for software. It argues that the current software
                 fault tolerance techniques are more accurately thought
                 of as delayed debugging than as fault tolerance. It
                 goes on to show that in providing both backtracking and
                 executable specifications, logic programming offers
                 most of the tools currently used in software fault
                 tolerance. Section 3 presents a generalization of the
                 recovery block approach to software fault tolerance,
                 called resourceful systems. Systems are resourceful if
                 they are able to determine whether they have achieved
                 their goals or, if not, to develop and carry out
                 alternate plans. Section 3 develops an approach to
                 designing resourceful systems based upon a functionally
                 rich architecture and an explicit goal orientation.",
  acknowledgement = ack-nhfb,
  affiliation =  "Aerospace Corp",
  affiliationaddress = "Los Angeles, CA, USA",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; Computer Programming; design; Logic
                 Programming; N-Version Programming; Object-Oriented
                 Programming; Reliability; reliability, Computer
                 Software; Resourceful Systems; Software Fault
                 Tolerance; Software Safety",
  subject =      "{\bf D.4.5}: Software, OPERATING SYSTEMS, Reliability,
                 Fault-tolerance. {\bf D.2.4}: Software, SOFTWARE
                 ENGINEERING, Program Verification, Reliability.",
}

@Article{March:1990:ATIb,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "2",
  pages =        "69--70",
  month =        jun,
  year =         "1990",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1990:AAb,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "2",
  pages =        "71--71",
  month =        jun,
  year =         "1990",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1990:EP,
  author =       "Salvatore T. March",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "2",
  pages =        "73--81",
  month =        jun,
  year =         "1990",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Onvural:1990:SCQ,
  author =       "Raif O. Onvural",
  title =        "Survey of Closed Queueing Networks with Blocking",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "2",
  pages =        "83--121",
  month =        jun,
  year =         "1990",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/78919.78920",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:39:17 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1990.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/78920.html",
  abstract =     "Closed queueing networks are frequently used to model
                 complex service systems such as production systems,
                 communication systems, computer systems, and flexible
                 manufacturing systems. When limitations are imposed on
                 the queue sizes (i.e., finite queues), a phenomenon
                 called blocking occurs. Queueing networks with blocking
                 are, in general, difficult to treat. Exact closed form
                 solutions have been reported only in a few special
                 cases. Hence, most of the techniques that are used to
                 analyze such queueing networks are in the form of
                 approximations, numerical analysis, and simulation. In
                 this paper, we give a systematic presentation of the
                 literature related to closed queueing networks with
                 finite queues. The results are significant for both
                 researchers and practitioners.",
  acknowledgement = ack-nhfb,
  affiliation =  "BNR",
  affiliationaddress = "Research Triangle Park, NC, USA",
  annote =       "In this paper we give a systematic presentation of the
                 literature related to closed queueing networks with
                 finite queues.",
  classification = "723; 922",
  country =      "USA",
  date =         "06/08/90",
  descriptors =  "Closed queueing network; performance evaluation;
                 blocking; survey; finite capacity",
  enum =         "3866",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; Blocking; Closed Queueing Networks;
                 Computer Systems, Digital--Performance; design;
                 Industrial Plants--Flexible Manufacturing Systems;
                 Markov Models; measurement; performance; Production
                 Systems; Queueing Networks; Queueing Theory;
                 Telecommunication Systems--Performance; theory,
                 Probability",
  language =     "English",
  references =   "73",
  subject =      "{\bf G.m}: Mathematics of Computing, MISCELLANEOUS,
                 Queueing theory. {\bf D.4.8}: Software, OPERATING
                 SYSTEMS, Performance, Queueing theory. {\bf D.4.8}:
                 Software, OPERATING SYSTEMS, Performance, Simulation.
                 {\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Modeling techniques.",
}

@Article{Pawlikowski:1990:SSS,
  author =       "Krzysztof Pawlikowski",
  title =        "Steady-State Simulation of Queueing Processes: a
                 Survey of Problems and Solutions",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "2",
  pages =        "123--170",
  month =        jun,
  year =         "1990",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/78919.78921",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:39:17 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1990.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also \cite{Pawlikowski:1990:CSS}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/78921.html",
  abstract =     "For years computer-based stochastic simulation has
                 been a commonly used tool in the performance evaluation
                 of various systems. Unfortunately, the results of
                 simulation studies quite often have little credibility,
                 since they are presented without regard to their random
                 nature and the need for proper statistical analysis of
                 simulation output data. This paper discusses the main
                 factors that can affect the accuracy of stochastic
                 simulations designed to give insight into the
                 steady-state behavior of queuing processes. The
                 problems of correctly starting and stopping such
                 simulation experiments to obtain the required
                 statistical accuracy of the results are addressed. In
                 this survey of possible solutions, the emphasis is put
                 on possible applications in the sequential analysis of
                 output data, which adaptively decides about continuing
                 a simulation experiment until the required accuracy of
                 results is reached. A suitable solution for deciding
                 upon the starting point of a steady-state analysis and
                 two techniques for obtaining the final simulation
                 results to a required level of accuracy are presented,
                 together with pseudocode implementations.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Canterbury",
  affiliationaddress = "Christchurch, NZ",
  annote =       "This paper discusses the main factors that can affect
                 the accuracy of stochastic simulations designed to get
                 insight into the steady-state behaviour of queueing
                 processes.",
  classification = "723; 922",
  country =      "USA",
  date =         "06/08/90",
  descriptors =  "Simulation; queueing system; output analysis;
                 accuracy",
  enum =         "3867",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; Computer Simulation; design;
                 experimentation; performance; Queueing Theory; Steady
                 State Simulation; Stochastic Simulations; theory,
                 Probability",
  language =     "English",
  references =   "191",
  subject =      "{\bf I.6.4}: Computing Methodologies, SIMULATION AND
                 MODELING, Model Validation and Analysis. {\bf D.4.8}:
                 Software, OPERATING SYSTEMS, Performance, Simulation.
                 {\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Queueing theory. {\bf D.4.8}: Software, OPERATING
                 SYSTEMS, Performance, Stochastic analysis. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS,
                 Statistical computing. {\bf G.3}: Mathematics of
                 Computing, PROBABILITY AND STATISTICS, Statistical
                 software.",
}

@Article{Mandl:1990:SF,
  author =       "Robert Mandl",
  title =        "Surveyor's Forum: {``Applications of Combinatorial
                 Designs in Computer Science''}",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "2",
  pages =        "171--171",
  month =        jun,
  year =         "1990",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Colbourn:1989:ACD}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1990:ATIc,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "3",
  pages =        "173--173",
  month =        sep,
  year =         "1990",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Elmagarmid:1990:ISI,
  author =       "Ahmed K. Elmagarmid and Calton Pu",
  title =        "Introduction to the Special Issue on Heterogeneous
                 Databases",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "3",
  pages =        "175--178",
  month =        sep,
  year =         "1990",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:52:12 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "CTPu",
}

@Article{March:1990:AAc,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "3",
  pages =        "179--181",
  month =        sep,
  year =         "1990",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:32:26 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sheth:1990:FDS,
  author =       "Amit P. Sheth and James A. Larson",
  title =        "Federated Database Systems for Managing Distributed,
                 Heterogeneous, and Autonomous Databases",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "3",
  pages =        "183--236",
  month =        sep,
  year =         "1990",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/96602.96604",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:39:33 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Also published in/as: Bellcore, TM-STS-016302,
                 Jun.1990.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/96604.html",
  abstract =     "A federated database system (FDBS) is a collection of
                 cooperating database systems that are autonomous and
                 possibly heterogeneous. In this paper, we define a
                 reference architecture for distributed database
                 management systems from system and schema viewpoints
                 and show how various FDBS architectures can be
                 developed. We then define a methodology for developing
                 one of the popular architectures of an FDBS. Finally,
                 we discuss critical issues related to developing and
                 operating an FDBS.",
  acknowledgement = ack-nhfb,
  affiliation =  "Bellcore",
  affiliationaddress = "Piscataway, NJ, USA",
  annote =       "The paper reviews the various problem areas in
                 federated systems. Specifically schema translation,
                 access control, and schema integration. Also considered
                 are the issues of query translation for the various
                 nodes in the system. The paper also contains a good
                 introductory section on the federated model of DDBMS.
                 \ldots{} A good reference for federated database
                 systems architecture: a reference architecture,
                 customization to a specific architecture, system
                 development processes and tasks. Uses a reasonable
                 taxonomy of federated database systems. Contains many
                 bibliographic references.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; Distributed; Federated Database Systems;
                 Heterogeneous Database Systems; languages; management,
                 Database Systems",
  owner =        "curtis",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Distributed systems. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Schema
                 and subschema. {\bf D.2.10}: Software, SOFTWARE
                 ENGINEERING, Design, Methodologies. {\bf H.2.4}:
                 Information Systems, DATABASE MANAGEMENT, Systems. {\bf
                 H.2.5}: Information Systems, DATABASE MANAGEMENT,
                 Heterogeneous Databases.",
}

@Article{Thomas:1990:HDD,
  author =       "Gomer Thomas and Glenn R. Thompson and Chin-Wan Chung
                 and Edward Barkmeyer and Fred Carter and Marjorie
                 Templeton and Stephen Fox and Berl Hartman",
  title =        "Heterogeneous Distributed Database Systems for
                 Production Use",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "3",
  pages =        "237--266",
  month =        sep,
  year =         "1990",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/96602.96607",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:39:33 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/96607.html",
  abstract =     "It is increasingly important for organizations to
                 achieve additional coordination of diverse computerized
                 operations. To do so, it is necessary to have database
                 systems that can operate over a distributed network and
                 can encompass a heterogeneous mix of computers,
                 operating systems, communications links, and local
                 database management systems. This paper outlines
                 approaches to various aspects of heterogeneous
                 distributed data management and describes the
                 characteristics and architectures of seven existing
                 heterogeneous distributed database systems developed
                 for production use. The objective is a survey of the
                 state of the art in systems targeted for production
                 environments as opposed to research prototypes.",
  acknowledgement = ack-nhfb,
  affiliation =  "Bellcore",
  affiliationaddress = "Piscataway, NJ, USA",
  annote =       "Review of ADDS (AMOCO), DATAPLEX (GM), IMDAS (NTST),
                 INGRES, STAR, MERMAID, MULTIBASE, SYBASE",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Database Systems; Distributed; Heterogeneous
                 Databases; management; Production Environments, design;
                 standardization",
  review =       "ACM CR 9211-0889",
  subject =      "{\bf H.2.5}: Information Systems, DATABASE MANAGEMENT,
                 Heterogeneous Databases. {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Distributed
                 systems. {\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Distributed databases.",
}

@Article{Litwin:1990:IMA,
  author =       "Witold Litwin and Leo Mark and Nick Roussopoulos",
  title =        "Interoperability of Multiple Autonomous Databases",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "3",
  pages =        "267--293",
  month =        sep,
  year =         "1990",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/96602.96608",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:39:33 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Also published in/as: University of Maryland, Systems
                 Research Center, TR-89-12 and CS TR-2188, March 1989.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/96608.html",
  abstract =     "Database systems were a solution to the problem of
                 shared access to heterogeneous files created by
                 multiple autonomous applications in a centralized
                 environment. To make data usage easier, the files were
                 replaced by a globally integrated database. To a large
                 extent, the idea was successful, and many databases are
                 now accessible through local and long-haul networks.
                 Unavoidably, users now need shared access to multiple
                 autonomous databases. The question is what the
                 corresponding methodology should be. Should one reapply
                 the database approach to create globally integrated
                 distributed database systems or should a new approach
                 be introduced?\par

                 We argue for a new approach to solving such data
                 management system problems, called {\em multidatabase}
                 or {\em federated} systems. These systems make
                 databases interoperable, that is, usable without a
                 globally integrated schema. They preserve the autonomy
                 of each database yet support shared access.\par

                 Systems of this type will be of major importance in the
                 future. This paper first discusses why this is the
                 case. Then, it presents methodologies for their design.
                 It further shows that major commercial relational
                 database systems are evolving toward multidatabase
                 systems. The paper discusses their capabilities and
                 limitations, presents and discusses a set of
                 prototypes, and, finally, presents some current
                 research issues.",
  acknowledgement = ack-nhfb,
  affiliation =  "INRIA",
  affiliationaddress = "Fr",
  annote =       "Survey of existing federated databases, and example of
                 update transformation using MACSYMA.",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; Interoperability; languages; management,
                 Database Systems; Multiple Autonomous Databases",
  subject =      "{\bf H.2.5}: Information Systems, DATABASE MANAGEMENT,
                 Heterogeneous Databases. {\bf H.2.2}: Information
                 Systems, DATABASE MANAGEMENT, Physical Design, Access
                 methods. {\bf H.2.1}: Information Systems, DATABASE
                 MANAGEMENT, Logical Design, Schema and subschema. {\bf
                 C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Distributed databases. {\bf H.3.4}: Information
                 Systems, INFORMATION STORAGE AND RETRIEVAL, Systems and
                 Software, Information networks.",
}

@Article{March:1990:ATId,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "4",
  pages =        "295--296",
  month =        dec,
  year =         "1990",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:55:17 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1990:AAd,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "4",
  pages =        "297--297",
  month =        dec,
  year =         "1990",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:55:17 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Schneider:1990:IFT,
  author =       "Fred B. Schneider",
  title =        "Implementing Fault-Tolerant Services Using the State
                 Machine Approach: a Tutorial",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "4",
  pages =        "299--319",
  month =        dec,
  year =         "1990",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/98163.98167",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:39:57 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/98167.html",
  abstract =     "The state machine approach is a general method for
                 implementing fault-tolerant services in distributed
                 systems. This paper reviews the approach and describes
                 protocols for two different failure models ---
                 Byzantine and fail stop. Systems reconfiguration
                 techniques for removing faulty components and
                 integrating repaired components are also discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "Cornell Univ",
  affiliationaddress = "Ithaca, NY, USA",
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; Computer Networks --- Reliability; design;
                 Distributed Computing; Fault Tolerant Capability;
                 performance; Reconfiguration; reliability, Computer
                 Systems, Digital",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Reliability, availability, and
                 serviceability. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems. {\bf C.2.2}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Protocols. {\bf D.4.5}: Software, OPERATING SYSTEMS,
                 Reliability, Fault-tolerance. {\bf D.4.7}: Software,
                 OPERATING SYSTEMS, Organization and Design, Real-time
                 and embedded systems.",
}

@Article{Levy:1990:DFS,
  author =       "Eliezer Levy and Abraham Silberschatz",
  title =        "Distributed File Systems: Concepts and Examples",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "4",
  pages =        "321--374",
  month =        dec,
  year =         "1990",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/98163.98169",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:39:57 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/98169.html",
  abstract =     "The purpose of a distributed file system (DFS) is to
                 allow users of physically distributed computers to
                 share data and storage resources by using a common file
                 system. A typical configuration for a DFS is a
                 collection of workstations and mainframes connected by
                 a local area network (LAN). A DFS is implemented as
                 part of the operating system of each of the connected
                 computers. This paper establishes a viewpoint that
                 emphasizes the dispersed structure and decentralization
                 of both data and control in the design of such systems.
                 It defines the concepts of transparency, fault
                 tolerance, and scalability and discusses them in the
                 context of DFSs. The paper claims that the principle of
                 distributed operation is fundamental for a fault
                 tolerant and scalable DFS design. It also presents
                 alternatives for the semantics of sharing and methods
                 for providing access to remote files. A survey of
                 contemporary UNIX-based systems, namely, UNIX United,
                 Locus, Sprite, Sun's Network File System, and ITC's
                 Andrew, illustrates the concepts and demonstrates
                 various implementations and design alternatives. Based
                 on the assessment of these systems, the paper makes the
                 point that a departure from the approach of extending
                 centralized file systems over a communication network
                 is necessary to accomplish sound distributed file
                 system design.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Texas at Austin",
  affiliationaddress = "Austin, TX, USA",
  annote =       "UNIX United, Locus, Sprite, SNFS, ITC's Andrew, a
                 departure is necessary to accomplish sound distributed
                 file system design; topics: location transparency and
                 independence, naming, caching, stateful vs stateless
                 service, availability, replication, scalability,
                 lightweight processes",
  classification = "722; 723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Computer Operating Systems; design; Distributed;
                 Distributed File Systems; reliability, Computer
                 Systems, Digital; Shared Data; Shared Storage",
  subject =      "{\bf D.4.3}: Software, OPERATING SYSTEMS, File Systems
                 Management, Distributed file systems. {\bf C.2.5}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Local Networks. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Network operating systems. {\bf
                 D.4.2}: Software, OPERATING SYSTEMS, Storage
                 Management. {\bf D.4.4}: Software, OPERATING SYSTEMS,
                 Communications Management, Network communication.",
}

@Article{Katz:1990:TUF,
  author =       "Randy H. Katz",
  title =        "Toward a Unified Framework for Version Modeling in
                 Engineering Databases",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "4",
  pages =        "375--408",
  month =        dec,
  year =         "1990",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/98163.98172",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:39:57 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/98172.html",
  abstract =     "Support for unusual applications such as
                 computer-aided design data has been of increasing
                 interest to database system architects. In this survey,
                 we concentrate on one aspect of such support, namely,
                 {\em version modeling}. By this, we mean the concepts
                 suitable for structuring a database of complex
                 engineering artifacts that evolve across multiple
                 representations and over time and the operations
                 through which such artifact descriptions are created
                 and modified. There have been many proposals for new
                 models and mechanisms to support such concepts within
                 database data models in general and engineering data
                 models in particular; here we not only describe such
                 proposals; we also unify them. We do not propose yet
                 another model but provide a common terminology and
                 collection of mechanisms that underlie any approach for
                 representing engineering design information in a
                 database. The key remaining challenge is to construct a
                 single framework, based on these mechanisms, which can
                 be tailored for the needs of a given version
                 environment.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California",
  affiliationaddress = "Berkeley, CA, USA",
  annote =       "component hierarchies (PART-OF), version histories
                 (IS-DERIVED FROM), configurations, equivalencies of
                 multifaceted data, a variety of representations are
                 needed to describe a design artifact fully",
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "cad Databases; Computer Aided Design; design;
                 Engineering Databases; performance; theory, Database
                 Systems; Version Modeling",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models. {\bf J.6}: Computer
                 Applications, COMPUTER-AIDED ENGINEERING,
                 Computer-aided design (CAD). {\bf H.2.8}: Information
                 Systems, DATABASE MANAGEMENT, Database applications.
                 {\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Object-oriented languages.",
}

@Article{Pawlikowski:1990:CSS,
  author =       "Krzysztof Pawlikowski",
  title =        "Corrigenda: {``Steady-State Simulation of Queueing
                 Processes: A Survey of Problems and Solutions''}",
  journal =      j-COMP-SURV,
  volume =       "22",
  number =       "4",
  pages =        "409--409",
  month =        dec,
  year =         "1990",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 22:33:58 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Pawlikowski:1990:SSS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1991:ATIa,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1991",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:58:43 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1991:AAa,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "1",
  pages =        "3--3",
  month =        mar,
  year =         "1991",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:58:43 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1991:WEC,
  author =       "David Goldberg",
  title =        "What Every Computer Scientist Should Know About
                 Floating-Point Arithmetic",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "1",
  pages =        "5--48",
  month =        mar,
  year =         "1991",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/103162.103163",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:40:16 MDT 2008",
  bibsource =    "ftp://garbo.uwasa.fi/pc/doc-soft/fpbibl18.zip;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See also
                 \cite{Goldberg:1991:CWE,Dunham:1992:SFW,Wichmann:1992:SFW}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/103163.html",
  abstract =     "Floating-point arithmetic is considered an esoteric
                 subject by many people. This is rather surprising,
                 because floating-point is ubiquitous in computer
                 systems: almost every language has a floating-point
                 datatype; computers from PCs to supercomputers have
                 floating-point accelerators; most compilers will be
                 called upon to compile floating-point algorithms from
                 time to time; and virtually every operating system must
                 respond to floating-point exceptions such as overflow.
                 This paper presents a tutorial on the aspects of
                 floating-point that have a direct impact on designers
                 of computer systems. It begins with background on
                 floating-point representation and rounding error,
                 continues with a discussion of the IEEE floating-point
                 standard, and concludes with examples of how computer
                 system builders can better support floating point.",
  acknowledgement = ack-nhfb # " and " # ack-nj,
  affiliation =  "Xerox Palo Alto Res. Center, CA, USA",
  classification = "C5230 (Digital arithmetic methods)",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; compilers; computer scientist; computer
                 systems; denormalized number; design; exception;
                 floating-point; floating-point accelerators;
                 floating-point algorithms; floating-point datatype;
                 floating-point exceptions; floating-point
                 representation; floating-point standard; gradual
                 underflow; guard digit; IEEE floating-point standard;
                 languages; NaN; operating system; overflow; PCs;
                 relative error; rounding error; rounding mode;
                 standardization; supercomputers; ulp; underflow",
  subject =      "{\bf G.1.0}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, General, Computer arithmetic. {\bf K.1}:
                 Computing Milieux, THE COMPUTER INDUSTRY, Standards.
                 {\bf C.0}: Computer Systems Organization, GENERAL,
                 Instruction set design. {\bf G.1.0}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, General, Numerical
                 algorithms.",
  thesaurus =    "digital arithmetic; roundoff errors",
}

@Article{Andrews:1991:PPI,
  author =       "Gregory R. Andrews",
  title =        "Paradigms for Process Interaction in Distributed
                 Programs",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "1",
  pages =        "49--90",
  month =        mar,
  year =         "1991",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/103162.103164",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:40:16 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/cmubib.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/103164.html",
  abstract =     "Distributed computations are concurrent programs in
                 which processes communicate by message passing. Such
                 programs typically execute on network architectures
                 such as networks of workstations or distributed memory
                 parallel machines (i.e., multicomputers such as
                 hypercubes). Several paradigms --- examples or models
                 --- for process interaction in distributed computations
                 are described. These include networks of filters,
                 clients, and servers, heartbeat algorithms, probe/echo
                 algorithms, broadcast algorithms, token-passing
                 algorithms, decentralized servers, and bags of tasks.
                 These paradigms are appliable to numerous practical
                 problems. They are illustrated by solving problems,
                 including parallel sorting, file servers, computing the
                 topology of a network, distributed termination
                 detection, replicated databases, and parallel adaptive
                 quadrature. Solutions to all problems are derived in a
                 step-wise fashion from a general specification of the
                 problem to a concrete solution. The derivations
                 illustrate techniques for developing distributed
                 algorithms.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; clients and servers; design; distributed
                 and parallel algorithms; distributed programming;
                 distributed programming methods; heartbeat algorithms;
                 networks of filters; patterns for interprocess
                 communication; probe/echo algorithms; replicated
                 servers; token-passing algorithms",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Distributed applications. {\bf C.1.2}: Computer Systems
                 Organization, PROCESSOR ARCHITECTURES, Multiple Data
                 Stream Architectures (Multiprocessors),
                 Multiple-instruction-stream, multiple-data-stream
                 processors (MIMD). {\bf D.1.3}: Software, PROGRAMMING
                 TECHNIQUES, Concurrent Programming, Distributed
                 programming. {\bf D.4.4}: Software, OPERATING SYSTEMS,
                 Communications Management, Message sending. {\bf
                 D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Concurrency.",
}

@Article{Chin:1991:DOB,
  author =       "Roger S. Chin and Samuel T. Chanson",
  title =        "Distributed, object-based programming systems",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "1",
  pages =        "91--124",
  month =        mar,
  year =         "1991",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/103162.103165",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:40:16 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/103165.html",
  abstract =     "The development of distributed operating systems and
                 object-based programming languages makes possible an
                 environment in which programs consisting of a set of
                 interacting modules, or objects, may execute
                 concurrently on a collection of loosely coupled
                 processors. An object-based programming language
                 encourages a methodology for designing and creating a
                 program as a set of autonomous components, whereas a
                 distributed operating system permits a collection of
                 workstations or personal computers to be treated as a
                 single entity. The amalgamation of these two concepts
                 has resulted in systems that shall be referred to as
                 {\em distributed}, {\em object-based programming
                 systems}.\par

                 This paper discusses issues in the design and
                 implementation of such systems. Following the
                 presentation of fundamental concepts and various object
                 models, issues in object management, object interaction
                 management, and physical resource management are
                 discussed. Extensive examples are drawn from existing
                 systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "capability scheme; design; distributed operating
                 systems; error recovery; languages; method invocation;
                 nested transaction; object model; object reliability;
                 object-based programming languages; processor
                 allocation; resource management; synchronization;
                 transaction",
  subject =      "{\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Object-oriented languages. {\bf
                 D.1.3}: Software, PROGRAMMING TECHNIQUES, Concurrent
                 Programming, Distributed programming. {\bf C.2.4}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Distributed Systems. {\bf D.3.3}: Software,
                 PROGRAMMING LANGUAGES, Language Constructs and
                 Features, Concurrent programming structures.",
}

@Article{Sankar:1991:SFR,
  author =       "S. Sankar and D. S. Rosenblum",
  title =        "Surveyor's Forum: Runtime Checking and Debugging of
                 Formally Specified Programs",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "1",
  pages =        "125--127",
  month =        mar,
  year =         "1991",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/103162.103166",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:40:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Abbott:1990:RSF,Abbott:1991:SFR,Strigini:1991:SFR}.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/103166.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; design; languages",
  subject =      "{\bf D.2.5}: Software, SOFTWARE ENGINEERING, Testing
                 and Debugging, Debugging aids. {\bf D.3.4}: Software,
                 PROGRAMMING LANGUAGES, Processors, Run-time
                 environments. {\bf F.3.1}: Theory of Computation,
                 LOGICS AND MEANINGS OF PROGRAMS, Specifying and
                 Verifying and Reasoning about Programs.",
}

@Article{March:1991:ATIb,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "2",
  pages =        "129--129",
  month =        jun,
  year =         "1991",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:58:43 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1991:AAb,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "2",
  pages =        "131--131",
  month =        jun,
  year =         "1991",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:58:43 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1991:EP,
  author =       "Salvatore T. March",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "2",
  pages =        "133--141",
  month =        jun,
  year =         "1991",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:58:43 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shahookar:1991:VCP,
  author =       "K. Shahookar and P. Mazumder",
  title =        "{VLSI} Cell Placement Techniques",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "2",
  pages =        "143--220",
  month =        jun,
  year =         "1991",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/103724.103725",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:40:41 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/103725.html",
  abstract =     "VLSI cell placement problem is known to be NP
                 complete. A wide repertoire of heuristic algorithms
                 exists in the literature for efficiently arranging the
                 logic cells on a VLSI chip. The objective of this paper
                 is to present a comprehensive survey of the various
                 cell placement techniques, with emphasis on standard
                 cell and macro placement. Five major algorithms for
                 placement are discussed: simulated annealing,
                 force-directed placement, min-cut placement, placement
                 by numerical optimization, and evolution-based
                 placement. The first two classes of algorithms owe
                 their origin to physical laws, the third and fourth are
                 analytical techniques, and the fifth class of
                 algorithms is derived from biological phenomena. In
                 each category, the basic algorithm is explained with
                 appropriate examples. Also discussed are the different
                 implementations done by researchers.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; design; floor planning; force-directed
                 placement; gate array; genetic algorithm; integrated
                 circuits; layout; min-cut; performance; physical
                 design; placement; simulated annealing; standard cell;
                 VLSI",
  subject =      "{\bf B.7.2}: Hardware, INTEGRATED CIRCUITS, Design
                 Aids, Placement and routing. {\bf B.7.1}: Hardware,
                 INTEGRATED CIRCUITS, Types and Design Styles, VLSI
                 (very large scale integration). {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Routing and layout.",
}

@Article{Abeysundara:1991:HSL,
  author =       "Bandula W. Abeysundara and Ahmed E. Kamal",
  title =        "High-Speed Local Area Networks and Their Performance:
                 a Survey",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "2",
  pages =        "221--264",
  month =        jun,
  year =         "1991",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/103724.103726",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:40:41 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1991.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/103726.html",
  abstract =     "At high data transmission rates, the packet
                 transmission time of a local area network (LAN) could
                 become comparable to or less than the medium
                 propagation delay. The performance of many LAN schemes
                 degrades rapidly when the packet transmission time
                 becomes small comparative to the medium propagation
                 delay. This paper introduces LANs and discusses the
                 performance degradation of LANs at high speeds. It
                 surveys recently proposed LAN schemes designed to
                 operate at high data rates, including their performance
                 characteristics desirable in LAN medium access
                 protocols are identified and discussed. The paper
                 serves as a tutorial for readers less familiar with
                 local computer communication networks. It also serves
                 as a survey of the state-of-the-art LANs.",
  acknowledgement = ack-nhfb,
  annote =       "This paper introduces LANs and discusses the
                 performance degradation of LANs at high speeds. It
                 surveys recently proposed LAN schemes designed to
                 operate at high data rates, including their
                 performances characteristics.",
  country =      "USA",
  date =         "18/08/91",
  descriptors =  "HSLAN; survey; performance evaluation",
  enum =         "4260",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "access schemes; computer networks; data communication;
                 design; medium access protocols; optical fiber
                 networks; performance",
  language =     "English",
  references =   "122",
  subject =      "{\bf C.2.5}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Local Networks. {\bf
                 C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
                 {\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Data
                 communications. {\bf C.4}: Computer Systems
                 Organization, PERFORMANCE OF SYSTEMS, Performance
                 attributes.",
}

@Article{March:1991:ATIc,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "3",
  pages =        "265--266",
  month =        sep,
  year =         "1991",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:58:43 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1991:AAc,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "3",
  pages =        "267--267",
  month =        sep,
  year =         "1991",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:58:43 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Barghouti:1991:CCA,
  author =       "Naser S. Barghouti and Gail E. Kaiser",
  title =        "Concurrency Control in Advanced Database
                 Applications",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "3",
  pages =        "269--317",
  month =        sep,
  year =         "1991",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/116873.116875",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:40:54 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/116875.html",
  abstract =     "Concurrency control has been thoroughly studied in the
                 context of traditional database applications such as
                 banking and airline reservations systems. There are
                 relatively few studies, however, that address the
                 concurrency control issues of advanced database
                 applications such as CAD/CAM and software development
                 environments. The concurrency control requirements in
                 such applications are different from those in
                 conventional database applications; in particular,
                 there is a need to support nonserializable cooperation
                 among users whose transactions are long-lived and
                 interactive and to integrate concurrency control
                 mechanisms with version and configuration control. This
                 paper outlines the characteristics of data and
                 operations in some advanced database applications,
                 discusses their concurrency control requirements, and
                 surveys the mechanisms proposed to address these
                 requirements.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "advanced database applications; algorithms;
                 concurrency control; cooperative transactions; design;
                 design environments; extended transaction models; long
                 transactions; management; object-oriented databases;
                 relaxing serializability",
  owner =        "soo",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Concurrency. {\bf H.2.4}: Information Systems,
                 DATABASE MANAGEMENT, Systems, Transaction processing.
                 {\bf H.2.8}: Information Systems, DATABASE MANAGEMENT,
                 Database applications.",
}

@Article{Galil:1991:DSA,
  author =       "Zvi Galil and Giuseppe F. Italiano",
  title =        "Data Structures and Algorithms for Disjoint Set Union
                 Problems",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "3",
  pages =        "319--344",
  month =        sep,
  year =         "1991",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/116873.116878",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:40:54 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/116878.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; equivalence algorithm; find and union
                 operations algorithm design analysis; partition; set
                 union; theory; time complexity",
  subject =      "{\bf E.1}: Data, DATA STRUCTURES. {\bf F.2.2}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures.",
}

@Article{Aurenhammer:1991:VDS,
  author =       "Franz Aurenhammer",
  title =        "{Voronoi} Diagrams: a Survey of a Fundamental
                 Geometric Data Structure",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "3",
  pages =        "345--405",
  month =        sep,
  year =         "1991",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/116873.116880",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:40:54 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/116880.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; arrangements; cell complex; cluster
                 analysis; clustering; combinatorial complexity; convex
                 hull; crystal structure; Delaunay triangulations;
                 divide-and-conquer; geometric data structure; growth
                 model; higher dimensional embedding; hyperplane
                 arrangement; hyperplanes; k-set; minimum spanning
                 trees; motion planning; neighbor searching; object
                 modeling; parallel computation; plane sweep;
                 plane-sweep; proximity; randomized insertion; spanning
                 tree; survey paper; theory; triangulation; Voronoi
                 diagrams",
  oldlabel =     "geom-2467.3",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf E.1}: Data, DATA STRUCTURES.",
  succeeds =     "a-vdsfg-90",
}

@Article{Strigini:1991:SFR,
  author =       "Lorenzo Strigini",
  title =        "Surveyor's Forum: {``Resourceful Systems for Fault
                 Tolerance, Reliability, and Safety''}",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "3",
  pages =        "407--409",
  month =        sep,
  year =         "1991",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:58:43 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Abbott:1990:RSF,Sankar:1991:SFR,Abbott:1991:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Abbott:1991:SFR,
  author =       "Russell Abbott",
  title =        "Surveyor's Forum: {``Resourceful Systems for Fault
                 Tolerance, Reliability, and Safety''}",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "3",
  pages =        "409--411",
  month =        sep,
  year =         "1991",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:58:43 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Abbott:1990:RSF,Sankar:1991:SFR,Strigini:1991:SFR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldberg:1991:CWE,
  author =       "David Goldberg",
  title =        "Corrigendum: {``What Every Computer Scientist Should
                 Know About Floating-Point Arithmetic''}",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "3",
  pages =        "413--413",
  month =        sep,
  year =         "1991",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 09:58:43 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  note =         "See
                 \cite{Goldberg:1991:WEC,Dunham:1992:SFW,Wichmann:1992:SFW}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1991:ATId,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "4",
  pages =        "417--418",
  month =        dec,
  year =         "1991",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:12:08 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1991:AAd,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "4",
  pages =        "419--419",
  month =        dec,
  year =         "1991",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:12:08 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Stytz:1991:TDM,
  author =       "M. R. Stytz and G. Frieder and O. Frieder",
  title =        "Three-Dimensional Medical Imaging: Algorithms and
                 Computer Systems",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "4",
  pages =        "421--499",
  month =        dec,
  year =         "1991",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/125137.125155",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:41:25 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/125155.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; Computer graphics; data model processing
                 shading antialiasing hidden-surface removal ray tracing
                 image segmentation surface tracking; design;
                 experimentation; medical imaging; performance; surface
                 rendering; three-dimensional imaging; volume
                 rendering",
  subject =      "{\bf J.3}: Computer Applications, LIFE AND MEDICAL
                 SCIENCES. {\bf I.3.7}: Computing Methodologies,
                 COMPUTER GRAPHICS, Three-Dimensional Graphics and
                 Realism. {\bf I.3.2}: Computing Methodologies, COMPUTER
                 GRAPHICS, Graphics Systems. {\bf C.5.0}: Computer
                 Systems Organization, COMPUTER SYSTEM IMPLEMENTATION,
                 General. {\bf C.1.0}: Computer Systems Organization,
                 PROCESSOR ARCHITECTURES, General.",
}

@Article{McKenzie:1991:ERA,
  author =       "L. Edwin {McKenzie, Jr.} and Richard Thomas
                 Snodgrass",
  title =        "Evaluation of Relational Algebras Incorporating the
                 Time Dimension in Databases",
  journal =      j-COMP-SURV,
  volume =       "23",
  number =       "4",
  pages =        "501--543",
  month =        dec,
  year =         "1991",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/125137.125166",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:41:25 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/125166.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "aggregate; chronon; design; historical relation;
                 homogeneity; languages; performance; query
                 optimization; snapshot relation; Temporal Query
                 Languages 26 Criteria; transaction time; valid time",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Normal
                 forms. {\bf H.2.1}: Information Systems, DATABASE
                 MANAGEMENT, Logical Design, Schema and subschema. {\bf
                 H.2.3}: Information Systems, DATABASE MANAGEMENT,
                 Languages, Data manipulation languages (DML). {\bf
                 H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing. {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Transaction
                 processing. {\bf H.4.1}: Information Systems,
                 INFORMATION SYSTEMS APPLICATIONS, Office Automation.
                 {\bf F.4.1}: Theory of Computation, MATHEMATICAL LOGIC
                 AND FORMAL LANGUAGES, Mathematical Logic.",
}

@Article{March:1992:ATIa,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1992",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:14:37 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1992:AAa,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "1",
  pages =        "3--3",
  month =        mar,
  year =         "1992",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:14:37 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Suetens:1992:CSO,
  author =       "Paul Suetens and Pascal Fua and Andrew J. Hanson",
  title =        "Computational Strategies for Object Recognition",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "1",
  pages =        "5--61",
  month =        mar,
  year =         "1992",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/128762.128763",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:41:49 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/128763.html",
  abstract =     "This article reviews the available methods for
                 automated identification of objects in digital images.
                 The techniques are classified into groups according to
                 the nature of the computational strategy used. Four
                 classes are proposed: (1) the simplest strategies,
                 which work on data appropriate for feature vector
                 classification, (2) methods that match models to
                 symbolic data structures for situations involving
                 reliable data and complex models, (3) approaches that
                 fit models to the photometry and are appropriate for
                 noisy data and simple models, and (4) combinations of
                 these strategies, which must be adopted in complex
                 situations. Representative examples of various methods
                 are summarized, and the classes of strategies with
                 respect to their appropriateness for particular
                 applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; design; experimentation; image
                 understanding; model-based vision; object recognition;
                 theory",
  subject =      "{\bf I.5.4}: Computing Methodologies, PATTERN
                 RECOGNITION, Applications, Computer vision. {\bf
                 I.2.10}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Vision and Scene Understanding,
                 Architecture and control structures. {\bf I.2.10}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Vision and Scene Understanding, Modeling and recovery
                 of physical attributes. {\bf I.2.10}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Vision and
                 Scene Understanding, Representations, data structures,
                 and transforms. {\bf I.2.10}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Vision and Scene
                 Understanding, Shape. {\bf I.4.8}: Computing
                 Methodologies, IMAGE PROCESSING, Scene Analysis. {\bf
                 I.4.7}: Computing Methodologies, IMAGE PROCESSING,
                 Feature Measurement.",
}

@Article{Mishra:1992:JPR,
  author =       "Priti Mishra and Margaret H. Eich",
  title =        "Join Processing in Relational Databases",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "1",
  pages =        "63--113",
  month =        mar,
  year =         "1992",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/128762.128764",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:41:49 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/128764.html",
  abstract =     "The join operation is one of the fundamental
                 relational database query operations. It facilitates
                 the retrieval of information from two different
                 relations based on a Cartesian product of the two
                 relations. The join is one of the most difficult
                 operations to implement efficiently, as no predefined
                 links between relations are required to exist (as they
                 are with network and hierarchical systems). The join is
                 the only relational algebra operation that allows the
                 combining of related tuples from relations on different
                 attribute schemes. Since it is executed frequently and
                 is expensive, much research effort has been applied to
                 the optimization of join processing. In this paper, the
                 different kinds of joins and the various implementation
                 techniques are surveyed. These different methods are
                 classified based on how they partition tuples from
                 different relations. Some require that all tuples from
                 one be compared to all tuples from another; other
                 algorithms only compare some tuples from each. In
                 addition, some techniques perform an explicit
                 partitioning, whereas others are implicit.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; database machines; design; distributed
                 processing; join; outer joins; parallel processing;
                 performance; query execution; relational algebra;
                 semi-join; theory",
  owner =        "soo",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Data
                 models.",
}

@Article{March:1992:EP,
  author =       "Salvatore T. March",
  title =        "Editorial Policy",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "2",
  pages =        "117--125",
  month =        jun,
  year =         "1992",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:14:37 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1992:ATIb,
  author =       "Salvatore T. March",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "2",
  pages =        "127--128",
  month =        jun,
  year =         "1992",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:14:37 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{March:1992:AAb,
  author =       "Salvatore T. March",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "2",
  pages =        "129--129",
  month =        jun,
  year =         "1992",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:14:37 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Krueger:1992:SR,
  author =       "Charles W. Krueger",
  title =        "Software Reuse",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "2",
  pages =        "131--183",
  month =        jun,
  year =         "1992",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/130844.130856",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:42:15 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/obscure.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/130856.html",
  abstract =     "Software reuse is the process of creating software
                 systems from existing software rather than building
                 software systems from scratch. This simple yet powerful
                 vision was introduced in 1968. Software reuse has,
                 however, failed to become a standard software
                 engineering practice. In an attempt to understand why,
                 researchers have renewed their interest in software
                 reuse and in the obstacles to implementing it.\par

                 This paper surveys the different approaches to software
                 reuse found in the research literature. It uses a
                 taxonomy to describe and compare the different
                 approaches and make generalizations about the field of
                 software reuse. The taxonomy characterizes each reuse
                 approach in terms of its reusable {\em artifacts} and
                 the way these artifacts are {\em abstracted, selected,
                 specialized}, and {\em integrated}.\par

                 Abstraction plays a central role in software reuse.
                 Concise and expressive abstractions are essential if
                 software artifacts are to be effectively reused. The
                 effectiveness of a reuse technique can be evaluated in
                 terms of {\em cognitive distance}---an intuitive gauge
                 of the intellectual effort required to use the
                 technique. Cognitive distance is reduced in two ways:
                 (1) Higher level abstractions in a reuse technique
                 reduce the effort required to go from the initial
                 concept of a software system to representations in the
                 reuse technique, and (2) automation reduces the effort
                 required to go from abstractions in a reuse technique
                 to an executable implementation.\par

                 This survey will help answer the following questions:
                 What is software reuse? Why reuse software? What are
                 the different approaches to reusing software? How
                 effective are the different approaches? What is
                 required to implement a software reuse technology? Why
                 is software reuse difficult? What are the open areas
                 for research in software reuse?",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "abstraction; cognitive distance; design; economics;
                 languages; software reuse",
  subject =      "{\bf D.2.m}: Software, SOFTWARE ENGINEERING,
                 Miscellaneous, Reusable software. {\bf D.1.0}:
                 Software, PROGRAMMING TECHNIQUES, General. {\bf D.2.2}:
                 Software, SOFTWARE ENGINEERING, Tools and Techniques,
                 Modules and interfaces. {\bf D.2.2}: Software, SOFTWARE
                 ENGINEERING, Tools and Techniques, Programmer
                 workbench. {\bf D.2.2}: Software, SOFTWARE ENGINEERING,
                 Tools and Techniques, Software libraries. {\bf D.3.2}:
                 Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Specialized application languages.
                 {\bf D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Very high-level languages. {\bf
                 D.3.4}: Software, PROGRAMMING LANGUAGES, Processors.
                 {\bf H.3.1}: Information Systems, INFORMATION STORAGE
                 AND RETRIEVAL, Content Analysis and Indexing,
                 Abstracting methods. {\bf H.3.1}: Information Systems,
                 INFORMATION STORAGE AND RETRIEVAL, Content Analysis and
                 Indexing, Indexing methods. {\bf D.2.1}: Software,
                 SOFTWARE ENGINEERING, Requirements/Specifications. {\bf
                 H.3.3}: Information Systems, INFORMATION STORAGE AND
                 RETRIEVAL, Information Search and Retrieval. {\bf A.1}:
                 General Literature, INTRODUCTORY AND SURVEY.",
}

@Article{BrinchHansen:1992:HRL,
  author =       "Per {Brinch Hansen}",
  title =        "{Householder} Reduction of Linear Equations",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "2",
  pages =        "185--194",
  month =        jun,
  year =         "1992",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/130844.130851",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:42:15 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/130851.html",
  abstract =     "This tutorial discusses Householder reduction of n
                 linear equations to a triangular form which can be
                 solved by back substitution. The main strength of the
                 method is its unconditional numerical stability. We
                 explain how Householder reduction can be derived from
                 elementary-matrix algebra. The method is illustrated by
                 a numerical example and a Pascal procedure. We assume
                 that the reader has a general knowledge of vector and
                 matrix algebra but is less familiar with linear
                 transformation of a vector space.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; Householder reduction",
  subject =      "{\bf G.1.3}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, Numerical Linear Algebra, Linear systems
                 (direct and iterative methods).",
}

@Article{McGeoch:1992:AAS,
  author =       "Catherine McGeoch",
  title =        "Analyzing Algorithms by Simulation: Variance Reduction
                 Techniques and Simulation Speedups",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "2",
  pages =        "195--212",
  month =        jun,
  year =         "1992",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/130844.130853",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:42:15 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1992.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/130853.html",
  abstract =     "Although experimental studies have been widely applied
                 to the investigation of algorithm performance, very
                 little attention has been given to experimental method
                 in this area. This is unfortunate, since much can be
                 done to improve the quality of the data obtained;
                 often, much improvement may be needed for the data to
                 be useful. This paper gives a tutorial discussion of
                 two aspects of good experimental technique: the use of
                 {\em variance reduction techniques} and {\em simulation
                 speedups} in algorithm studies.\par

                 In an illustrative study, application of variance
                 reduction techniques produces a decrease in variance by
                 a factor 1000 in one case, giving a dramatic
                 improvement in the precision of experimental results.
                 Furthermore, the complexity of the simulation program
                 is improved from $ \Theta (m n / H_n) $ to $ \Theta (m
                 + n \log n) $ (where $m$ is typically much larger than
                 $n$ ), giving a much faster simulation program and
                 therefore more data per unit of computation time. The
                 general application of variance reduction techniques is
                 also discussed for a variety of algorithm problem
                 domains.",
  acknowledgement = ack-nhfb,
  annote =       "This paper documents the power of variance reduction
                 techniques for algorithm problems and provides tutorial
                 discussion. Since even complex heuristic algorithms
                 tend to have precise mathematical specifications and a
                 great deal of structure, there is much potential for
                 exploiting partial understanding of the underlying
                 model.",
  country =      "USA",
  date =         "09/12/92",
  descriptors =  "Analysis; algorithm; simulation; variance reduction;
                 variance; speedup",
  enum =         "5196",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; experimental analysis of algorithms;
                 experimentation; move-to-front rule; performance;
                 self-organizing sequential search; statistical analysis
                 of algorithms; transpose rule; variance reduction
                 techniques",
  language =     "English",
  references =   "42",
  subject =      "{\bf I.6.8}: Computing Methodologies, SIMULATION AND
                 MODELING, Types of Simulation, Discrete event. {\bf
                 I.6.3}: Computing Methodologies, SIMULATION AND
                 MODELING, Applications. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Sorting and searching. {\bf G.3}: Mathematics of
                 Computing, PROBABILITY AND STATISTICS.",
}

@Article{Muntz:1992:PN,
  author =       "Richard R. Muntz",
  title =        "A Personal Note",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "3",
  pages =        "213--214",
  month =        sep,
  year =         "1992",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:14:37 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Muntz:1992:ATIa,
  author =       "Richard R. Muntz",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "3",
  pages =        "215--215",
  month =        sep,
  year =         "1992",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:14:37 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Muntz:1992:AAa,
  author =       "Richard R. Muntz",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "3",
  pages =        "217--217",
  month =        sep,
  year =         "1992",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:14:37 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hwang:1992:GMP,
  author =       "Yong K. Hwang and Narendra Ahuja",
  title =        "Gross Motion Planning --- a Survey",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "3",
  pages =        "219--291",
  month =        sep,
  year =         "1992",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/136035.136037",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:42:45 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/136037.html",
  abstract =     "Motion planning is one of the most important areas of
                 robotics research. The complexity of the
                 motion-planning problem has hindered the development of
                 practical algorithms. This paper surveys the work on
                 gross-motion planning, including motion planners for
                 point robots, rigid robots, and manipulators in
                 stationary, time-varying, constrained, and
                 movable-object environments. The general issues in
                 motion planning are explained. Recent approaches and
                 their performances are briefly described, and possible
                 future research directions are discussed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; collision detection; computational
                 geometry; implementation; motion planning; obstacle
                 avoidance; path planning; spatial representation;
                 theory",
  subject =      "{\bf I.2.9}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Robotics, Manipulators. {\bf I.2.10}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Vision and Scene Understanding, Motion. {\bf I.2.8}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Problem Solving, Control Methods, and Search, Graph and
                 tree search strategies. {\bf I.2.8}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Problem
                 Solving, Control Methods, and Search, Heuristic
                 methods.",
}

@Article{Bryant:1992:SBM,
  author =       "Randal E. Bryant",
  title =        "Symbolic {Boolean} Manipulation with Ordered
                 Binary-Decision Diagrams",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "3",
  pages =        "293--318",
  month =        sep,
  year =         "1992",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/136035.136043",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:42:45 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/136043.html",
  abstract =     "Ordered Binary-Decision Diagrams (OBDDs) represent
                 Boolean functions as directed acyclic graphs. They form
                 a canonical representation, making testing of
                 functional properties such as satisfiability and
                 equivalence straightforward. A number of operations on
                 Boolean functions can be implemented as graph
                 algorithms on OBDD data structures. Using OBDDs, a wide
                 variety of problems can be solved through {\em symbolic
                 analysis}. First, the possible variations in system
                 parameters and operating conditions are encoded with
                 Boolean variables. Then the system is evaluated for all
                 variations by a sequence of OBDD operations.
                 Researchers have thus solved a number of problems in
                 digital-system design, finite-state system analysis,
                 artificial intelligence, and mathematical logic. This
                 paper describes the OBDD data structure and surveys a
                 number of applications that have been solved by
                 OBDD-based symbolic analysis.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; binary-decision diagrams; Boolean algebra;
                 Boolean functions; branching programs; symbolic
                 analysis; symbolic manipulation; verification",
  subject =      "{\bf B.6.0}: Hardware, LOGIC DESIGN, General. {\bf
                 I.1.m}: Computing Methodologies, ALGEBRAIC
                 MANIPULATION, Miscellaneous. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation, Automata. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems.",
}

@Article{Dunham:1992:SFW,
  author =       "Charles B. Dunham",
  title =        "Surveyor's Forum: {``What Every Computer Scientist
                 Should Know About Floating-Point Arithmetic''}",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "3",
  pages =        "319--319",
  month =        sep,
  year =         "1992",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:14:37 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  note =         "See
                 \cite{Goldberg:1991:WEC,Goldberg:1991:CWE,Wichmann:1992:SFW}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wichmann:1992:SFW,
  author =       "Brian A. Wichmann",
  title =        "Surveyor's Forum: {``What Every Computer Scientist
                 Should Know About Floating-Point Arithmetic''}",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "3",
  pages =        "319--319",
  month =        sep,
  year =         "1992",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:14:37 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See
                 \cite{Goldberg:1991:WEC,Goldberg:1991:CWE,Dunham:1992:SFW}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Muntz:1992:ATIb,
  author =       "Richard R. Muntz",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "4",
  pages =        "321--322",
  month =        dec,
  year =         "1992",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:24:44 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Muntz:1992:AAb,
  author =       "Richard R. Muntz",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "4",
  pages =        "323--323",
  month =        dec,
  year =         "1992",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:24:44 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Brown:1992:SIR,
  author =       "Lisa Gottesfeld Brown",
  title =        "A Survey of Image Registration Techniques",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "4",
  pages =        "325--376",
  month =        dec,
  year =         "1992",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/146370.146374",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:43:10 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/cmubib.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/146374.html",
  abstract =     "Registration is a fundamental task in image processing
                 used to match two or more pictures taken, for example,
                 at different times, from different sensors, or from
                 different viewpoints. Virtually all large systems which
                 evaluate images require the registration of images, or
                 a closely related operation, as an intermediate step.
                 Specific examples of systems where image registration
                 is a significant component include matching a target
                 with a real-time image of a scene for target
                 recognition, monitoring global land usage using
                 satellite images, matching stereo images to recover
                 shape for autonomous navigation, and aligning images
                 from different medical modalities for
                 diagnosis.\par

                 Over the years, a broad range of techniques has been
                 developed for various types of data and problems. These
                 techniques have been independently studied for several
                 different applications, resulting in a large body of
                 research. This paper organizes this material by
                 establishing the relationship between the variations in
                 the images and the type of registration techniques
                 which can most appropriately be applied. Three major
                 types of variations are distinguished. The first type
                 are the variations due to the differences in
                 acquisition which cause the images to be misaligned. To
                 register images, a spatial transformation is found
                 which will remove these variations. The class of
                 transformations which must be searched to find the
                 optimal transformation is determined by knowledge about
                 the variations of this type. The transformation class
                 in turn influences the general technique that should be
                 taken. The second type of variations are those which
                 are also due to differences in acquisition, but cannot
                 be modeled easily such as lighting and atmospheric
                 conditions. This type usually effects intensity values,
                 but they may also be spatial, such as perspective
                 distortions. The third type of variations are
                 differences in the images that are of interest such as
                 object movements, growths, or other scene changes.
                 Variations of the second and third type are not
                 directly removed by registration, but they make
                 registration more difficult since an exact match is no
                 longer possible. In particular, it is critical that
                 variations of the third type are not removed. Knowledge
                 about the characteristics of each type of variation
                 effect the choice of feature space, similarity measure,
                 search space, and search strategy which will make up
                 the final technique. All registration techniques can be
                 viewed as different combinations of these choices. This
                 framework is useful for understanding the merits and
                 relationships between the wide variety of existing
                 techniques and for assisting in the selection of the
                 most suitable technique for a specific problem.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; design; image registration; image warping;
                 measurement; performance; rectification; template
                 matching",
  subject =      "{\bf I.4.3}: Computing Methodologies, IMAGE
                 PROCESSING, Enhancement, Registration. {\bf A.1}:
                 General Literature, INTRODUCTORY AND SURVEY. {\bf
                 I.2.10}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Vision and Scene Understanding. {\bf
                 I.5.0}: Computing Methodologies, PATTERN RECOGNITION,
                 General. {\bf I.4.8}: Computing Methodologies, IMAGE
                 PROCESSING, Scene Analysis, Sensor fusion.",
}

@Article{Kukich:1992:TAC,
  author =       "Karen Kukich",
  title =        "Techniques for Automatically Correcting Words in
                 Text",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "4",
  pages =        "377--439",
  month =        dec,
  year =         "1992",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/146370.146380",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:43:10 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Ai/cmubib.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/146380.html",
  abstract =     "Research aimed at correcting words in text has focused
                 on three progressively more difficult problems: (1)
                 nonword error detection; (2) isolated-word error
                 correction; and (3) context-dependent word correction.
                 In response to the first problem, efficient pattern
                 matching and $n$-gram analysis techniques have been
                 developed for detecting strings that do not appear in a
                 given word list. In response to the second problem, a
                 variety of general and application-specific spelling
                 correction techniques have been developed. Some of them
                 were based on detailed studies of spelling error
                 patterns. In response to the third problem, a few
                 experiments using natural-language-processing tools or
                 statistical-language models have been carried out. This
                 article surveys documented findings on spelling error
                 patterns, provides descriptions of various nonword
                 detection and isolated-word error correction
                 techniques, reviews the state of the art of
                 context-dependent word correction techniques, and
                 discusses research issues related to all three areas of
                 automatic error correction in text.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "$n$-gram analysis; algorithms; context-dependent
                 spelling correction; experimentation; grammar checking;
                 human factors; n-gram analysis;
                 natural-language-processing models; neural net
                 classifiers; Optical Character Recognition (OCR);
                 performance; spell checking; spelling error detection;
                 spelling error patterns; statistical-language models;
                 theory; word recognition and correction",
  subject =      "I.2.6 [Artificial Intelligence]: Learning ---
                 connectionism and neural nets; I.2.7 [Artificial
                 Intelligence]: Natural Language Processing --- language
                 models; language parsing and understanding; text
                 analysis; I.5.1 [Pattern Recognition]: Models ---
                 neural nets; statistical; I.5.4 [Pattern Recognition]:
                 Applications --- text processing; I.7.1 [Text
                 Processing]: Text Editing --- spelling",
}

@Article{Estivill-Castro:1992:SAS,
  author =       "Vladimir Estivill-Castro and Derick Wood",
  title =        "A Survey of Adaptive Sorting Algorithms",
  journal =      j-COMP-SURV,
  volume =       "24",
  number =       "4",
  pages =        "441--476",
  month =        dec,
  year =         "1992",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/146370.146381",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:43:10 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1992.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/146381.html",
  abstract =     "The design and analysis of adaptive sorting algorithms
                 has made important contributions to both theory and
                 practice. The main contributions from the theoretical
                 point of view are: the description of the complexity of
                 a sorting algorithm not only in terms of the size of a
                 problem instance but also in terms of the disorder of
                 the given problem instance; the establishment of new
                 relationships among measures of disorder; the
                 introduction of new sorting algorithms that take
                 advantage of the existing order in the input sequence;
                 and, the proofs that several of the new sorting
                 algorithms achieve maximal (optimal) adaptivity with
                 respect to several measures of disorder. The main
                 contributions from the practical point of view are: the
                 demonstration that several algorithms currently in use
                 are adaptive; and, the development of new algorithms,
                 similar to currently used algorithms that perform
                 competitively on random sequences and are significantly
                 faster on nearly sorted sequences. In this survey, we
                 present the basic notions and concepts of adaptive
                 sorting and the state of the art of adaptive sorting
                 algorithms.",
  acknowledgement = ack-nhfb,
  annote =       "In this survey the basic notions and concepts of
                 adaptive sorting and the state of the art of adaptive
                 sorting algorithm are presented. It gives the
                 description of the complexity of a sorting algorithm
                 not only in term of a size of a problem but also in
                 terms of the disorder of a given problem instance and
                 the introduction od new sorting algorithms that take
                 advantage of the existing order in the input
                 sequence.",
  country =      "USA",
  date =         "09/02/94",
  descriptors =  "Algorithm; Sorting; Search Tree",
  enum =         "8478",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "adaptive sorting algorithms; algorithms; comparison
                 trees; design; measures of disorder; nearly sorted
                 sequences; randomized algorithms; theory",
  language =     "English",
  references =   "76",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Probabilistic algorithms (including Monte
                 Carlo). {\bf E.5}: Data, FILES, Sorting/searching. {\bf
                 E.2}: Data, DATA STORAGE REPRESENTATIONS, Composite
                 structures.",
}

@Article{Muntz:1993:ATIa,
  author =       "Richard R. Muntz",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1993",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:24:44 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Muntz:1993:AAa,
  author =       "Richard R. Muntz",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "1",
  pages =        "3--3",
  month =        mar,
  year =         "1993",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:24:44 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Arman:1993:MBO,
  author =       "Farshid Arman and J. K. Aggarwal",
  title =        "Model-Based Object Recognition in Dense-Range Images
                 --- a Review",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "1",
  pages =        "5--43",
  month =        mar,
  year =         "1993",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/151254.151255",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:43:37 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/151255.html",
  abstract =     "The goal in computer vision systems is to analyze data
                 collected from the environment and derive an
                 interpretation to complete a specified task. Vision
                 system tasks may be divided into data acquisition,
                 low-level processing, representation, model
                 construction, and matching subtasks. This paper
                 presents a comprehensive survey of model-based vision
                 systems using dense-range images. A comprehensive
                 survey of the recent publications in each subtask
                 pertaining to dense-range image object recognition is
                 presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "3D object recognition; 3D representations; algorithms;
                 CAD-based vision; dense-range images; design;
                 experimentation; image understanding",
  subject =      "{\bf I.5.4}: Computing Methodologies, PATTERN
                 RECOGNITION, Applications, Computer vision. {\bf J.6}:
                 Computer Applications, COMPUTER-AIDED ENGINEERING,
                 Computer-aided design (CAD). {\bf A.1}: General
                 Literature, INTRODUCTORY AND SURVEY. {\bf I.4.8}:
                 Computing Methodologies, IMAGE PROCESSING, Scene
                 Analysis, Range data. {\bf I.2.10}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Vision and
                 Scene Understanding. {\bf I.2.9}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Robotics,
                 Sensors. {\bf I.3.5}: Computing Methodologies, COMPUTER
                 GRAPHICS, Computational Geometry and Object Modeling,
                 Curve, surface, solid, and object representations. {\bf
                 I.3.5}: Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling, Modeling
                 packages. {\bf I.4.9}: Computing Methodologies, IMAGE
                 PROCESSING, Applications. {\bf I.5.2}: Computing
                 Methodologies, PATTERN RECOGNITION, Design Methodology,
                 Feature evaluation and selection. {\bf I.5.3}:
                 Computing Methodologies, PATTERN RECOGNITION,
                 Clustering, Similarity measures. {\bf I.4.6}: Computing
                 Methodologies, IMAGE PROCESSING, Segmentation, Region
                 growing, partitioning. {\bf I.4.6}: Computing
                 Methodologies, IMAGE PROCESSING, Segmentation, Pixel
                 classification.",
}

@Article{Schneider:1993:SS,
  author =       "Marco Schneider",
  title =        "Self-Sta\-bi\-li\-za\-tion",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "1",
  pages =        "45--67",
  month =        mar,
  year =         "1993",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/151254.151256",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:43:37 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/151256.html",
  abstract =     "In 1973 Dijkstra introduced to computer science the
                 notion of self-stabilization in the context of
                 distributed systems. He defined a system as {\em
                 self-stabilizing} when ``regardless of its initial
                 state, it is guaranteed to arrive at a legitimate state
                 in a finite number of steps.'' A system which is not
                 self-stabilizing may stay in an illegitimate state
                 forever. Dijkstra's notion of self-stabilization, which
                 originally had a very narrow scope of application, is
                 proving to encompass a formal and unified approach to
                 fault tolerance under a model of transient failures for
                 distributed systems. In this paper we define
                 self-stabilization, examine its significance in the
                 context of fault tolerance, define the important
                 research themes that have arisen from it, and discuss
                 the relevant results. In addition to the issues arising
                 from Dijkstra's original presentation as well as
                 several related issues, we discuss methodologies for
                 designing self-stabilizing systems, the role of
                 compilers with respect to self-stabilization, and some
                 of the factors that prevent self-stabilization.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; convergence; design; distributed systems
                 legal illegal states fault tolerance; fault tolerance;
                 reliability; self-stabilization; self-stabilizing
                 systems; stabilization; transient errors; transient
                 failures; verification",
  subject =      "{\bf D.4.5}: Software, OPERATING SYSTEMS, Reliability,
                 Fault-tolerance. {\bf D.4.1}: Software, OPERATING
                 SYSTEMS, Process Management. {\bf F.3.1}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs.
                 {\bf D.1.3}: Software, PROGRAMMING TECHNIQUES,
                 Concurrent Programming. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed applications.",
}

@Article{Muntz:1993:ATIb,
  author =       "Richard R. Muntz",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "2",
  pages =        "69--70",
  month =        jun,
  year =         "1993",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:24:44 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Muntz:1993:AAb,
  author =       "Richard R. Muntz",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "2",
  pages =        "71--72",
  month =        jun,
  year =         "1993",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:24:44 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Graefe:1993:QET,
  author =       "Goetz Graefe",
  title =        "Query Evaluation Techniques for Large Databases",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "2",
  pages =        "73--170",
  month =        jun,
  year =         "1993",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/152610.152611",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:43:58 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/152611.html",
  abstract =     "Database management systems will continue to manage
                 large data volumes. Thus, efficient algorithms for
                 accessing and manipulating large sets and sequences
                 will be required to provide acceptable performance. The
                 advent of object-oriented and extensible database
                 systems will not solve this problem. On the contrary,
                 modern data models exacerbate the problem: In order to
                 manipulate large sets of complex objects as efficiently
                 as today's database systems manipulate simple records,
                 query-processing algorithms and software will become
                 more complex, and a solid understanding of algorithm
                 and architectural issues is essential for the designer
                 of database management software.\par

                 This survey provides a foundation for the design and
                 implementation of query execution facilities in new
                 database management systems. It describes a wide array
                 of practical query evaluation techniques for both
                 relational and postrelational database systems,
                 including iterative execution of complex query
                 evaluation plans, the duality of sort- and hash-based
                 set-matching algorithms, types of parallel query
                 execution and their implementation, and special
                 operators for emerging database application domains.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; complex query evaluation plans; dynamic
                 query evaluation plans; extensible database systems;
                 iterators; object-oriented database systems; operator
                 model of parallelization; parallel algorithms;
                 performance; processing execution iterators algorithms
                 parallelism logical physical algebra level of
                 abstraction performance meta-operator extensible
                 object-oriented scientific operators sort sorting hash
                 hashing duality; relational database systems;
                 set-matching algorithms; sort-hash duality",
  subject =      "{\bf E.5}: Data, FILES. {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Query
                 processing. {\bf A.1}: General Literature, INTRODUCTORY
                 AND SURVEY.",
}

@Article{Barborak:1993:CPF,
  author =       "Michael Barborak and Miroslaw Malek and Anton
                 Dahbura",
  title =        "The Consensus Problem in Fault-Tolerant Computing",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "2",
  pages =        "171--220",
  month =        jun,
  year =         "1993",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/152610.152612",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:43:58 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/152612.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; Byzantine agreement; consensus problem;
                 decision theory; design; processor membership;
                 reliability; system diagnosis",
  subject =      "{\bf D.4.5}: Software, OPERATING SYSTEMS, Reliability,
                 Fault-tolerance. {\bf C.2.3}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Operations, Network management. {\bf C.2.3}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Network Operations, Network monitoring. {\bf C.2.4}:
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Distributed Systems, Distributed
                 applications. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Network operating systems.",
}

@Article{Muntz:1993:ATIc,
  author =       "Richard R. Muntz",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "3",
  pages =        "221--222",
  month =        sep,
  year =         "1993",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Oct 31 23:28:59 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Muntz:1993:AAc,
  author =       "Richard R. Muntz",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "3",
  pages =        "223--223",
  month =        sep,
  year =         "1993",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Oct 31 23:29:08 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shankar:1993:IAR,
  author =       "A. Udaya Shankar",
  title =        "An Introduction to Assertional Reasoning for
                 Concurrent Systems",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "3",
  pages =        "225--262",
  month =        sep,
  year =         "1993",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/158439.158441",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:44:33 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/158441.html",
  abstract =     "This is a tutorial introduction to assertional
                 reasoning based on temporal logic. The objective is to
                 provide a working familiarity with the technique. We
                 use a simple system model and a simple proof system,
                 and we keep to a minimum the treatment of issues such
                 as soundness, completeness, compositionality, and
                 abstraction. We model a concurrent system by a state
                 transition system and fairness requirements. We reason
                 about such systems using Hoare logic and a subset of
                 linear-time temporal logic, specifically, invariant
                 assertions and leads-to assertions. We apply the method
                 to several examples.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "assertional reasoning; generation of preconditions;
                 Hoare logic; invariants; leads-to; progress properties;
                 safety properties; state transition systems;
                 verification; weakest preconditions",
  subject =      "{\bf D.2.4}: Software, SOFTWARE ENGINEERING, Program
                 Verification, Correctness proofs. {\bf D.3.3}:
                 Software, PROGRAMMING LANGUAGES, Language Constructs
                 and Features. {\bf F.3.1}: Theory of Computation,
                 LOGICS AND MEANINGS OF PROGRAMS, Specifying and
                 Verifying and Reasoning about Programs, Assertions.
                 {\bf F.3.1}: Theory of Computation, LOGICS AND MEANINGS
                 OF PROGRAMS, Specifying and Verifying and Reasoning
                 about Programs, Invariants. {\bf F.3.1}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS,
                 Specifying and Verifying and Reasoning about Programs,
                 Logics of programs. {\bf F.3.1}: Theory of Computation,
                 LOGICS AND MEANINGS OF PROGRAMS, Specifying and
                 Verifying and Reasoning about Programs, Pre- and
                 post-conditions.",
}

@Article{Norman:1993:MMC,
  author =       "Michael G. Norman and Peter Thanisch",
  title =        "Models of Machines and Computation for Mapping in
                 Multicomputers",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "3",
  pages =        "263--302",
  month =        sep,
  year =         "1993",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/158439.158908",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:44:33 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/158908.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; mapping; multicomputer load balancing;
                 multicomputers; partitioning; performance; scheduling",
  subject =      "{\bf C.1.2}: Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors), Multiple-instruction-stream,
                 multiple-data-stream processors (MIMD).",
}

@Article{Lilja:1993:CCL,
  author =       "David J. Lilja",
  title =        "Cache Coherence in Large-Scale Shared-Memory
                 Multiprocessors: Issues and Comparisons",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "3",
  pages =        "303--338",
  month =        sep,
  year =         "1993",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/158439.158907",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:44:33 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/158907.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "{\bf B.3.2}: Hardware, MEMORY STRUCTURES, Design
                 Styles, Cache memories.",
}

@Article{Nelson:1993:MPF,
  author =       "Randolph D. Nelson",
  title =        "The Mathematics of Product Form Queuing Networks",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "3",
  pages =        "339--369",
  month =        sep,
  year =         "1993",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/158439.158906",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:44:33 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/158906.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "partial balance; performance; product form;
                 quasireversibility; queuing theory; reversibility",
  subject =      "{\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS. {\bf C.4}: Computer Systems Organization,
                 PERFORMANCE OF SYSTEMS, Modeling techniques.",
}

@Article{Muntz:1993:ATId,
  author =       "Richard R. Muntz",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "4",
  pages =        "371--372",
  month =        dec,
  year =         "1993",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Oct 31 23:29:38 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Muntz:1993:AAd,
  author =       "Richard R. Muntz",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "4",
  pages =        "373--373",
  month =        dec,
  year =         "1993",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Oct 31 23:29:47 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Baskerville:1993:ISS,
  author =       "Richard Baskerville",
  title =        "Information Systems Security Design Methods:
                 Implications for Information Systems Development",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "4",
  pages =        "375--414",
  month =        dec,
  year =         "1993",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/162124.162127",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:44:55 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/162127.html",
  abstract =     "The security of information systems is a serious issue
                 because computer abuse is increasing. It is important,
                 therefore, that systems analysts and designers develop
                 expertise in methods for specifying information systems
                 security. The characteristics found in three
                 generations of general information system design
                 methods provide a framework for comparing and
                 understanding current security design methods. These
                 methods include approaches that use checklists of
                 controls, divide functional requirements into
                 engineering partitions, and create abstract models of
                 both the problem and the solution. Comparisons and
                 contrasts reveal that advances in security methods lag
                 behind advances in general systems development methods.
                 This analysis also reveals that more general methods
                 fail to consider security specifications rigorously.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "checklists; control; integrity; management; risk
                 analysis; safety; security; structured systems analysis
                 and design; system modeling",
  subject =      "{\bf C.0}: Computer Systems Organization, GENERAL,
                 Systems specification methodology. {\bf H.1.1}:
                 Information Systems, MODELS AND PRINCIPLES, Systems and
                 Information Theory, Value of information. {\bf H.1.2}:
                 Information Systems, MODELS AND PRINCIPLES,
                 User/Machine Systems, Human factors. {\bf K.6.1}:
                 Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, Project and People Management,
                 Systems analysis and design. {\bf K.6.5}: Computing
                 Milieux, MANAGEMENT OF COMPUTING AND INFORMATION
                 SYSTEMS, Security and Protection, Authentication. {\bf
                 K.6.5}: Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, Security and Protection,
                 Insurance. {\bf K.6.5}: Computing Milieux, MANAGEMENT
                 OF COMPUTING AND INFORMATION SYSTEMS, Security and
                 Protection, Invasive software. {\bf K.6.5}: Computing
                 Milieux, MANAGEMENT OF COMPUTING AND INFORMATION
                 SYSTEMS, Security and Protection, Physical security.",
}

@Article{Eschermann:1993:SAH,
  author =       "Bernhard Eschermann",
  title =        "State Assignment for Hardwired {VLSI} Control Units",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "4",
  pages =        "415--436",
  month =        dec,
  year =         "1993",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/162124.162132",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:44:55 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/162132.html",
  abstract =     "Finding a binary encoding of symbolic control states,
                 such that the implementation area of a digital control
                 unit is minimized is well known to be NP-complete. Many
                 heuristic algorithms have been proposed for this state
                 assignment problem. The objective of this article is to
                 present a comprehensive survey and systematic
                 categorization of the various techniques, in
                 particular, for synchronous sequential circuits with
                 nonmicroprogrammed implementations. The problem is
                 partitioned into the generation and the satisfaction of
                 coding constraints. Three types of coding constraints
                 --- adjacency, covering, and disjunctive constraints
                 --- are widely used. The constraint satisfaction
                 algorithms are classified into column-based, row-based,
                 tree-based, dichotomy-based, and global minimization
                 approaches. All of them are illustrated with examples.
                 Special coding requirements and testability-related
                 aspects of state assignment are considered in a
                 separate section. Different implementations of the
                 algorithms presented are also compared.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; built-in tests; coding constraints;
                 computer-aided design; control design; design;
                 finite-state machines; integrated circuits; logic
                 design; sequential circuits; state assignment;
                 synthesis; testability; VLSI",
  subject =      "{\bf B.1.2}: Hardware, CONTROL STRUCTURES AND
                 MICROPROGRAMMING, Control Structure Performance
                 Analysis and Design Aids, Automatic synthesis.",
}

@Article{Brancheau:1993:MEU,
  author =       "James C. Brancheau and Carol V. Brown",
  title =        "The Management of End-User Computing: Status and
                 Directions",
  journal =      j-COMP-SURV,
  volume =       "25",
  number =       "4",
  pages =        "437--482",
  month =        dec,
  year =         "1993",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/162124.162138",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:44:55 MDT 2008",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/162138.html",
  abstract =     "The development of computing applications by the
                 people who have direct need for them in their work has
                 become commonplace. During the 1980s, development of
                 applications by ``end users'' accelerated and became a
                 key management and research concern. Known as
                 ``end-user computing,'' the phenomena and research
                 associated with this trend cross a variety of
                 disciplines. This article critically surveys the
                 published literature on end-user computing (EUC)
                 management according to a comprehensive research model.
                 The article introduces the EUC management research
                 model, identifies prior research contributions, and
                 offers guideline for the future. The focal points of
                 the model are two EUC management components which
                 represent two different levels of theorizing found in
                 the literature. The first level focuses on the
                 organization factors of strategy, technology, and
                 management action. The second level focuses on the
                 individual factors of end user, task, tool, and
                 end-user action. The remainder of the model includes
                 factors typically investigated as the antecedents
                 (context) and consequences (outcomes) of EUC. More than
                 90 English-language articles published from 1983-1990
                 are mapped into the model. Specific variables for each
                 factor are identified; research streams are
                 interpreted; findings are synthesized; and gaps in our
                 knowledge are highlighted. We then raise a number of
                 substantive and methodological issues that need to be
                 addressed and suggest two themes we envision as
                 important for EUC management research in the 1990s: EUC
                 as an extension of organizational computing and EUC as
                 a social learning phenomenon. Guidance is offered for
                 using these theme to inform future research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "desktop computing; end-user computing; human factors;
                 information center; information technology management;
                 management; personal computing",
  subject =      "{\bf H.4.1}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Office Automation. {\bf K.6.1}: Computing
                 Milieux, MANAGEMENT OF COMPUTING AND INFORMATION
                 SYSTEMS, Project and People Management.",
}

@Article{Gupta:1994:RSD,
  author =       "Rajiv Gupta and Scott A. Smolka and Shaji Bhaskar",
  title =        "On Randomization in Sequential and Distributed
                 Algorithms",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "1",
  pages =        "7--86",
  month =        mar,
  year =         "1994",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/174666.174667",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:45:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/174667.html",
  abstract =     "Probabilistic, or randomized, algorithms are fast
                 becoming as commonplace as conventional deterministic
                 algorithms. This survey presents five techniques that
                 have been widely used in the design of randomized
                 algorithms. These techniques are illustrated using 12
                 randomized algorithms---both sequential and
                 distributed--- that span a wide range of applications,
                 including:{\em primality testing} (a classical problem
                 in number theory), {\em interactive probabilistic proof
                 systems} (a new method of program testing), {\em dining
                 philosophers} (a classical problem in distributed
                 computing), and {\em Byzantine agreement} (reaching
                 agreement in the presence of malicious processors).
                 Included with each algorithm is a discussion of its
                 correctness and its computational complexity. Several
                 related topics of interest are also addressed,
                 including the theory of probabilistic automata,
                 probabilistic analysis of conventional algorithms,
                 deterministic amplification, and derandomization of
                 randomized algorithms. Finally, a comprehensive
                 annotated bibliography is given.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; analysis of algorithms; Byzantine
                 agreement; computational complexity; CSP; dining
                 philosophers problem; distributed algorithms; graph
                 isomorphism; hashing; interactive probabilistic proof
                 systems; leader election; message routing;
                 nearest-neighbors problem; perfect hashing; primality
                 testing; probabilistic techniques; randomized or
                 probabilistic algorithms; randomized quicksort;
                 sequential algorithms; transitive tournaments;
                 universal hashing",
  subject =      "{\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Probabilistic algorithms (including Monte
                 Carlo). {\bf F.1.2}: Theory of Computation, COMPUTATION
                 BY ABSTRACT DEVICES, Modes of Computation,
                 Probabilistic computation. {\bf D.1.0}: Software,
                 PROGRAMMING TECHNIQUES, General.",
}

@Article{Malone:1994:ISC,
  author =       "Thomas W. Malone and Kevin Crowston",
  title =        "The Interdisciplinary Study of Coordination",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "1",
  pages =        "87--119",
  month =        mar,
  year =         "1994",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/174666.174668",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:45:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/174668.html",
  abstract =     "This survey characterizes an emerging research area,
                 sometimes called {\em coordination theory}, that
                 focuses on the interdisciplinary study of coordination.
                 Research in this area uses and extends ideas about
                 coordination from disciplines such as computer science,
                 organization theory, operations research, economics,
                 linguistics, and psychology.\par

                 A key insight of the framework presented here is that
                 coordination can be seen as the process of {\em
                 managing dependencies} among activities. Further
                 progress, therefore, should be possible by
                 characterizing different kinds of dependencies and
                 identifying the coordination processes that can be used
                 to manage them. A variety of processes are analyzed
                 from this perspective, and commonalities across
                 disciplines are identified. Processes analyzed include
                 those for managing {\em shared resources,
                 producer/consumer relationships, simultaneity
                 constraints}, and {\em task/subtask
                 dependencies}.\par

                 Section 3 summarizes ways of applying a coordination
                 perspective in three different domains:(1)
                 understanding the effects of information technology on
                 human organizations and markets, (2) designing
                 cooperative work tools, and (3) designing distributed
                 and parallel computer systems. In the final section,
                 elements of a research agenda in this new area are
                 briefly outlined.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer-supported cooperative work; coordination;
                 coordination science; coordination theory; design;
                 economics; groupware; human factors; management;
                 theory",
  subject =      "{\bf I.2.11}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Distributed Artificial Intelligence,
                 Coherence and coordination. {\bf C.0}: Computer Systems
                 Organization, GENERAL, System architectures. {\bf
                 C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management. {\bf D.4.2}: Software, OPERATING SYSTEMS,
                 Storage Management. {\bf H.1.1}: Information Systems,
                 MODELS AND PRINCIPLES, Systems and Information Theory.
                 {\bf H.4.1}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Office Automation. {\bf H.4.3}:
                 Information Systems, INFORMATION SYSTEMS APPLICATIONS,
                 Communications Applications. {\bf H.5.3}: Information
                 Systems, INFORMATION INTERFACES AND PRESENTATION, Group
                 and Organization Interfaces. {\bf K.4.3}: Computing
                 Milieux, COMPUTERS AND SOCIETY, Organizational
                 Impacts.",
}

@Article{Lee:1994:PDM,
  author =       "Sunggu Lee and Kang Geun Shin",
  title =        "Probabilistic Diagnosis of Multiprocessor Systems",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "1",
  pages =        "121--139",
  month =        mar,
  year =         "1994",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/174666.174669",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:45:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/174669.html",
  abstract =     "This paper critically surveys methods for the
                 automated probabilistic diagnosis of large
                 multiprocessor systems. In recent years, much of the
                 work on system-level diagnosis has focused on
                 probabilistic methods, which can diagnose
                 intermittently faulty processing nodes and can be
                 applied in {\em general} situations on {\em general}
                 interconnection networks. The theory behind the
                 probabilistic diagnosis methods is explained, and the
                 various diagnosis algorithms are described in simple
                 terms with the aid of a running example. The diagnosis
                 methods are compared and analyzed, and a chart is
                 produced, showing the comparative advantages of the
                 various diagnosis algorithms on the basis of several
                 factors important to the probabilistic diagnosis.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; centralized and distributed
                 self-diagnosis; comparison testing; fault-tolerant
                 computing; performance; probabilistic diagnosis;
                 system-level diagnosis; system-level testing",
  subject =      "{\bf C.4}: Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS, Reliability, availability, and
                 serviceability. {\bf C.1.2}: Computer Systems
                 Organization, PROCESSOR ARCHITECTURES, Multiple Data
                 Stream Architectures (Multiprocessors).",
}

@Article{Muntz:1994:ATI,
  author =       "Richard R. Muntz",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "2",
  pages =        "141--142",
  month =        jun,
  year =         "1994",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:24:44 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Muntz:1994:,
  author =       "Richard R. Muntz",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "2",
  pages =        "143--144",
  month =        jun,
  year =         "1994",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 25 10:24:44 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chen:1994:RHP,
  author =       "Peter M. Chen and Edward K. Lee and Garth A. Gibson
                 and Randy H. Katz and David A. Patterson",
  title =        "{RAID}: High-Performance, Reliable Secondary Storage",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "2",
  pages =        "145--185",
  month =        jun,
  year =         "1994",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/176979.176981",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:45:42 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/176981.html",
  abstract =     "Disk arrays were proposed in the 1980s as a way to use
                 parallelism between multiple disks to improve aggregate
                 I/O performance. Today they appear in the product lines
                 of most major computer manufacturers. This article
                 gives a comprehensive overview of disk arrays and
                 provides a framework in which to organize current and
                 future work. First, the article introduces disk
                 technology and reviews the driving forces that have
                 popularized disk arrays: performance and reliability.
                 It discusses the two architectural techniques used in
                 disk arrays: striping across multiple disks to improve
                 performance and redundancy to improve reliability.
                 Next, the article describes seven disk array
                 architectures, called RAID (Redundant Arrays of
                 Inexpensive Disks) levels 0--6 and compares their
                 performance, cost, and reliability. It goes on to
                 discuss advanced research and implementation topics
                 such as refining the basic RAID levels to improve
                 performance and designing algorithms to maintain data
                 consistency. Last, the article describes six disk array
                 prototypes of products and discusses future
                 opportunities for research, with an annotated
                 bibliography disk array-related literature.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; Disk Array; disk array; parallel I/O;
                 performance; RAID; redundancy; reliability; storage;
                 striping",
  subject =      "{\bf B.4.2}: Hardware, INPUT/OUTPUT AND DATA
                 COMMUNICATIONS, Input/Output Devices. {\bf B.4.5}:
                 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Reliability, Testing, and Fault-Tolerance. {\bf B.4.4}:
                 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Performance Analysis and Design Aids. {\bf B.3.2}:
                 Hardware, MEMORY STRUCTURES, Design Styles, Mass
                 storage.",
}

@Article{Harris:1994:SPS,
  author =       "Tim J. Harris",
  title =        "A Survey of {PRAM} Simulation Techniques",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "2",
  pages =        "187--206",
  month =        jun,
  year =         "1994",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/176979.176984",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:45:42 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/176984.html",
  abstract =     "The Parallel Random Access Machine (PRAM) is an
                 abstract model of parallel computation which allows
                 researchers to focus on the essential characteristics
                 of a parallel architecture and ignore other details.
                 The PRAM has long been acknowledged to be a useful tool
                 for the study of parallel computing, but unfortunately
                 it is not physically implementable in hardware. In
                 order to take advantage of the broad base of algorithms
                 and results regarding this high-level abstraction one
                 needs general methods for allowing the execution of
                 PRAM algorithms on more realistic machines. In the
                 following we survey these methods, which we refer to as
                 PRAM simulation techniques. The general issues of
                 memory management and routing are discussed, and both
                 randomized and deterministic solutions are considered.
                 We show that good theoretical solutions to many of the
                 subproblems in PRAM simulation have been developed,
                 though questions still exist as to their practical
                 utility. This article should allow those performing
                 research in this field to become well acquainted with
                 the current state of the art, while allowing the novice
                 to get an intuitive feeling for the fundamental
                 questions being considered. The introduction should
                 provide a concise tutorial for those unfamiliar with
                 the problem of PRAM simulation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; bounded-degree networks; models of
                 parallel computation; Parallel complexity theory;
                 parallel complexity theory",
  subject =      "{\bf F.1.1}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation,
                 Unbounded-action devices. {\bf F.1.1}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
                 Computation, Relations among models. {\bf C.1.2}:
                 Computer Systems Organization, PROCESSOR ARCHITECTURES,
                 Multiple Data Stream Architectures (Multiprocessors),
                 Interconnection architectures. {\bf F.2.2}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Routing and layout. {\bf F.2.2}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Sorting and
                 searching. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency.",
}

@Article{Muntz:1994:AIa,
  author =       "Richard R. Muntz",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "3",
  pages =        "207--207",
  month =        sep,
  year =         "1994",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Dec 16 18:45:42 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Muntz:1994:AAa,
  author =       "Richard R. Muntz",
  title =        "About the Authors \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "3",
  pages =        "209--210",
  month =        sep,
  year =         "1994",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Dec 16 18:45:42 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Landwehr:1994:TCP,
  author =       "Carl E. Landwehr and Alan R. Bull and John P.
                 McDermott and William S. Choi",
  title =        "A Taxonomy of Computer Program Security Flaws",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "3",
  pages =        "211--254",
  month =        sep,
  year =         "1994",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/185403.185412",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:45:58 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/185412.html",
  abstract =     "An organized record of actual flaws can be useful to
                 computer system designers, programmers, analysts,
                 administrators, and users. This survey provides a
                 taxonomy for computer program security flaws, with an
                 Appendix that documents 50 actual security flaws. These
                 flaws have all been described previously in the open
                 literature, but in widely separated places. For those
                 new to the field of computer security, they provide a
                 good introduction to the characteristics of security
                 flaws and how they can arise. Because these flaws were
                 not randomly selected from a valid statistical sample
                 of such flaws, we make no strong claims concerning the
                 likely distribution of actual security flaws within the
                 taxonomy. However, this method of organizing security
                 flaw data can help those who have custody of more
                 representative samples to organize them and to focus
                 their efforts to remove and, eventually, to prevent the
                 introduction of security flaws.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; authentication; D.2.0 [Software
                 Engineering]: General---protection mechanisms; D.2.9
                 [Software Engineering]: Management---life cycle; D.4.6
                 [Operating Systems]: Security and Protection---access
                 controls; error/defect classification; information
                 flows controls; invasive software; K.6.3 [Management of
                 Computing and Information Systems]: Software
                 Management---software development; K.6.5 [Management of
                 Computing and Information Systems]: Security and
                 Protection---authentication; security; security flaw;
                 software configuration management; software
                 maintenance; taxonomy",
  subject =      "{\bf D.4.6}: Software, OPERATING SYSTEMS, Security and
                 Protection. {\bf D.4.6}: Software, OPERATING SYSTEMS,
                 Security and Protection, Authentication. {\bf D.4.6}:
                 Software, OPERATING SYSTEMS, Security and Protection,
                 Information flow controls. {\bf D.4.6}: Software,
                 OPERATING SYSTEMS, Security and Protection, Invasive
                 software. {\bf D.2.0}: Software, SOFTWARE ENGINEERING,
                 General, Protection mechanisms. {\bf D.2.9}: Software,
                 SOFTWARE ENGINEERING, Management, Life cycle. {\bf
                 D.2.9}: Software, SOFTWARE ENGINEERING, Management,
                 Software configuration management. {\bf K.6.3}:
                 Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, Software Management, Software
                 development. {\bf K.6.5}: Computing Milieux, MANAGEMENT
                 OF COMPUTING AND INFORMATION SYSTEMS, Security and
                 Protection, Authentication. {\bf K.6.5}: Computing
                 Milieux, MANAGEMENT OF COMPUTING AND INFORMATION
                 SYSTEMS, Security and Protection, Invasive software.",
}

@Article{Bailey:1994:PLS,
  author =       "Mary L. Bailey and Jack V. {Briner, Jr.} and Roger D.
                 Chamberlain",
  title =        "Parallel Logic Simulation of {VLSI} Systems",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "3",
  pages =        "255--294",
  month =        sep,
  year =         "1994",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/185403.185424",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:45:58 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/185424.html",
  abstract =     "Fast, efficient logic simulators are an essential tool
                 in modern VLSI system design. Logic simulation is used
                 extensively for design verification prior to
                 fabrication, and as VLSI systems grow in size, the
                 execution time required by simulation is becoming more
                 and more significant. Faster logic simulators will have
                 an appreciable economic impact, speeding time to market
                 while ensuring more thorough system design testing. One
                 approach to this problem is to utilize parallel
                 processing, taking advantage of the concurrency
                 available in the VLSI system to accelerate the logic
                 simulation task.\par

                 Parallel logic simulation has received a great deal of
                 attention over the past several years, but this work
                 has not yet resulted in effective, high-performance
                 simulators being available to VLSI designers. A number
                 of techniques have been developed to investigate
                 performance issues: formal models, performance
                 modeling, empirical studies, and prototype
                 implementations. Analyzing reported results of these
                 techniques, we conclude that five major factors affect
                 performance: synchronization algorithm, circuit
                 structure, timing granularity, target architecture, and
                 partitioning. After reviewing techniques for parallel
                 simulation, we consider each of these factors using
                 results reported in the literature. Finally we
                 synthesize the results and present directions for
                 future research in the field.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Algorithms; B.6.3 [Logic Design]: Design
                 Aids---simulation; B.7.2 [Integrated Circuits]: Design
                 Aids---simulation; C.2.4 [Computer-Communications
                 Networks]: Distributed Systems---distributed
                 applications; Circuit structure; circuit structure;
                 distributed; Experimentation; I.6.3 [Simulation and
                 Modeling]: Applications; I.6.8 [Simulation and
                 Modeling]: Types of Simulation---discrete event;
                 parallel; parallel algorithms; parallel architecture;
                 parallelism; partitioning; Performance; synchronization
                 algorithm; timing granularity",
  subject =      "{\bf B.6.3}: Hardware, LOGIC DESIGN, Design Aids,
                 Simulation. {\bf B.7.2}: Hardware, INTEGRATED CIRCUITS,
                 Design Aids, Simulation. {\bf C.2.4}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed applications. {\bf
                 I.6.3}: Computing Methodologies, SIMULATION AND
                 MODELING, Applications. {\bf I.6.8}: Computing
                 Methodologies, SIMULATION AND MODELING, Types of
                 Simulation, Discrete event. {\bf I.6.8}: Computing
                 Methodologies, SIMULATION AND MODELING, Types of
                 Simulation, Distributed. {\bf I.6.8}: Computing
                 Methodologies, SIMULATION AND MODELING, Types of
                 Simulation, Parallel.",
}

@Article{deKergommeaux:1994:PLP,
  author =       "Jacques Chassin de Kergommeaux and Philippe Codognet",
  title =        "Parallel Logic Programming Systems",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "3",
  pages =        "295--336",
  month =        sep,
  year =         "1994",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/185403.185453",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:45:58 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/185453.html",
  abstract =     "Parallelizing logic programming has attracted much
                 interest in the research community, because of the
                 intrinsic OR- and AND-parallelisms of logic programs.
                 One research stream aims at transparent exploitation of
                 parallelism in existing logic programming languages
                 such as Prolog, while the family of concurrent logic
                 languages develops language constructs allowing
                 programmers to express the concurrency --- that is, the
                 communication and synchronization between parallel
                 processes --- within their algorithms. This article
                 concentrates mainly on transparent exploitation of
                 parallelism and surveys the most mature solutions to
                 the problems to be solved in order to obtain efficient
                 implementations. These solutions have been implemented,
                 and the most efficient parallel logic programming
                 systems reach effective speedups over state-of-the-art
                 sequential Prolog implementations. The article also
                 addresses current and prospective research issues in
                 extending the applicability and the efficiency of
                 existing systems, such as models merging the
                 transparent parallelism and the concurrent logic
                 languages approaches, combination of constraint logic
                 programming with parallelism, and use of highly
                 parallel architectures.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "and parallel languages; AND-parallelism; B.3.2 [Memory
                 Structures]: Design Styles---shared memory; binding
                 arrays; C.1.2 [Processor Architectures]: Multiple Data
                 Stream Architectures; concurrent constraint
                 programming; constraints; D.1.3 [Programming
                 Techniques]: Concurrent Programming---parallel
                 programming; D.1.6 [Programming Techniques]: Logic
                 Programming; D.3.2 [Programming Languages]: Language
                 Classifications--concurrent; D.3.4 [Programming
                 Languages]: Processors---compilers; distributed; F.4.1
                 [Mathematical Logic and Formal Languages]: Mathematical
                 Logic--logic programming; guard; hash windows;
                 interpreters; languages; load balancing; massive
                 parallelism; memory management; multisequential
                 implementation techniques; nondeterminism;
                 OR-parallelism; preprocessors; Prolog; scheduling
                 parallel tasks; static analysis; Warren Abstract
                 Machine",
  subject =      "{\bf D.1.6}: Software, PROGRAMMING TECHNIQUES, Logic
                 Programming. {\bf D.1.3}: Software, PROGRAMMING
                 TECHNIQUES, Concurrent Programming, Parallel
                 programming. {\bf B.3.2}: Hardware, MEMORY STRUCTURES,
                 Design Styles, Shared memory. {\bf C.1.2}: Computer
                 Systems Organization, PROCESSOR ARCHITECTURES, Multiple
                 Data Stream Architectures (Multiprocessors). {\bf
                 D.3.2}: Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Concurrent, distributed, and parallel
                 languages. {\bf D.3.4}: Software, PROGRAMMING
                 LANGUAGES, Processors, Compilers. {\bf D.3.4}:
                 Software, PROGRAMMING LANGUAGES, Processors,
                 Interpreters. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Logic programming.",
}

@Article{Wegner:1994:ED,
  author =       "Peter Wegner and Marvin Israel",
  title =        "Editorial Directions",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "4",
  pages =        "337--339",
  month =        dec,
  year =         "1994",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 13 09:52:49 1995",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Muntz:1994:AIb,
  author =       "Richard R. Muntz",
  title =        "About This Issue",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "4",
  pages =        "341--341",
  month =        dec,
  year =         "1994",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 13 09:52:49 1995",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Muntz:1994:AAb,
  author =       "Richard R. Muntz",
  title =        "About The Authors",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "4",
  pages =        "343--343",
  month =        dec,
  year =         "1994",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 13 09:52:49 1995",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bacon:1994:CTH,
  author =       "David F. Bacon and Susan L. Graham and Oliver J.
                 Sharp",
  title =        "Compiler Transformations for High-Performance
                 Computing",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "4",
  pages =        "345--420",
  month =        dec,
  year =         "1994",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/197405.197406",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/197406.html",
  abstract =     "In the last three decades a large number of compiler
                 transformations for optimizing programs have been
                 implemented. Most optimizations for uniprocessors
                 reduce the number of instructions executed by the
                 program using transformations based on the analysis of
                 scalar quantities and data-flow techniques. In
                 contrast, optimizations for high-performance
                 superscalar, vector, and parallel processors maximize
                 parallelism and memory locality with transformations
                 that rely on tracking the properties of arrays using
                 loop dependence analysis.\par

                 This survey is a comprehensive overview of the
                 important high-level program restructuring techniques
                 for imperative languages, such as C and Fortran.
                 Transformations for both sequential and various types
                 of parallel architectures are covered in depth. We
                 describe the purpose of each transformation, explain
                 how to determine if it is legal, and give an example of
                 its application.\par

                 Programmers wishing to enhance the performance of their
                 code can use this survey to improve their understanding
                 of the optimizations that compilers can perform, or as
                 a reference for techniques to be applied manually.
                 Students can obtain an overview of optimizing compiler
                 technology. Compiler writers can use this survey as a
                 reference for most of the important optimizations
                 developed to date, and as bibliographic reference for
                 the details of each optimization. Readers are expected
                 to be familiar with modern computer architecture and
                 basic program compilation techniques.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "compilation; D.1.3 [Programming Techniques]:
                 Concurrent Programming; D.3.4 [Programming Languages]:
                 Processors---compilers; dependence analysis; I.2.2
                 [Artificial Intelligence]: Automatic
                 Programming---program transformation; languages;
                 locality; multiprocessors; optimization; parallelism;
                 performance; superscalar processors; vectorization",
  subject =      "{\bf D.3.4}: Software, PROGRAMMING LANGUAGES,
                 Processors, Compilers. {\bf D.1.3}: Software,
                 PROGRAMMING TECHNIQUES, Concurrent Programming. {\bf
                 D.3.4}: Software, PROGRAMMING LANGUAGES, Processors,
                 Optimization. {\bf I.2.2}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Automatic Programming, Program
                 transformation.",
}

@Article{Matousek:1994:GRS,
  author =       "Ji{\v{r}}{\'\i} Matou{\v{s}}ek",
  title =        "Geometric Range Searching",
  journal =      j-COMP-SURV,
  volume =       "26",
  number =       "4",
  pages =        "421--461",
  month =        dec,
  year =         "1994",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/197405.197408",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:22 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/197408.html",
  abstract =     "In geometric range searching, algorithmic problems of
                 the following type are considered. Given an $n$-point
                 set P in the plane, build a data structure so that,
                 given a query triangle R, the number of points of P
                 lying in R can be determined quickly. Similar questions
                 can be asked for point sets in higher dimensions, with
                 triangles replaced by simplices or by more complicated
                 shapes. Algorithms of this type are of crucial
                 importance in computational geometry, as they can be
                 used as subroutines in solutions to many seemingly
                 unrelated problems, which are often motivated by
                 practical applications, for instance in computer
                 graphics (ray tracing, hidden-surface removal etc.). We
                 present a survey of theoretical results and the main
                 techniques in geometric range searching.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; and systems; computational geometry; E.1
                 [Data]: Data Structures; F.2.2 [Analysis of Algorithms
                 and Problem Complexity]: Nonnumerical Algorithms and
                 Problems---geometric problems and computations; G.m
                 [Mathematics of Computing]: Miscellaneous; H.3.3
                 [Information Storage and Retrieval]: Information Search
                 and Retrieval; I.3.5 [Computer Graphics]: Computational
                 Geometry and Object Modeling---geometric algorithms;
                 languages; lower bounds in arithmetic model; partition
                 tree; range searching; theory",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf E.1}: Data, DATA STRUCTURES. {\bf
                 G.m}: Mathematics of Computing, MISCELLANEOUS. {\bf
                 H.3.3}: Information Systems, INFORMATION STORAGE AND
                 RETRIEVAL, Information Search and Retrieval. {\bf
                 I.3.5}: Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling, Geometric
                 algorithms, languages, and systems.",
}

@Article{Wegner:1995:AIa,
  author =       "Peter Wegner and Marvin Israel",
  title =        "About This Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Jun 23 18:07:21 1995",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hartmanis:1995:TAL,
  author =       "Juris Hartmanis",
  title =        "{Turing Award} Lecture: {On} Computational Complexity
                 and the Nature of Computer Science",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "7--16",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214040",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214040.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "human factors",
  subject =      "{\bf F.0}: Theory of Computation, GENERAL. {\bf A.0}:
                 General Literature, GENERAL. {\bf K.1}: Computing
                 Milieux, THE COMPUTER INDUSTRY.",
}

@Article{Belady:1995:DPS,
  author =       "Laszlo A. Belady",
  title =        "The Disappearance of the {``Pure''} Software
                 Industry",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "17--18",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214043",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214043.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "documentation",
  subject =      "{\bf K.1}: Computing Milieux, THE COMPUTER INDUSTRY.
                 {\bf D.2.0}: Software, SOFTWARE ENGINEERING, General.",
}

@Article{Brassard:1995:TAP,
  author =       "Gilles Brassard",
  title =        "Time for Another Paradigm Shift",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "19--21",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214044",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214044.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "human factors",
  subject =      "{\bf F.2.0}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, General. {\bf A.0}:
                 General Literature, GENERAL.",
}

@Article{Denning:1995:CTS,
  author =       "Peter J. Denning",
  title =        "Can there be a science of information?",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "23--25",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214046",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214046.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "documentation",
  subject =      "{\bf H.1.1}: Information Systems, MODELS AND
                 PRINCIPLES, Systems and Information Theory, Value of
                 information. {\bf A.0}: General Literature, GENERAL.",
}

@Article{Freeman:1995:ECS,
  author =       "Peter A. Freeman",
  title =        "Effective Computer Science",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "27--29",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214048",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214048.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "documentation",
  subject =      "{\bf K.1}: Computing Milieux, THE COMPUTER INDUSTRY.
                 {\bf A.0}: General Literature, GENERAL.",
}

@Article{Loui:1995:CSN,
  author =       "Michael C. Loui",
  title =        "Computer Science is a New Engineering Discipline",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "31--32",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214049",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214049.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "documentation",
  subject =      "{\bf F.0}: Theory of Computation, GENERAL. {\bf K.1}:
                 Computing Milieux, THE COMPUTER INDUSTRY. {\bf A.0}:
                 General Literature, GENERAL.",
}

@Article{Plaice:1995:CSE,
  author =       "John Plaice",
  title =        "Computer Science is an Experimental Science",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "33--33",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214050",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214050.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "documentation",
  subject =      "{\bf F.0}: Theory of Computation, GENERAL. {\bf K.1}:
                 Computing Milieux, THE COMPUTER INDUSTRY. {\bf A.0}:
                 General Literature, GENERAL.",
}

@Article{Savage:1995:WCS,
  author =       "John E. Savage",
  title =        "Will computer science become irrelevant?",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "35--37",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214052",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214052.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "documentation",
  subject =      "{\bf F.0}: Theory of Computation, GENERAL. {\bf K.1}:
                 Computing Milieux, THE COMPUTER INDUSTRY. {\bf A.0}:
                 General Literature, GENERAL.",
}

@Article{Stewart:1995:SCS,
  author =       "N. F. Stewart",
  title =        "Science and Computer Science",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "39--41",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214088",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214088.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "documentation",
  subject =      "{\bf F.0}: Theory of Computation, GENERAL. {\bf K.1}:
                 Computing Milieux, THE COMPUTER INDUSTRY. {\bf A.0}:
                 General Literature, GENERAL.",
}

@Article{Ullman:1995:RTT,
  author =       "Jeffrey D. Ullman",
  title =        "The Role of Theory Today",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "43--44",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214089",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214089.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "documentation",
  subject =      "{\bf F.0}: Theory of Computation, GENERAL. {\bf K.1}:
                 Computing Milieux, THE COMPUTER INDUSTRY. {\bf A.0}:
                 General Literature, GENERAL.",
}

@Article{Wegner:1995:IBE,
  author =       "Peter Wegner",
  title =        "Interaction as a Basis for Empirical Computer
                 Science",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "45--48",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214092",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214092.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "documentation",
  subject =      "{\bf F.0}: Theory of Computation, GENERAL. {\bf A.0}:
                 General Literature, GENERAL. {\bf K.1}: Computing
                 Milieux, THE COMPUTER INDUSTRY.",
}

@Article{Weingarten:1995:GFC,
  author =       "Fred Weingarten",
  title =        "Government Funding and Computing Research Priorities",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "49--54",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214093",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214093.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "documentation",
  subject =      "{\bf F.0}: Theory of Computation, GENERAL. {\bf A.0}:
                 General Literature, GENERAL. {\bf K.1}: Computing
                 Milieux, THE COMPUTER INDUSTRY.",
}

@Article{Wulf:1995:WSE,
  author =       "W. A. Wulf",
  title =        "Are we scientists or engineers?",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "55--57",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214096",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214096.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "documentation",
  subject =      "{\bf A.0}: General Literature, GENERAL. {\bf K.1}:
                 Computing Milieux, THE COMPUTER INDUSTRY. {\bf F.0}:
                 Theory of Computation, GENERAL.",
}

@Article{Hartmanis:1995:REC,
  author =       "Juris Hartmanis",
  title =        "Response to the Essays {``On Computational Complexity
                 and the Nature of Computer Science''}",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "59--61",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214097",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214097.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "documentation",
  subject =      "{\bf F.0}: Theory of Computation, GENERAL. {\bf A.0}:
                 General Literature, GENERAL. {\bf K.1}: Computing
                 Milieux, THE COMPUTER INDUSTRY.",
}

@Article{Buhr:1995:MC,
  author =       "Peter A. Buhr and Michel Fortier and Michael H.
                 Coffin",
  title =        "Monitor Classification",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "63--107",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214100",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214100.html",
  abstract =     "One of the most natural, elegant, and efficient
                 mechanisms for synchronization and communication,
                 especially for systems with shared memory, is the {\em
                 monitor}. Over the past twenty years many kinds of
                 monitors have been proposed and implemented, and many
                 modern programming languages provide some form of
                 monitor for concurrency control. This paper presents a
                 taxonomy of monitors that encompasses all the extant
                 monitors and suggests others not found in the
                 literature or in existing programming languages. It
                 discusses the semantics and performance of the various
                 kinds of monitors suggested by the taxonomy, and it
                 discusses programming techniques suitable to each.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; classification; control structures; D.1.3
                 [Programming Techniques]: Concurrent Programming; D.3.3
                 [Programming Languages]: Language Constructs and
                 Features---concurrent programming structures; D.4.1
                 [Operating Systems]: Process Management---concurrency;
                 F.3.3 [Logics and Meanings of Programs]: Studies of
                 Program Constructs---control primitives; languages;
                 monitors; mutual exclusion; performance;
                 Performance---simulation; scheduling; synchronization",
  subject =      "{\bf D.4.8}: Software, OPERATING SYSTEMS, Performance,
                 Simulation. {\bf D.1.3}: Software, PROGRAMMING
                 TECHNIQUES, Concurrent Programming. {\bf D.3.3}:
                 Software, PROGRAMMING LANGUAGES, Language Constructs
                 and Features, Concurrent programming structures. {\bf
                 D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Control structures. {\bf
                 D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Concurrency. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management, Mutual
                 exclusion. {\bf D.4.1}: Software, OPERATING SYSTEMS,
                 Process Management, Scheduling. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management, Synchronization.
                 {\bf F.3.3}: Theory of Computation, LOGICS AND MEANINGS
                 OF PROGRAMS, Studies of Program Constructs, Control
                 primitives.",
}

@Article{Baeza-Yates:1995:FAR,
  author =       "Ricardo A. Baeza-Yates",
  title =        "Fringe Analysis Revisited",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "109--119",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/214037.214103",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:46:43 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/214103.html",
  abstract =     "Fringe analysis is a technique used to study the
                 average behavior of search trees. In this paper we
                 survey the main results regarding this technique, and
                 we improve a previous asymptotic theorem. At the same
                 time, we present new developments and applications of
                 the theory that allow improvements in several bounds on
                 the behavior of search trees. Our examples cover binary
                 search trees, AVL-trees, 2--3 trees, and B-trees.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; average case analysis; AVL trees; B-trees;
                 E.1 [Data]: Data Structures---trees; F.2.2 [Analysis of
                 Algorithms and Problem Complexity]: Nonnumerical
                 Algorithms and Problems---computations on discrete
                 structures; matrix theory; recurrence equations; search
                 trees; sorting and searching",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Sorting and searching. {\bf
                 E.1}: Data, DATA STRUCTURES, Trees. {\bf F.2.2}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures.",
}

@Article{Various:1995:STN,
  author =       "Various",
  title =        "The Scope and Tutorial Needs of the {ACM SIGs}",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "1",
  pages =        "121--137",
  month =        mar,
  year =         "1995",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Jun 23 18:07:21 1995",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wegner:1995:AIb,
  author =       "Peter Wegner and Marvin Israel",
  title =        "About This Issue",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "139--140",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Sep 18 08:40:14 1995",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pitoura:1995:OOM,
  author =       "Evaggelia Pitoura and Omran Bukhres and Ahmed
                 Elmagarmid",
  title =        "Object Orientation in Multidatabase Systems",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "141--195",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/210376.210378",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:47:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/210378.html",
  abstract =     "A multidatabase system (MDBS) is a confederation of
                 preexisting distributed, heterogeneous, and autonomous
                 database systems. There has been a recent proliferation
                 of research suggesting the application of
                 object-oriented techniques to facilitate the complex
                 task of designing and implementing MDBSs. Although this
                 approach seems promising, the lack of a general
                 framework impedes any further development. The goal of
                 this paper is to provide a concrete analysis and
                 categorization of the various ways in which object
                 orientation has affected the task of designing and
                 implementing MDBSs.\par

                 We identify three dimensions in which the
                 object-oriented paradigm has influenced this task: the
                 general system architecture, the schema architecture,
                 and the heterogeneous transaction management. Then we
                 provide a classification and a comprehensive analysis
                 of the issues related to each of the above dimensions.
                 To demonstrate the applicability of this analysis, we
                 conclude with a comparative review of existing
                 multidatabase systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; distributed objects; federated databases;
                 integration; languages; management; multidatabases;
                 standardization; views",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Distributed systems. {\bf C.2.4}: Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems, Distributed applications. {\bf
                 C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
                 Distributed databases. {\bf D.1.5}: Software,
                 PROGRAMMING TECHNIQUES, Object-oriented Programming.
                 {\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models. {\bf H.2.1}: Information
                 Systems, DATABASE MANAGEMENT, Logical Design, Schema
                 and subschema. {\bf H.2.3}: Information Systems,
                 DATABASE MANAGEMENT, Languages, Query languages. {\bf
                 H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing. {\bf H.2.4}: Information
                 Systems, DATABASE MANAGEMENT, Systems, Transaction
                 processing. {\bf H.2.5}: Information Systems, DATABASE
                 MANAGEMENT, Heterogeneous Databases, Data translation.
                 {\bf H.2.5}: Information Systems, DATABASE MANAGEMENT,
                 Heterogeneous Databases, Program translation.",
}

@Article{Paakki:1995:AGP,
  author =       "Jukka Paakki",
  title =        "Attribute Grammar Paradigms --- a High-Level
                 Methodology in Language Implementation",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "196--255",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/210376.197409",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:47:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/197409.html",
  abstract =     "Attribute grammars are a formalism for specifying
                 programming languages. They have been applied to a
                 great number of systems automatically producing
                 language implementations from their specifications. The
                 systems and their specification languages can be
                 evaluated and classified according to their level of
                 application support, linguistic characteristics, and
                 degree of automation.\par

                 A survey of attribute grammar-based specification
                 languages is given. The modern advanced specification
                 languages extend the core attribute grammar model with
                 concepts and primitives from established programming
                 paradigms. The main ideas behind the developed
                 attribute grammar paradigms are discussed, and
                 representative specification languages are presented
                 with a common example grammar. The presentation is
                 founded on mapping elements of attribute grammars to
                 their counterparts in programming languages. This
                 methodology of integrating two problem-solving
                 disciplines together is explored with a classification
                 of the paradigms into structured, modular,
                 object-oriented, logic, and functional attribute
                 grammars. The taxonomy is complemented by introducing
                 approaches based on an implicit parallel or incremental
                 attribute evaluation paradigm.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "attribute grammars; blocks; classes; compiler writing
                 systems; design; functional dependencies; incomplete
                 data; incrementality; inheritance; language processing;
                 language processor generators; languages; lazy
                 evaluation; logical variables; objects; parallelism;
                 processes; programming paradigms; semantic functions;
                 symbol tables; theory; unification",
  subject =      "{\bf D.3.1}: Software, PROGRAMMING LANGUAGES, Formal
                 Definitions and Theory. {\bf F.4.2}: Theory of
                 Computation, MATHEMATICAL LOGIC AND FORMAL LANGUAGES,
                 Grammars and Other Rewriting Systems. {\bf D.3.4}:
                 Software, PROGRAMMING LANGUAGES, Processors,
                 Compilers.",
}

@Article{Garlan:1995:RDS,
  author =       "David Garlan",
  title =        "Research Directions in Software Architecture",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "257--261",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/210376.210388",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:47:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/210388.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design",
  subject =      "{\bf D.2.0}: Software, SOFTWARE ENGINEERING, General.
                 {\bf K.6.3}: Computing Milieux, MANAGEMENT OF COMPUTING
                 AND INFORMATION SYSTEMS, Software Management.",
}

@Article{Nierstrasz:1995:RDS,
  author =       "Oscar Nierstrasz and Theo Dirk Meijler",
  title =        "Research Directions in Software Composition",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "262--264",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/210376.210389",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:47:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/210389.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design",
  subject =      "{\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques. {\bf D.2.m}: Software, SOFTWARE
                 ENGINEERING, Miscellaneous, Reusable software. {\bf
                 D.2.10}: Software, SOFTWARE ENGINEERING, Design,
                 Methodologies.",
}

@Article{Wiederhold:1995:MIS,
  author =       "Gio Wiederhold",
  title =        "Mediation in Information Systems",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "265--267",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/210376.210390",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:47:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/210390.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; theory",
  subject =      "{\bf H.4.2}: Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Types of Systems, Decision support. {\bf
                 H.1.0}: Information Systems, MODELS AND PRINCIPLES,
                 General.",
}

@Article{Manola:1995:IIL,
  author =       "Frank Manola",
  title =        "Interoperability Issues in Large-Scale Distributed
                 Object Systems",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "268--270",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/210376.210391",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:47:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/210391.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; theory",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Distributed systems. {\bf H.3.4}: Information
                 Systems, INFORMATION STORAGE AND RETRIEVAL, Systems and
                 Software, Information networks.",
}

@Article{Heiler:1995:SI,
  author =       "Sandra Heiler",
  title =        "Semantic Interoperability",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "271--273",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/210376.210392",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:47:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/210392.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; theory",
  subject =      "{\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Distributed systems. {\bf H.3.4}: Information
                 Systems, INFORMATION STORAGE AND RETRIEVAL, Systems and
                 Software, Information networks.",
}

@Article{Sutherland:1995:BOC,
  author =       "Jeff Sutherland",
  title =        "Business Objects in Corporate Information Systems",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "274--276",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/210376.210394",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:47:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/210394.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; theory",
  subject =      "{\bf D.2.m}: Software, SOFTWARE ENGINEERING,
                 Miscellaneous, Reusable software. {\bf H.4.2}:
                 Information Systems, INFORMATION SYSTEMS APPLICATIONS,
                 Types of Systems. {\bf D.2.2}: Software, SOFTWARE
                 ENGINEERING, Tools and Techniques, Modules and
                 interfaces.",
}

@Article{Gallopoulos:1995:WPS,
  author =       "Efstratios Gallopoulos and Elias N. Houstis and John
                 R. Rice",
  title =        "Workshop on Problem-Solving Environments: Findings and
                 Recommendations",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "277--279",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/210376.210396",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:47:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/210396.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "documentation",
  subject =      "{\bf F.0}: Theory of Computation, GENERAL. {\bf A.0}:
                 General Literature, GENERAL, Conference proceedings.",
}

@Article{Rosenberg:1995:TPC,
  author =       "Arnold L. Rosenberg",
  title =        "Thoughts on Parallelism and Concurrency in Computing
                 Curricula",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "280--283",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/210376.210399",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:47:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/210399.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; human factors",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Curriculum. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency.",
}

@Article{Metaxas:1995:FIP,
  author =       "P. Takis Metaxas",
  title =        "Fundamental Ideas for a Parallel Computing Course",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "284--286",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/210376.210404",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:47:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/210404.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; human factors",
  subject =      "{\bf K.3.2}: Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science Education,
                 Curriculum. {\bf F.1.2}: Theory of Computation,
                 COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
                 Parallelism and concurrency.",
}

@Article{Moller:1995:CCB,
  author =       "Faron Moller and Scott A. Smolka",
  title =        "On the Computational Complexity of Bisimulation",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "287--289",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/210376.210406",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:47:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/210406.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes. {\bf F.2.0}:
                 Theory of Computation, ANALYSIS OF ALGORITHMS AND
                 PROBLEM COMPLEXITY, General.",
}

@Article{Cytron:1995:SST,
  author =       "Ron K. Cytron and Brent Hailpern",
  title =        "{SIGPLAN} Scope and Tutorial Needs",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "290--291",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/210376.210407",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:47:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/210407.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design",
  subject =      "{\bf A.0}: General Literature, GENERAL. {\bf D.3.0}:
                 Software, PROGRAMMING LANGUAGES, General.",
}

@Article{Thomasian:1995:SFH,
  author =       "Alexander Thomasian",
  title =        "Surveyors' forum --- high-performance secondary
                 memory",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "2",
  pages =        "292--295",
  month =        jun,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/210376.210409",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:47:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/210409.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; performance; reliability",
  subject =      "{\bf B.4.2}: Hardware, INPUT/OUTPUT AND DATA
                 COMMUNICATIONS, Input/Output Devices. {\bf B.4.5}:
                 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Reliability, Testing, and Fault-Tolerance. {\bf B.4.4}:
                 Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
                 Performance Analysis and Design Aids. {\bf B.3.2}:
                 Hardware, MEMORY STRUCTURES, Design Styles, Mass
                 storage.",
}

@Article{Wegner:1995:AIc,
  author =       "Peter Wegner and Marvin Israel",
  title =        "About This Issue",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "297--297",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 28 15:34:50 1995",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Reddy:1995:GCA,
  author =       "Raj Reddy",
  title =        "Grand Challenges in {AI}",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "301--303",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212097",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212097.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.0}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, General.",
}

@Article{Ahuja:1995:DRM,
  author =       "Narendra Ahuja",
  title =        "On Detection and Representation of Multiscale
                 Low-Level Image Structure",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "304--306",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212099",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212099.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.10}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Vision and Scene Understanding.",
}

@Article{Aloimonos:1995:SUR,
  author =       "Yiannis Aloimonos and C. Ferm{\"u}ller and A.
                 Rosenfeld",
  title =        "Seeing and Understanding: Representing the Visual
                 World",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "307--309",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212101",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212101.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.10}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Vision and Scene Understanding. {\bf
                 I.3.7}: Computing Methodologies, COMPUTER GRAPHICS,
                 Three-Dimensional Graphics and Realism. {\bf I.5.4}:
                 Computing Methodologies, PATTERN RECOGNITION,
                 Applications, Computer vision.",
}

@Article{Bajcsy:1995:SST,
  author =       "Ruzena Bajcsy",
  title =        "Signal-to-Symbol Transformation and Vice Versa: From
                 Fundamental Processes to Representation",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "310--313",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212103",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212103.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods, Representations (procedural and rule-based).
                 {\bf I.2.0}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, General.",
}

@Article{Brachman:1995:UBU,
  author =       "Ronald J. Brachman and Hector J. Levesque",
  title =        "Undirected Behavior Without Unbounded Search",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "314--316",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212104",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212104.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods, Representations (procedural and rule-based).
                 {\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search.",
}

@Article{Charniak:1995:NLL,
  author =       "Eugene Charniak",
  title =        "Natural Language Learning",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "317--319",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212108",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212108.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.7}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Natural Language Processing.",
  xxauthor =     "Eugen Charniak",
}

@Article{Clancey:1995:AIN,
  author =       "William J. Clancey",
  title =        "{AI}: Inventing a New Kind of Machine",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "320--322",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212110",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212110.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.0}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, General.",
}

@Article{Cohn:1995:CQS,
  author =       "A. G. Cohn",
  title =        "The Challenge of Qualitative Spatial Reasoning",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "323--325",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212112",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212112.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods. {\bf I.2.3}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem
                 Proving.",
}

@Article{Dietterich:1995:OUM,
  author =       "Tom Dietterich",
  title =        "Overfitting and Undercomputing in Machine Learning",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "326--327",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212114",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212114.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning. {\bf I.2.8}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Problem
                 Solving, Control Methods, and Search, Heuristic
                 methods. {\bf I.2.2}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Automatic Programming,
                 Automatic analysis of algorithms.",
}

@Article{Dubois:1995:WDF,
  author =       "Didier Dubois and Henri Prade",
  title =        "What Does Fuzzy Logic Bring to {AI}?",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "328--330",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212115",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212115.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving,
                 Uncertainty, ``fuzzy,'' and probabilistic reasoning.",
}

@Article{Ginsberg:1995:EHA,
  author =       "Matthew L. Ginsberg",
  title =        "Epistemological and Heuristic Adequacy Revisited",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "331--333",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212117",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212117.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search.",
}

@Article{Kambhampati:1995:APP,
  author =       "Subbarao Kambhampati",
  title =        "{AI} Planning: a Prospectus on Theory and
                 Applications",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "334--336",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212118",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212118.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Plan execution, formation, generation.",
}

@Article{Korf:1995:SES,
  author =       "Richard E. Korf",
  title =        "Space-Efficient Search Algorithms",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "337--339",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212120",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212120.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; performance; theory",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Graph and tree search strategies. {\bf I.2.8}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Problem Solving, Control Methods, and Search, Heuristic
                 methods.",
}

@Article{Lesser:1995:MSE,
  author =       "Victor R. Lesser",
  title =        "Multiagent Systems: An Emerging Subdiscipline of
                 {AI}",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "340--342",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212121",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212121.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.11}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Distributed Artificial Intelligence. {\bf
                 I.2.1}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Applications and Expert Systems.",
}

@Article{Lifschitz:1995:LCS,
  author =       "Vladimir Lifschitz",
  title =        "The Logic of Common Sense",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "343--345",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212122",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212122.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving, Logic
                 programming.",
}

@Article{Loui:1995:MDS,
  author =       "R. P. Loui",
  title =        "Models of Deliberation in the Social Sciences",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "346--348",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212123",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212123.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.0}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, General. {\bf I.2.3}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
                 Theorem Proving. {\bf J.4}: Computer Applications,
                 SOCIAL AND BEHAVIORAL SCIENCES.",
}

@Article{Pitrat:1995:ASD,
  author =       "Jacques Pitrat",
  title =        "{AI} Systems are Dumb Because {AI} Researchers Are Too
                 Clever",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "349--350",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212124",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212124.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; human factors; performance",
  subject =      "{\bf I.2.1}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Applications and Expert Systems.",
}

@Article{Tate:1995:DLY,
  author =       "Austin Tate",
  title =        "Don't Leave Your Plan on the Shelf",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "351--352",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212125",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212125.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; theory",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Plan execution, formation, generation.",
}

@Article{Torasso:1995:RA,
  author =       "Pietro Torasso and Luca Console and Luigi Portinale
                 and Daniele Theseider Dupr{\'e}",
  title =        "On the Role of Abduction",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "353--355",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212126",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212126.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving. {\bf
                 I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search.",
}

@Article{Waltz:1995:RD,
  author =       "David Waltz and Simon Kasif",
  title =        "On Reasoning From Data",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "356--359",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212127",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212127.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving. {\bf
                 I.2.4}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Knowledge Representation Formalisms and
                 Methods.",
}

@Article{Wellman:1995:EAA,
  author =       "Michael P. Wellman",
  title =        "The Economic Approach to Artificial Intelligence",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "360--362",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212128",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212128.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "economics; theory",
  subject =      "{\bf I.2.0}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, General. {\bf K.6.0}: Computing Milieux,
                 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS,
                 General.",
}

@Article{Yip:1995:IR,
  author =       "Kenneth Yip and Feng Zhao and Elisha Sacks",
  title =        "Imagistic Reasoning",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "363--365",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212130",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 UnCover library database",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212130.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; performance; theory",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving. {\bf
                 I.2.9}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Robotics, Manipulators.",
}

@Article{Allan:1995:SP,
  author =       "Vicki H. Allan and Reese B. Jones and Randall M. Lee
                 and Stephen J. Allan",
  title =        "Software Pipelining",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "367--432",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212131",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212131.html",
  abstract =     "Utilizing parallelism at the instruction level is an
                 important way to improve performance. Because the time
                 spent in loop execution dominates total execution time,
                 a large body of optimizations focuses on decreasing the
                 time to execute each iteration. Software pipelining is
                 a technique that reforms the loop so that a faster
                 execution rate is realized. Iterations are executed in
                 overlapped fashion to increase parallelism.\par

                 Let $ \mbox {\em ABC}^n $ represent a loop containing
                 operations $A$, $B$, $C$ that is executed $n$ times.
                 Although the operations of a single iteration can be
                 parallelized, more parallelism may be achieved if the
                 entire loop is considered rather than a single
                 iteration. The software pipelining transformation
                 utilizes the fact that a loop $ \mbox {\em ABC}^n $ is
                 equivalent to $ \mbox {\em A} \mbox {\em BCA}^{n - 1}
                 \mbox {\em BC} $. Although the operations contained in
                 the loop do not change, the operations are from
                 different iterations of the original loop.\par

                 Various algorithms for software pipelining exist. A
                 comparison of the alternative methods for software
                 pipelining is presented. The relationships between the
                 methods are explored and possibilities for improvement
                 highlighted.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; instruction level parallelism; languages;
                 loop reconstruction; optimization; software
                 pipelining",
  subject =      "{\bf D.3.4}: Software, PROGRAMMING LANGUAGES,
                 Processors, Optimization. {\bf D.1.3}: Software,
                 PROGRAMMING TECHNIQUES, Concurrent Programming. {\bf
                 D.3.4}: Software, PROGRAMMING LANGUAGES, Processors,
                 Compilers.",
}

@Article{Beauchemin:1995:COF,
  author =       "S. S. Beauchemin and J. L. Barron",
  title =        "The Computation of Optical Flow",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "3",
  pages =        "433--467",
  month =        sep,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/212094.212141",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:48:20 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0360-0300/212141.html",
  abstract =     "Two-dimensional image motion is the projection of the
                 three-dimensional motion of objects, relative to a
                 visual sensor, onto its image plane. Sequences of
                 time-ordered images allow the estimation of projected
                 two-dimensional image motion as either instantaneous
                 image velocities or discrete image displacements. These
                 are usually called the {\em optical flow field} or the
                 {\em image velocity field}. Provided that optical flow
                 is a reliable approximation to two-dimensional image
                 motion, it may then be used to recover the
                 three-dimensional motion of the visual sensor (to
                 within a scale factor) and the three-dimensional
                 surface structure (shape or relative depth) through
                 assumptions concerning the structure of the optical
                 flow field, the three-dimensional environment, and the
                 motion of the sensor. Optical flow may also be used to
                 perform motion detection, object segmentation,
                 time-to-collision and focus of expansion calculations,
                 motion compensated encoding, and stereo disparity
                 measurement. We investigate the computation of optical
                 flow in this survey: widely known methods for
                 estimating optical flow are classified and examined by
                 scrutinizing the hypothesis and assumptions they use.
                 The survey concludes with a discussion of current
                 research issues.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; measurement; theory",
  subject =      "{\bf I.2.10}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Vision and Scene Understanding, Motion.
                 {\bf I.3.1}: Computing Methodologies, COMPUTER
                 GRAPHICS, Hardware architecture, Three-dimensional
                 displays. {\bf I.4.0}: Computing Methodologies, IMAGE
                 PROCESSING, General, Image displays. {\bf I.4.0}:
                 Computing Methodologies, IMAGE PROCESSING, General,
                 Image processing software. {\bf I.4.8}: Computing
                 Methodologies, IMAGE PROCESSING, Scene Analysis,
                 Time-varying imagery. {\bf I.4.10}: Computing
                 Methodologies, IMAGE PROCESSING, Image Representation,
                 Hierarchical. {\bf I.5.0}: Computing Methodologies,
                 PATTERN RECOGNITION, General.",
}

@Article{Greenlaw:1995:CG,
  author =       "Raymond Greenlaw and Rossella Petreschi",
  title =        "Cubic Graphs",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "471--495",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234783",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "coloring; complexity theory; cubic graphs; discrete
                 mathematics; graph theory; matching; NP-completeness;
                 P-completeness; planar graphs; regular graphs",
}

@Article{Prather:1995:DAH,
  author =       "Ronald E. Prather",
  title =        "Design and Analysis of Hierarchical Software Metrics",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "497--518",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234784",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "flowcharts; hierarchical metrics; software
                 engineering; software metrics",
}

@Article{Sarkar:1995:MSE,
  author =       "Dilip Sarkar",
  title =        "Methods to Speed Up Error Back-Propagation Learning
                 Algorithm",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "519--542",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234785",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "adaptive learning rate; artificial neural networks;
                 conjugate gradient method; energy function; error
                 back-propagation learning; feedforward networks;
                 learning rate; momentum; oscillation of weights;
                 training set size",
}

@Article{Anonymous:1995:CSS,
  author =       "Anonymous",
  title =        "Computing Surveys Symposium on Multimedia",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "543--544",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 20 11:54:12 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gudivada:1995:MSI,
  author =       "Venkat N. Gudivada",
  title =        "Multimedia Systems --- An Interdisciplinary
                 Perspective",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "545--548",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234786",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fox:1995:MCC,
  author =       "Edward A. Fox and Linda M. Kieffer",
  title =        "Multimedia Curricula, Courses, and Knowledge Modules",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "549--551",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234787",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Furht:1995:WIS,
  author =       "Borko Furht",
  title =        "Where Are Information Superhighways Headed?",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "554--556",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234788",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Preece:1995:SFE,
  author =       "Jenny Preece and Ben Shneiderman",
  title =        "Survival of the Fittest: The Evolution of Multimedia
                 User Interfaces",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "557--559",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234789",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Andre:1995:IMM,
  author =       "Elisabeth Andr{\'e}",
  title =        "Intellimedia: Making Multimedia Usable by Exploiting
                 {AI} Methods",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "560--563",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234790",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Aref:1995:HEI,
  author =       "Walid G. Aref and Ibrahim Kamel and Daniel P.
                 Lopresti",
  title =        "On Handling Electronic Ink",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "564--567",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234791",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Baker:1995:NMA,
  author =       "James E. Baker and Isabel F. Cruz and Giuseppe Liotta
                 and Roberto Tamassia",
  title =        "A New Model for Algorithm Animation Over the {WWW}",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "568--572",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234792",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chang:1995:EFC,
  author =       "Shih-Fu Chang",
  title =        "Exploring Functionalities in the Compressed
                 Image\slash Video Domain",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "573--575",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.250721",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Christodoulakis:1995:RDI,
  author =       "Stavros Christodoulakis and Peter Triantafillou",
  title =        "Research and Development Issues for Large-Scale
                 Multimedia Information Systems",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "576--579",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234793",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cowan:1995:AMD,
  author =       "Crispin Cowan and Shanwei Cen and Jonathan Walpole and
                 Calton Pu",
  title =        "Adaptive Methods for Distributed Video Presentation",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "580--583",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234794",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dimitrova:1995:MSV,
  author =       "Nevenka Dimitrova",
  title =        "The Myth of Semantic Video Retrieval",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "584--586",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234795",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Flank:1995:RNL,
  author =       "Sharon Flank",
  title =        "The Role of Natural-Language Processing in
                 Multimedia",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "587--589",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234796",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Garofalakis:1995:SIM,
  author =       "Minos N. Garofalakis and Yannis E. Ioannidis",
  title =        "Scheduling Issues in Multimedia Query Optimization",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "590--592",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234797",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ghafoor:1995:MDM,
  author =       "Arif Ghafoor",
  title =        "Multimedia Database Management Systems",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "593--598",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234798",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hall:1995:RHM,
  author =       "Wendy Hall",
  title =        "The Role of Hypermedia in Multimedia Information
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "599--601",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234799",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Li:1995:DDM,
  author =       "Qing Li and Liu Sheng Huang",
  title =        "A Dynamic Data Model for a Video Database Management
                 System",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "602--606",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234800",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Moffat:1995:IOM,
  author =       "Alistair Moffat and Justin Zobel",
  title =        "Index Organization for Multimedia Database Systems",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "607--609",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234801",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mosse:1995:RRN,
  author =       "Daniel Moss{\'e}",
  title =        "Resource Reservations in Networked Multimedia
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "610--612",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234802",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nahrstedt:1995:EEQ,
  author =       "Klara Nahrstedt",
  title =        "End-to-End {QoS} Guarantees in Networked Multimedia
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "613--616",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234803",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ozden:1995:RIM,
  author =       "Banu {\"O}zden and Rajeev Rastogi and Avi
                 Silberschatz",
  title =        "Research Issues in Multimedia Storage Servers",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "617--620",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234804",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Picard:1995:CLS,
  author =       "Rosalind W. Picard",
  title =        "Computer Learning of Subjectivity",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "621--623",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234805",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Roselli:1995:AIC,
  author =       "Teresa Roselli",
  title =        "Artificial Intelligence Can Improve Hypermedia
                 Instructional Technologies for Learning",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "624--626",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234806",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rus:1995:CMI,
  author =       "Daniela Rus and Devika Subramanian",
  title =        "Customizing Multimedia Information Access",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "627--629",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234807",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Samet:1995:GRI,
  author =       "Hanan Samet",
  title =        "General Research Issues in Multimedia Database
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "630--632",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234808",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Schank:1995:MAE,
  author =       "Roger C. Schank and Michael Korcuska and Menachem
                 Jona",
  title =        "Multimedia Applications for Education and Training:
                 Revolution or Red Herring?",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "633--635",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234809",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shenoy:1995:IMS,
  author =       "Prashant J. Shenoy and Pawan Goyal and Harrick M.
                 Vin",
  title =        "Issues in Multimedia Server Design",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "636--639",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234810",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Staehli:1995:DPD,
  author =       "Richard Staehli and Jonathan Walpole and David Maier",
  title =        "Device and Physical-Data Independence for Multimedia
                 Presentations",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "640--642",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234811",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhang:1995:DVA,
  author =       "HongJiang Zhang and Qi Tian",
  title =        "Digital Video Analysis and Recognition for
                 Content-Based Access",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "643--644",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234782.234812",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:49:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Anonymous:1995:CAI,
  author =       "Anonymous",
  title =        "Contents: Author Index: Vols. 23--27 (1991--1995)",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "645--650",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 20 11:51:39 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Anonymous:1995:CSI,
  author =       "Anonymous",
  title =        "Contents: Subject index: Vols. 23--27 (1991--1995)",
  journal =      j-COMP-SURV,
  volume =       "27",
  number =       "4",
  pages =        "650--653",
  month =        dec,
  year =         "1995",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 20 11:53:27 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Abiteboul:1996:MPC,
  author =       "Serge Abiteboul and Gabriel M. Kuper and Harry G.
                 Mairson and Alexander A. Shvartsman and Moshe Y.
                 Vardi",
  title =        "In memoriam {Paris C. Kanellakis}",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "3--15",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234318",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p3-abiteboul/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234318.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "biographies/autobiographies. {\bf h.2.0}: information
                 systems; database management; documentation; general;
                 history of computing; humanfactors; people. {\bf a.0}:
                 general literature; {\bf k.2}: computing milieux",
  subject =      "{\bf K.2}: Computing Milieux, HISTORY OF COMPUTING,
                 People. {\bf A.0}: General Literature, GENERAL,
                 Biographies/autobiographies. {\bf H.2.0}: Information
                 Systems, DATABASE MANAGEMENT, General.",
}

@Article{Reingold:1996:BTD,
  author =       "Edward M. Reingold",
  title =        "Basic techniques for design and analysis of
                 algorithms",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "19--21",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234321",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p19-reingold/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234321.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; analysis of algorithms and problem
                 complexity; and search; artificial intelligence;
                 control methods; design; dynamic programming.; general.
                 {\bf i.2.8}: computing methodologies; problem solving;
                 {\bf f.2.0}: theory of computation",
  subject =      "{\bf F.2.0}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, General. {\bf
                 I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Dynamic programming.",
}

@Article{Tucker:1996:AAS,
  author =       "Allen Tucker and Peter Wegner",
  title =        "{ACM 50th-Anniversary Symposium}: {Perspectives} in
                 Computer Science",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "19--286",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 24 18:42:48 MDT 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tamassia:1996:DS,
  author =       "Roberto Tamassia",
  title =        "Data structures",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "23--26",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234323",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p23-tamassia/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234323.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "general.; logics and meanings of programs; semantics
                 of programming languages. {\bf e.0}: data; theory; {\bf
                 f.3.2}: theory of computation",
  subject =      "{\bf F.3.2}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Semantics of Programming
                 Languages. {\bf E.0}: Data, GENERAL.",
}

@Article{Lee:1996:CG,
  author =       "D. T. Lee",
  title =        "Computational geometry",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "27--31",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234325",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p27-lee/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234325.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "analysis of algorithms and problem complexity; and
                 search.; and systems. {\bf i.2.8}: computing
                 methodologies; artificial intelligence; computational
                 geometry and object modeling; computer graphics;
                 control methods; geometric algorithms; geometrical
                 problems and computations. {\bf i.3.5}: computing
                 methodologies; languages; nonnumerical algorithms and
                 problems; problem solving; theory; {\bf f.2.2}: theory
                 of computation",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf I.3.5}: Computing Methodologies,
                 COMPUTER GRAPHICS, Computational Geometry and Object
                 Modeling, Geometric algorithms, languages, and systems.
                 {\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search.",
}

@Article{Motwani:1996:RA,
  author =       "Rajeev Motwani and Prabhakar Raghavan",
  title =        "Randomized algorithms",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "33--37",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234327",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p33-motwani/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234327.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; analysis of algorithms and problem
                 complexity; design; general. {\bf g.3}: mathematics of
                 computing; probability and statistics.; theory; {\bf
                 f.2.0}: theory of computation",
  subject =      "{\bf F.2.0}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, General. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS.",
}

@Article{Crochemore:1996:PMT,
  author =       "Maxime Crochemore and Thierry Lecroq",
  title =        "Pattern-matching and text-compression algorithms",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "39--41",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234331",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p39-crochemore/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234331.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; analysis of algorithms and problem
                 complexity; nonnumerical algorithms and problems;
                 pattern matching.; theory; {\bf f.2.2}: theory of
                 computation",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Pattern matching.",
}

@Article{Khuller:1996:GNA,
  author =       "Samir Khuller and Balaji Raghavachari",
  title =        "Graph and network algorithms",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "43--45",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234334",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p43-khuller/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234334.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; analysis of algorithms and problem
                 complexity; discrete mathematics; general.; graph
                 theory. {\bf f.2.0}: theory of computation; theory;
                 {\bf g.2.2}: mathematics of computing",
  subject =      "{\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory. {\bf F.2.0}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, General.",
}

@Article{Loui:1996:CCT,
  author =       "Michael C. Loui",
  title =        "Computational complexity theory",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "47--49",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234337",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p47-loui/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234337.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "analysis of algorithms and problem complexity;
                 complexity classes.; computation by abstract devices;
                 general. {\bf f.1.3}: theory of computation; theory;
                 {\bf f.2.0}: theory of computation",
  subject =      "{\bf F.2.0}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, General. {\bf
                 F.1.3}: Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Complexity Classes.",
}

@Article{Blelloch:1996:PA,
  author =       "Guy E. Blelloch and Bruce M. Maggs",
  title =        "Parallel algorithms",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "51--54",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234339",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p51-blelloch/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234339.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; computation by abstract devices; general;
                 modes of computation; numerical analysis; parallel
                 algorithms.; parallelism and concurrency. {\bf g.1.0}:
                 mathematics of computing; theory; {\bf f.1.2}: theory
                 of computation",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf G.1.0}: Mathematics of Computing,
                 NUMERICAL ANALYSIS, General, Parallel algorithms.",
}

@Article{Chandru:1996:COI,
  author =       "Vijay Chandru and M. R. Rao",
  title =        "Combinatorial optimization: an integer programming
                 perspective",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "55--58",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234341",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p55-chandru/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234341.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; combinatorial algorithms.; combinatorics;
                 discrete mathematics; numerical analysis; optimization.
                 {\bf g.2.1}: mathematics of computing; theory; {\bf
                 g.1.6}: mathematics of computing",
  subject =      "{\bf G.1.6}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, Optimization. {\bf G.2.1}: Mathematics of
                 Computing, DISCRETE MATHEMATICS, Combinatorics,
                 Combinatorial algorithms.",
}

@Article{Lapaugh:1996:LAV,
  author =       "Andrea S. Lapaugh",
  title =        "Layout algorithm for {VLSI} design",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "59--61",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234343",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p59-lapaugh/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234343.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; analysis of algorithms and problem
                 complexity; design; nonnumerical algorithms and
                 problems.; theory; {\bf f.2.2}: theory of computation",
  subject =      "{\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems.",
}

@Article{Burger:1996:MS,
  author =       "Doug Burger",
  title =        "Memory systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "63--65",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234974",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p63-burger/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234974.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; general.; memory structures; theory; {\bf
                 b.3.0}: hardware",
  subject =      "{\bf B.3.0}: Hardware, MEMORY STRUCTURES, General.",
}

@Article{Flynn:1996:PA,
  author =       "Michael J. Flynn and Kevin W. Rudd",
  title =        "Parallel architectures",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "67--70",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234345",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p67-flynn/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234345.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computation by abstract devices; design; general.;
                 modes of computation; parallelism and concurrency. {\bf
                 c.1.0}: computer systems organization; processor
                 architectures; theory; {\bf f.1.2}: theory of
                 computation",
  subject =      "{\bf F.1.2}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Parallelism and
                 concurrency. {\bf C.1.0}: Computer Systems
                 Organization, PROCESSOR ARCHITECTURES, General.",
}

@Article{Quinlan:1996:LDT,
  author =       "J. R. Quinlan",
  title =        "Learning decision tree classifiers",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "71--72",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234346",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p71-quinlan/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234346.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "artificial intelligence; complexity classes;
                 complexity hierarchies.; computation by abstract
                 devices; learning. {\bf f.1.3}: theory of computation;
                 theory; {\bf i.2.6}: computing methodologies",
  subject =      "{\bf I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning. {\bf F.1.3}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Complexity Classes, Complexity hierarchies.",
}

@Article{Jordan:1996:NN,
  author =       "Michael I. Jordan and Christopher M. Bishop",
  title =        "Neural networks",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "73--75",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234348",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p73-jordan/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234348.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "artificial intelligence; connectionism and neural
                 nets. {\bf g.2.2}: mathematics of computing; design;
                 discrete mathematics; graph theory.; learning; theory;
                 {\bf i.2.6}: computing methodologies",
  subject =      "{\bf I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Connectionism and neural nets.
                 {\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory.",
}

@Article{Forrest:1996:GA,
  author =       "Stephanie Forrest",
  title =        "Genetic algorithms",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "77--80",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234350",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p77-forrest/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234350.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; and search.; artificial intelligence;
                 automatic analysis of algorithms. {\bf i.2.8}:
                 computing methodologies; automatic programming; control
                 methods; problem solving; theory; {\bf i.2.2}:
                 computing methodologies",
  subject =      "{\bf I.2.2}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Automatic Programming, Automatic analysis
                 of algorithms. {\bf I.2.8}: Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Problem Solving, Control
                 Methods, and Search.",
}

@Article{Lewis:1996:R,
  author =       "F. L. Lewis and M. Fitzgerald and K. Liu",
  title =        "Robotics",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "81--83",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234351",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p81-lewis/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234351.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "artificial intelligence; coherence and coordination.;
                 distributed artificial intelligence; reliability;
                 robotics. {\bf i.2.11}: computing methodologies;
                 theory; {\bf i.2.9}: computing methodologies",
  subject =      "{\bf I.2.9}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Robotics. {\bf I.2.11}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Distributed
                 Artificial Intelligence, Coherence and coordination.",
}

@Article{Dean:1996:AP,
  author =       "Thomas Dean",
  title =        "Automated planning",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "85--87",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234352",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p85-dean/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234352.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "and search; artificial intelligence; control methods;
                 design; formation; generation.; plan execution; problem
                 solving; theory; {\bf i.2.8}: computing methodologies",
  subject =      "{\bf I.2.8}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Problem Solving, Control Methods, and
                 Search, Plan execution, formation, generation.",
}

@Article{Pearl:1996:DMU,
  author =       "Judea Pearl",
  title =        "Decision making under uncertainty",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "89--92",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234354",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p89-pearl/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234354.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "'' and probabilistic reasoning. {\bf i.2.6}: computing
                 methodologies; ``fuzzy; algorithms; artificial
                 intelligence; connectionism and neural nets. {\bf
                 g.2.2}: mathematics of computing; deduction and theorem
                 proving; discrete mathematics; graph theory.; learning;
                 theory; uncertainty; {\bf i.2.3}: computing
                 methodologies",
  subject =      "{\bf I.2.3}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Deduction and Theorem Proving,
                 Uncertainty, ``fuzzy,'' and probabilistic reasoning.
                 {\bf I.2.6}: Computing Methodologies, ARTIFICIAL
                 INTELLIGENCE, Learning, Connectionism and neural nets.
                 {\bf G.2.2}: Mathematics of Computing, DISCRETE
                 MATHEMATICS, Graph Theory.",
}

@Article{Cinnella:1996:NSR,
  author =       "Pasquale Cinnella",
  title =        "Numerical simulations of reactive flows",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "93--96",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234355",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p93-cinnella/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234355.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "general. {\bf j.2}: computer applications; numerical
                 analysis; physical sciences and engineering; physics.;
                 theory; {\bf g.1.0}: mathematics of computing",
  subject =      "{\bf G.1.0}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, General. {\bf J.2}: Computer Applications,
                 PHYSICAL SCIENCES AND ENGINEERING, Physics.",
}

@Article{Shang:1996:CE,
  author =       "Joseph S. Shang",
  title =        "Computational electromagnetics",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "97--99",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234357",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p97-shang/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234357.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "general. {\bf j.2}: computer applications; numerical
                 analysis; physical sciences and engineering; physics.;
                 theory; {\bf g.1.0}: mathematics of computing",
  subject =      "{\bf G.1.0}: Mathematics of Computing, NUMERICAL
                 ANALYSIS, General. {\bf J.2}: Computer Applications,
                 PHYSICAL SCIENCES AND ENGINEERING, Physics.",
}

@Article{Kingsbury:1996:CB,
  author =       "David T. Kingsbury",
  title =        "Computational biology",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "101--103",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234358",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p101-kingsbury/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234358.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "biology.; life and medical sciences; theory; {\bf
                 j.3}: computer applications",
  subject =      "{\bf J.3}: Computer Applications, LIFE AND MEDICAL
                 SCIENCES, Biology.",
}

@Article{Silberschatz:1996:DM,
  author =       "Avi Silberschatz and Henry F. Korth and S. Sudarshan",
  title =        "Data models",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "105--108",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234360",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p105-silberschatz/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234360.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data models.; database management; design; logical
                 design; theory; {\bf h.2.1}: information systems",
  subject =      "{\bf H.2.1}: Information Systems, DATABASE MANAGEMENT,
                 Logical Design, Data models.",
}

@Article{Ceri:1996:RDS,
  author =       "Stefano Ceri and Raghu Ramakrishnan",
  title =        "Rules in database systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "109--111",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234362",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p109-ceri/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234362.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "database management; management; systems.; theory;
                 {\bf h.2.4}: information systems",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems.",
}

@Article{Shasha:1996:TDH,
  author =       "Dennis Shasha",
  title =        "Tuning databases for high performance",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "113--115",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234363",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p113-shasha/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234363.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "access methods. {\bf h.2.4}: information systems;
                 database management; management; physical design;
                 systems; theory; transaction processing.; {\bf h.2.2}:
                 information systems",
  subject =      "{\bf H.2.2}: Information Systems, DATABASE MANAGEMENT,
                 Physical Design, Access methods. {\bf H.2.4}:
                 Information Systems, DATABASE MANAGEMENT, Systems,
                 Transaction processing.",
}

@Article{Salzberg:1996:AM,
  author =       "Betty Salzberg",
  title =        "Access methods",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "117--120",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234365",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p117-salzberg/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234365.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "database management; design; physical design.; theory;
                 {\bf h.2.2}: information systems",
  subject =      "{\bf H.2.2}: Information Systems, DATABASE MANAGEMENT,
                 Physical Design.",
}

@Article{Ioannidis:1996:QO,
  author =       "Yannis E. Ioannidis",
  title =        "Query optimization",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "121--123",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234367",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p121-ioannidis/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234367.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "database management; design; information search and
                 retrieval; information storage and retrieval; query
                 formulation.; query processing. {\bf h.3.3}:
                 information systems; systems; theory; {\bf h.2.4}:
                 information systems",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems, Query processing. {\bf H.3.3}: Information
                 Systems, INFORMATION STORAGE AND RETRIEVAL, Information
                 Search and Retrieval, Query formulation.",
}

@Article{Ozsu:1996:DPD,
  author =       "M. Tamer {\"O}zsu and Patrick Valduriez",
  title =        "Distributed and parallel database systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "125--128",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234368",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p125-ozsu/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234368.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "database management; design; systems.; theory; {\bf
                 h.2.4}: information systems",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems.",
}

@Article{Jajodia:1996:DSP,
  author =       "Sushil Jajodia",
  title =        "Database security and privacy",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "129--131",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234370",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p129-jajodia/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234370.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "access methods.; and protection. {\bf h.2.2}:
                 information systems; database management; general;
                 integrity; management; physical design; security;
                 theory; {\bf h.2.0}: information systems",
  subject =      "{\bf H.2.0}: Information Systems, DATABASE MANAGEMENT,
                 General, Security, integrity, and protection. {\bf
                 H.2.2}: Information Systems, DATABASE MANAGEMENT,
                 Physical Design, Access methods.",
}

@Article{Riloff:1996:TDI,
  author =       "Ellen Riloff and Lee Hollaar",
  title =        "Text databases and information retrieval",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "133--135",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234371",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p133-riloff/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234371.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "database management; information search and retrieval.
                 {\bf h.2.4}: information systems; information storage
                 and retrieval; systems.; theory; {\bf h.3.3}:
                 information systems",
  subject =      "{\bf H.3.3}: Information Systems, INFORMATION STORAGE
                 AND RETRIEVAL, Information Search and Retrieval. {\bf
                 H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems.",
}

@Article{Bancilhon:1996:OD,
  author =       "Fran{\c{c}}ois Bancilhon",
  title =        "Object databases",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "137--140",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234373",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p137-bancilhon/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234373.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "database management; design; languages; performance;
                 query languages.; systems. {\bf h.2.3}: information
                 systems; theory; {\bf h.2.4}: information systems",
  subject =      "{\bf H.2.4}: Information Systems, DATABASE MANAGEMENT,
                 Systems. {\bf H.2.3}: Information Systems, DATABASE
                 MANAGEMENT, Languages, Query languages.",
}

@Article{Melton:1996:SLS,
  author =       "Jim Melton",
  title =        "{SQL} language summary",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "141--143",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234374",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p141-melton/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234374.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "database management; languages; query languages.;
                 reliability; {\bf h.2.3}: information systems",
  subject =      "{\bf H.2.3}: Information Systems, DATABASE MANAGEMENT,
                 Languages, Query languages.",
}

@Article{House:1996:OTD,
  author =       "Donald H. House",
  title =        "Overview of three-dimensional computer graphics",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "145--148",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234375",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p145-house/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234375.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer graphics; documentation; experimentation;
                 graphics systems.; reliability; three-dimensional
                 graphics and realism. {\bf i.3.2}: computing
                 methodologies; {\bf i.3.7}: computing methodologies",
  subject =      "{\bf I.3.7}: Computing Methodologies, COMPUTER
                 GRAPHICS, Three-Dimensional Graphics and Realism. {\bf
                 I.3.2}: Computing Methodologies, COMPUTER GRAPHICS,
                 Graphics Systems.",
}

@Article{Rockwood:1996:GP,
  author =       "A. P. Rockwood",
  title =        "Geometric primitives",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "149--151",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234377",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p149-rockwood/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234377.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "and object representations.; computational geometry
                 and object modeling; computer graphics; curve; solid;
                 surface; theory; {\bf i.3.5}: computing methodologies",
  subject =      "{\bf I.3.5}: Computing Methodologies, COMPUTER
                 GRAPHICS, Computational Geometry and Object Modeling,
                 Curve, surface, solid, and object representations.",
}

@Article{Ebert:1996:AMT,
  author =       "David S. Ebert",
  title =        "Advanced modeling techniques for computer graphics",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "153--156",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234378",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p153-ebert/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234378.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computational geometry and object modeling.; computer
                 graphics; experimentation; methodology and techniques.
                 {\bf i.3.5}: computing methodologies; theory;
                 verification; {\bf i.3.6}: computing methodologies",
  subject =      "{\bf I.3.6}: Computing Methodologies, COMPUTER
                 GRAPHICS, Methodology and Techniques. {\bf I.3.5}:
                 Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling.",
}

@Article{Watt:1996:RTP,
  author =       "Alan Watt",
  title =        "Rendering techniques: past, present and future",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "157--159",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234380",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p157-watt/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234380.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computational geometry and object modeling.; computer
                 graphics; methodology and techniques. {\bf i.3.5}:
                 computing methodologies; theory; {\bf i.3.6}: computing
                 methodologies",
  subject =      "{\bf I.3.6}: Computing Methodologies, COMPUTER
                 GRAPHICS, Methodology and Techniques. {\bf I.3.5}:
                 Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling.",
}

@Article{Thalmann:1996:CA,
  author =       "Nadia Magnenat Thalmann and Daniel Thalmann",
  title =        "Computer animation",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "161--163",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234381",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p161-thalmann/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234381.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "animation. {\bf i.3.6}: computing methodologies;
                 computer graphics; experimentation; methodology and
                 techniques.; theory; three-dimensional graphics and
                 realism; verification; {\bf i.3.7}: computing
                 methodologies",
  subject =      "{\bf I.3.7}: Computing Methodologies, COMPUTER
                 GRAPHICS, Three-Dimensional Graphics and Realism,
                 Animation. {\bf I.3.6}: Computing Methodologies,
                 COMPUTER GRAPHICS, Methodology and Techniques.",
}

@Article{Kaufman:1996:VV,
  author =       "Arie E. Kaufman",
  title =        "Volume visualization",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "165--167",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234383",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p165-kaufman/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234383.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer graphics; methodology and techniques. {\bf
                 i.6.8}: computing methodologies; performance;
                 simulation and modeling; theory; types of simulation;
                 visual.; {\bf i.3.6}: computing methodologies",
  subject =      "{\bf I.3.6}: Computing Methodologies, COMPUTER
                 GRAPHICS, Methodology and Techniques. {\bf I.6.8}:
                 Computing Methodologies, SIMULATION AND MODELING, Types
                 of Simulation, Visual.",
}

@Article{Grudin:1996:OCD,
  author =       "Jonathan Grudin",
  title =        "The organizational contexts of development and use",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "169--171",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234384",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p169-grudin/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234384.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; group and organization interfaces;
                 humanfactors; information interfaces and presentation;
                 models and principles; organizational design. {\bf
                 h.1.2}: information systems; theory; user/machine
                 systems.; {\bf h.5.3}: information systems",
  subject =      "{\bf H.5.3}: Information Systems, INFORMATION
                 INTERFACES AND PRESENTATION, Group and Organization
                 Interfaces, Organizational design. {\bf H.1.2}:
                 Information Systems, MODELS AND PRINCIPLES,
                 User/Machine Systems.",
}

@Article{Dzida:1996:IUS,
  author =       "Wolfgang Dzida",
  title =        "International usability standards",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "173--175",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234386",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p173-dzida/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234386.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "humanfactors; information interfaces and presentation;
                 standardization; user interfaces.; {\bf h.5.2}:
                 information systems",
  subject =      "{\bf H.5.2}: Information Systems, INFORMATION
                 INTERFACES AND PRESENTATION, User Interfaces.",
}

@Article{Jacob:1996:HCI,
  author =       "Robert J. K. Jacob",
  title =        "Human-computer interaction: input devices",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "177--179",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234387",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p177-jacob/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234387.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "humanfactors; information interfaces and presentation;
                 input devices and strategies.; theory; user interfaces;
                 {\bf h.5.2}: information systems",
  subject =      "{\bf H.5.2}: Information Systems, INFORMATION
                 INTERFACES AND PRESENTATION, User Interfaces, Input
                 devices and strategies.",
}

@Article{Ware:1996:MOD,
  author =       "Colin Ware",
  title =        "Multimedia output devices and techniques",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "181--183",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234389",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p181-ware/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234389.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer graphics; documentation; hardware
                 architecture; humanfactors; methodology and techniques.
                 {\bf i.3.1}: computing methodologies; vector display
                 devices.; {\bf i.3.6}: computing methodologies",
  subject =      "{\bf I.3.6}: Computing Methodologies, COMPUTER
                 GRAPHICS, Methodology and Techniques. {\bf I.3.1}:
                 Computing Methodologies, COMPUTER GRAPHICS, Hardware
                 architecture, Vector display devices.",
}

@Article{Ziegler:1996:IT,
  author =       "J{\"u}rgen Ziegler",
  title =        "Interactive techniques",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "185--187",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234392",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p185-ziegler/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234392.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; humanfactors; information interfaces and
                 presentation; interaction styles.; theory; user
                 interfaces; {\bf h.5.2}: information systems",
  subject =      "{\bf H.5.2}: Information Systems, INFORMATION
                 INTERFACES AND PRESENTATION, User Interfaces,
                 Interaction styles.",
}

@Article{Myers:1996:UIS,
  author =       "Brad A. Myers",
  title =        "User interface software technology",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "189--191",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234394",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p189-myers/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234394.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; humanfactors; information interfaces and
                 presentation; software engineering; theory; tools and
                 techniques; user interfaces; user interfaces. {\bf
                 h.5.2}: information systems; windowing systems.; {\bf
                 d.2.2}: software",
  subject =      "{\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques, User interfaces. {\bf H.5.2}: Information
                 Systems, INFORMATION INTERFACES AND PRESENTATION, User
                 Interfaces, Windowing systems.",
}

@Article{Rosson:1996:HFP,
  author =       "Mary Beth Rosson",
  title =        "Human factors in programming and software
                 development",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "193--195",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234396",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p193-rosson/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234396.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; human factors.; humanfactors; models and
                 principles; theory; user/machine systems; {\bf h.1.2}:
                 information systems",
  subject =      "{\bf H.1.2}: Information Systems, MODELS AND
                 PRINCIPLES, User/Machine Systems, Human factors.",
}

@Article{Selber:1996:OSS,
  author =       "Stuart A. Selber and Johndan Johnson-Eilola and Brad
                 Mehlenbacher",
  title =        "Online support systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "197--200",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234397",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p197-selber/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234397.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "evaluation/methodology.; humanfactors; information
                 interfaces and presentation; information storage and
                 retrieval; multimedia information systems; online
                 information services. {\bf h.5.1}: information systems;
                 reliability; theory; {\bf h.3.5}: information systems",
  subject =      "{\bf H.3.5}: Information Systems, INFORMATION STORAGE
                 AND RETRIEVAL, Online Information Services. {\bf
                 H.5.1}: Information Systems, INFORMATION INTERFACES AND
                 PRESENTATION, Multimedia Information Systems,
                 Evaluation/methodology.",
}

@Article{Finkel:1996:OS,
  author =       "Raphel A. Finkel",
  title =        "Operating systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "201--203",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234399",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p201-finkel/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234399.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "general.; management; operating systems; theory; {\bf
                 d.4.0}: software",
  subject =      "{\bf D.4.0}: Software, OPERATING SYSTEMS, General.",
}

@Article{Stankovic:1996:RTE,
  author =       "John A. Stankovic",
  title =        "Real-time and embedded systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "205--208",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234400",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p205-stankovic/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234400.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; management; operating systems; organization
                 and design; real-time and embedded systems.; {\bf
                 d.4.7}: software",
  subject =      "{\bf D.4.7}: Software, OPERATING SYSTEMS, Organization
                 and Design, Real-time and embedded systems.",
}

@Article{Wills:1996:PSI,
  author =       "Craig E. Wills",
  title =        "Process synchronization and {IPC}",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "209--211",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234401",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p209-wills/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234401.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "management; operating systems; process management;
                 synchronization.; theory; {\bf d.4.1}: software",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Synchronization.",
}

@Article{Denning:1996:VM,
  author =       "Peter J. Denning",
  title =        "Virtual memory",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "213--216",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234403",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p213-denning/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234403.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; management; operating systems; storage
                 management; theory; virtual memory.; {\bf d.4.2}:
                 software",
  subject =      "{\bf D.4.2}: Software, OPERATING SYSTEMS, Storage
                 Management, Virtual memory.",
}

@Article{McKusick:1996:SSF,
  author =       "Marshall Kirk McKusick",
  title =        "Secondary storage and filesystems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "217--219",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234404",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p217-mckusick/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234404.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "file systems management.; management; operating
                 systems; secondary storage. {\bf d.4.3}: software;
                 storage management; theory; {\bf d.4.2}: software",
  subject =      "{\bf D.4.2}: Software, OPERATING SYSTEMS, Storage
                 Management, Secondary storage. {\bf D.4.3}: Software,
                 OPERATING SYSTEMS, File Systems Management.",
}

@Article{Stallings:1996:AHS,
  author =       "William Stallings",
  title =        "Advances in high-speed networking",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "221--223",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234406",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p221-stallings/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234406.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "communications management.; management; operating
                 systems; theory; {\bf d.4.4}: software",
  subject =      "{\bf D.4.4}: Software, OPERATING SYSTEMS,
                 Communications Management.",
}

@Article{Mullender:1996:DOS,
  author =       "Sape J. Mullender",
  title =        "Distributed operating systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "225--227",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234407",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p225-mullender/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234407.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "distributed file systems.; file systems management;
                 management; operating systems; theory; {\bf d.4.3}:
                 software",
  subject =      "{\bf D.4.3}: Software, OPERATING SYSTEMS, File Systems
                 Management, Distributed file systems.",
}

@Article{Doeppner:1996:DFS,
  author =       "Thomas W. {Doeppner, Jr.}",
  title =        "Distributed file systems and distributed memory",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "229--231",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234409",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p229-doeppner/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234409.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "distributed file systems. {\bf d.4.2}: software;
                 distributed memories.; file systems management;
                 humanfactors; management; operating systems; storage
                 management; theory; {\bf d.4.3}: software",
  subject =      "{\bf D.4.3}: Software, OPERATING SYSTEMS, File Systems
                 Management, Distributed file systems. {\bf D.4.2}:
                 Software, OPERATING SYSTEMS, Storage Management,
                 Distributed memories.",
}

@Article{Chapin:1996:DMS,
  author =       "Steve J. Chapin",
  title =        "Distributed and multiprocessor scheduling",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "233--235",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234410",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p233-chapin/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234410.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "management; operating systems; organization and
                 design.; process management; scheduling. {\bf d.4.7}:
                 software; theory; {\bf d.4.1}: software",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Scheduling. {\bf D.4.7}: Software,
                 OPERATING SYSTEMS, Organization and Design.",
}

@Article{Siegel:1996:SSH,
  author =       "Howard Jay Siegel and Henry G. Dietz and John K.
                 Antonio",
  title =        "Software support for heterogeneous computing",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "237--239",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234411",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p237-siegel/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234411.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; general.; management; operating systems;
                 systems programs and utilities. {\bf d.4.0}: software;
                 theory; {\bf d.4.9}: software",
  subject =      "{\bf D.4.9}: Software, OPERATING SYSTEMS, Systems
                 Programs and Utilities. {\bf D.4.0}: Software,
                 OPERATING SYSTEMS, General.",
}

@Article{Sandhu:1996:AAC,
  author =       "Ravi Sandhu and Pierangela Samarati",
  title =        "Authentication, access control, and audit",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "241--243",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234412",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p241-sandhu/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234412.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "access controls.; authentication. {\bf d.4.6}:
                 software; design; management; operating systems;
                 security and protection; theory; {\bf d.4.6}:
                 software",
  subject =      "{\bf D.4.6}: Software, OPERATING SYSTEMS, Security and
                 Protection, Authentication. {\bf D.4.6}: Software,
                 OPERATING SYSTEMS, Security and Protection, Access
                 controls.",
}

@Article{Bruce:1996:PPL,
  author =       "Kim B. Bruce",
  title =        "Progress in programming languages",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "245--247",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234413",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p245-bruce/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234413.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "general. {\bf d.1.6}: software; languages; logic
                 programming.; programming languages; programming
                 techniques; theory; {\bf d.3.0}: software",
  subject =      "{\bf D.3.0}: Software, PROGRAMMING LANGUAGES, General.
                 {\bf D.1.6}: Software, PROGRAMMING TECHNIQUES, Logic
                 Programming.",
}

@Article{Goldberg:1996:FPL,
  author =       "Benjamin Goldberg",
  title =        "Functional programming languages",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "249--251",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234414",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p249-goldberg/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234414.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "applicative (functional) programming. {\bf f.4.1}:
                 theory of computation; languages; mathematical logic
                 and formal languages; mathematical logic.; programming
                 techniques; theory; {\bf d.1.1}: software",
  subject =      "{\bf D.1.1}: Software, PROGRAMMING TECHNIQUES,
                 Applicative (Functional) Programming. {\bf F.4.1}:
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Mathematical Logic.",
}

@Article{Hirshfield:1996:OOP,
  author =       "Stuart Hirshfield and Raimund K. Ege",
  title =        "Object-oriented programming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "253--255",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234415",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p253-hirshfield/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234415.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "languages; object-oriented programming.; programming
                 techniques; theory; {\bf d.1.5}: software",
  subject =      "{\bf D.1.5}: Software, PROGRAMMING TECHNIQUES,
                 Object-oriented Programming.",
}

@Article{Cohen:1996:LPC,
  author =       "Jacques Cohen",
  title =        "Logic programming and constraint logic programming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "257--259",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234416",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p257-cohen/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234416.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "languages; logic programming.; logic programming. {\bf
                 f.4.1}: theory of computation; mathematical logic;
                 mathematical logic and formal languages; programming
                 techniques; theory; {\bf d.1.6}: software",
  subject =      "{\bf D.1.6}: Software, PROGRAMMING TECHNIQUES, Logic
                 Programming. {\bf F.4.1}: Theory of Computation,
                 MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
                 Logic, Logic programming.",
}

@Article{Wolfe:1996:PC,
  author =       "Michael Wolfe",
  title =        "Parallelizing compilers",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "261--262",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234417",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p261-wolfe/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234417.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "compilers. {\bf d.1.5}: software; languages;
                 object-oriented programming.; processors; programming
                 languages; programming techniques; theory; {\bf d.3.4}:
                 software",
  subject =      "{\bf D.3.4}: Software, PROGRAMMING LANGUAGES,
                 Processors, Compilers. {\bf D.1.5}: Software,
                 PROGRAMMING TECHNIQUES, Object-oriented Programming.",
}

@Article{Cardelli:1996:TS,
  author =       "Luca Cardelli",
  title =        "Type systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "263--264",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234418",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p263-cardelli/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234418.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "languages; logics and meanings of programs; studies of
                 program constructs; theory; type structure.; {\bf
                 f.3.3}: theory of computation",
  subject =      "{\bf F.3.3}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Studies of Program Constructs,
                 Type structure.",
}

@Article{Schmidt:1996:PLS,
  author =       "David A. Schmidt",
  title =        "Programming language semantics",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "265--267",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234419",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p265-schmidt/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234419.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "formal definitions and theory. {\bf f.3.2}: theory of
                 computation; languages; logics and meanings of
                 programs; programming languages; semantics of
                 programming languages.; theory; {\bf d.3.1}: software",
  subject =      "{\bf D.3.1}: Software, PROGRAMMING LANGUAGES, Formal
                 Definitions and Theory. {\bf F.3.2}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS, Semantics
                 of Programming Languages.",
}

@Article{Sommerville:1996:SPM,
  author =       "Ian Sommerville",
  title =        "Software process models",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "269--271",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234420",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p269-sommerville/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234420.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "languages; management; management.; software
                 engineering; theory; {\bf d.2.9}: software",
  subject =      "{\bf D.2.9}: Software, SOFTWARE ENGINEERING,
                 Management.",
}

@Article{Holland:1996:OOD,
  author =       "Ian M. Holland and Karl J. Lieberherr",
  title =        "Object-oriented design",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "273--275",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234421",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p273-holland/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234421.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "languages; software engineering; theory; tools and
                 techniques.; {\bf d.2.2}: software",
  subject =      "{\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques.",
}

@Article{Schach:1996:TPP,
  author =       "Stephen R. Schach",
  title =        "Testing: principles and practice",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "277--279",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234422",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p277-schach/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234422.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "languages; software engineering; testing and
                 debugging.; theory; verification; {\bf d.2.5}:
                 software",
  subject =      "{\bf D.2.5}: Software, SOFTWARE ENGINEERING, Testing
                 and Debugging.",
}

@Article{Reiss:1996:STE,
  author =       "Steven P. Reiss",
  title =        "Software tools and environments",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "281--284",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234423",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p281-reiss/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234423.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "languages; programming environments.; reliability;
                 software engineering; tools and techniques. {\bf
                 d.2.6}: software; {\bf d.2.2}: software",
  subject =      "{\bf D.2.2}: Software, SOFTWARE ENGINEERING, Tools and
                 Techniques. {\bf D.2.6}: Software, SOFTWARE
                 ENGINEERING, Programming Environments.",
}

@Article{Wegner:1996:I,
  author =       "Peter Wegner",
  title =        "Interoperability",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "1",
  pages =        "285--287",
  month =        mar,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234313.234424",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:50:59 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-1/p285-wegner/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234424.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data types and structures. {\bf f.3.3}: theory of
                 computation; language constructs and features;
                 languages; logics and meanings of programs; programming
                 languages; studies of program constructs; theory; type
                 structure.; {\bf d.3.3}: software",
  subject =      "{\bf D.3.3}: Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Data types and structures.
                 {\bf F.3.3}: Theory of Computation, LOGICS AND MEANINGS
                 OF PROGRAMS, Studies of Program Constructs, Type
                 structure.",
}

@Article{Hankin:1996:CSS,
  author =       "Chris Hankin and Hanne Riis Nielson",
  title =        "{Computing Surveys Symposium on Models of Programming
                 Languages and Computation}",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "293--294",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234729",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p293-hankin/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234729.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Agha:1996:LPP,
  author =       "Gul A. Agha",
  title =        "Linguistic Paradigms for Programming Complex
                 Distributed Systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "295--296",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234730",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p295-agha/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234730.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Andreoli:1996:ICP,
  author =       "Jean-Marc Andreoli and Remo Pareschi",
  title =        "Integrated Computational Paradigms for Flexible
                 Client-Server Communication",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "297--299",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234731",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p297-andreoli/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234731.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ciancarini:1996:CML,
  author =       "Paolo Ciancarini",
  title =        "Coordination Models and Languages as Software
                 Integrators",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "300--302",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234732",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p300-ciancarini/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234732.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gilbert:1996:CCL,
  author =       "David Gilbert",
  title =        "Can Computational Logic Provide a Paradigm for Both
                 the Specification and Implementation of Concurrent
                 Systems?",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "303--305",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234733",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p303-gilbert/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234733.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hanus:1996:IFL,
  author =       "Michael Hanus and Herbert Kuchen",
  title =        "Integration of Functional and Logic Programming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "306--308",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234734",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p306-hanus/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234734.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mycroft:1996:IPP,
  author =       "Alan Mycroft",
  title =        "On Integration of Programming Paradigms",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "309--311",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234735",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p309-mycroft/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234735.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Reddy:1996:IFP,
  author =       "U. S. Reddy",
  title =        "Imperative Functional Programming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "312--314",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234736",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p312-reddy/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234736.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Volpano:1996:SDW,
  author =       "Dennis Volpano and Geoffrey Smith",
  title =        "On the Systematic Design of {Web} Languages",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "315--317",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234737",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p315-volpano/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234737.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wadler:1996:LVS,
  author =       "Philip Wadler",
  title =        "Lazy Versus Strict",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "318--320",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234738",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p318-wadler/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234738.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Benton:1996:RBF,
  author =       "P. N. Benton",
  title =        "On the Relationship Between Formal Semantics and
                 Static Analysis",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "321--323",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234739",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p321-benton/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234739.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cousot:1996:AI,
  author =       "Patrick Cousot",
  title =        "Abstract Interpretation",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "324--328",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234740",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p324-cousot/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234740.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Danvy:1996:RBP,
  author =       "Olivier Danvy and Nevin Hentze and Karoline
                 Malmkj{\ae}r",
  title =        "Resource-bounded partial evaluation",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "329--332",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234741",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p329-danvy/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234741.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{File:1996:UVA,
  author =       "Gilberto Fil{\'e} and Roberto Giacobazzi and Francesco
                 Ranzato",
  title =        "A Unifying View of Abstract Domain Design",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "333--336",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234742",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p333-file/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234742.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jagannathan:1996:CFL,
  author =       "Suresh Jagannathan and Andrew Wright",
  title =        "Compiling Functional Languages with Flow Analysis",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "337--339",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234743",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p337-jagannathan/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234743.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{LeMetayer:1996:SOS,
  author =       "Daniel {Le M{\'e}tayer} and David Schmidt",
  title =        "Structural Operational Semantics as a Basis for Static
                 Program Analysis",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "340--343",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234744",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p340-le_metayer/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234744.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nielson:1996:ATE,
  author =       "Flemming Nielson",
  title =        "Annotated Type and Effect Systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "344--345",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234745",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p344-nielson/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234745.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dam:1996:MAV,
  author =       "Mads Dam",
  title =        "Modalities in Analysis and Verification",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "346--348",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234746",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p346-dam/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234746.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cartwright:1996:PVT,
  author =       "Robert Cartwright and Matthias Felleisen",
  title =        "Program Verification Through Soft Typing",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "349--351",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234747",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p349-cartwright/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234747.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Degano:1996:EOS,
  author =       "Pierpaolo Degano and Corrado Priami",
  title =        "Enhanced Operational Semantics",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "352--354",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234748",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p352-degano/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234748.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jay:1996:SC,
  author =       "C. Barry Jay",
  title =        "Shape in Computing",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "355--357",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234749",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p355-jay/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234749.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Palsberg:1996:TIO,
  author =       "Jens Palsberg",
  title =        "Type Inference for Objects",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "358--359",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234750",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p358-palsberg/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234750.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pettorossi:1996:RST,
  author =       "Alberto Pettorossi and Maurizio Proietti",
  title =        "Rules and Strategies for Transforming Functional and
                 Logic Programs",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "360--414",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234529",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p360-pettorossi/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234529.html",
  abstract =     "We present an overview of the program transformation
                 methodology, focusing our attention on the so-called
                 ``rules + strategies'' approach in the case of
                 functional and logic programs. The paper is intended to
                 offer an introduction to the subject. The various
                 techniques we present are illustrated via simple
                 examples.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; analysis of algorithms and problem
                 complexity; applicative (functional) programming. {\bf
                 d.1.2}: software; artificial intelligence; automatic
                 programming; automatic programming. {\bf d.1.6}:
                 software; correctness proofs. {\bf d.2.5}: software;
                 deduction and theorem proving; design; documentation;
                 general. {\bf f.3.2}: theory of computation; logic
                 programming.; logic programming. {\bf d.2.4}: software;
                 logics and meanings of programs; methodologies. {\bf
                 d.3.4}: software; optimization. {\bf f.2.0}: theory of
                 computation; processors; program derivation; program
                 improvement; program transformation. {\bf i.2.3}:
                 computing methodologies; program verification;
                 programming languages; programming techniques;
                 semantics of programming languages. {\bf i.2.2}:
                 computing methodologies; software engineering;
                 specifying and verifying and reasoning about programs.
                 {\bf d.1.1}: software; symbolic execution. {\bf
                 d.2.10}: software; testing and debugging; theory;
                 transformation rules; transformation strategies;
                 verification; {\bf f.3.1}: theory of computation",
  subject =      "{\bf F.3.1}: Theory of Computation, LOGICS AND
                 MEANINGS OF PROGRAMS, Specifying and Verifying and
                 Reasoning about Programs, Logics of programs. {\bf
                 D.1.1}: Software, PROGRAMMING TECHNIQUES, Applicative
                 (Functional) Programming. {\bf D.1.2}: Software,
                 PROGRAMMING TECHNIQUES, Automatic Programming. {\bf
                 D.1.6}: Software, PROGRAMMING TECHNIQUES, Logic
                 Programming. {\bf D.2.4}: Software, SOFTWARE
                 ENGINEERING, Program Verification, Correctness proofs.
                 {\bf D.2.5}: Software, SOFTWARE ENGINEERING, Testing
                 and Debugging, Symbolic execution. {\bf D.2.10}:
                 Software, SOFTWARE ENGINEERING, Design, Methodologies.
                 {\bf D.3.4}: Software, PROGRAMMING LANGUAGES,
                 Processors, Optimization. {\bf F.2.0}: Theory of
                 Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, General. {\bf F.3.2}: Theory of
                 Computation, LOGICS AND MEANINGS OF PROGRAMS, Semantics
                 of Programming Languages. {\bf I.2.2}: Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Automatic
                 Programming, Program transformation. {\bf I.2.3}:
                 Computing Methodologies, ARTIFICIAL INTELLIGENCE,
                 Deduction and Theorem Proving, Logic programming.",
}

@Article{Frakes:1996:SRM,
  author =       "William Frakes and Carol Terry",
  title =        "Software Reuse: Metrics and Models",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "2",
  pages =        "415--435",
  month =        jun,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/234528.234531",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:53:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-2/p415-frakes/;
                 http://www.acm.org/pubs/toc/Abstracts/surveys/234531.html",
  abstract =     "As organizations implement systematic software reuse
                 programs to improve productivity and quality, they must
                 be able to measure their progress and identify the most
                 effective reuse strategies. This is done with reuse
                 metrics and models. In this article we survey metrics
                 and models of software reuse and reusability, and
                 provide a classification structure that will help users
                 select them. Six types of metrics and models are
                 reviewed: cost-benefit models, maturity assessment
                 models, amount of reuse metrics, failure modes models,
                 reusability assessment models, and reuse library
                 metrics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "cost-benefit analysis; definitions; economics;
                 economics. {\bf k.6.4}: computing milieux; general;
                 management of computing and information systems;
                 maturity assessment; measurement; metrics. {\bf d.2.m}:
                 software; miscellaneous; models; object-oriented;
                 performance; productivity; quality; quality assurance.;
                 reusability; reusability assessment; reusable software.
                 {\bf k.6.0}: computing milieux; reuse; reuse level;
                 reuse library metrics; software; software engineering;
                 software reuse failure modes model; system management;
                 {\bf d.2.8}: software",
  subject =      "{\bf D.2.8}: Software, SOFTWARE ENGINEERING, Metrics.
                 {\bf D.2.m}: Software, SOFTWARE ENGINEERING,
                 Miscellaneous, Reusable software. {\bf K.6.0}:
                 Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, General, Economics. {\bf K.6.4}:
                 Computing Milieux, MANAGEMENT OF COMPUTING AND
                 INFORMATION SYSTEMS, System Management, Quality
                 assurance.",
}

@Article{Taivalsaari:1996:NI,
  author =       "Antero Taivalsaari",
  title =        "On the Notion of Inheritance",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "3",
  pages =        "438--479",
  month =        sep,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/243439.243441",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:32 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-3/p438-taivalsaari/",
  abstract =     "One of the most intriguing---and at the same time most
                 problematic---notions in object-oriented programming is
                 {\em inheritance}. Inheritance is commonly regarded as
                 the feature that distinguishes object-oriented
                 programming from other modern programming paradigms,
                 but researchers rarely agree on its meaning and usage.
                 Yet inheritance of often hailed as a solution to many
                 problems hampering software development, and many of
                 the alleged benefits of object-oriented programming,
                 such as improved conceptual modeling and reusability,
                 are largely credited to it. This article aims at a
                 comprehensive understanding of inheritance, examining
                 its usage, surveying its varieties, and presenting a
                 simple taxonomy of mechanisms that can be seen as
                 underlying different inheritance models.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "delegation; incremental modification; inheritance;
                 language classifications; language constructs; language
                 constructs and features.; object-oriented languages.
                 {\bf d.3.3}: software; object-oriented programming;
                 object-oriented programming. {\bf d.3.2}: software;
                 programming languages; programming techniques; {\bf
                 d.1.5}: software",
  subject =      "{\bf D.1.5}: Software, PROGRAMMING TECHNIQUES,
                 Object-oriented Programming. {\bf D.3.2}: Software,
                 PROGRAMMING LANGUAGES, Language Classifications,
                 Object-oriented languages. {\bf D.3.3}: Software,
                 PROGRAMMING LANGUAGES, Language Constructs and
                 Features.",
}

@Article{Jones:1996:IPE,
  author =       "Neil D. Jones",
  title =        "An Introduction to Partial Evaluation",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "3",
  pages =        "480--503",
  month =        sep,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/243439.243447",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:32 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-3/p480-jones/",
  abstract =     "Partial evaluation provides a unifying paradigm for a
                 broad spectrum of work in program optimization
                 compiling interpretation and the generation of
                 automatic program generators [Bj{\o}rner et al. 1987;
                 Ershov 1992; and Jones et al. 1993]. It is a program
                 optimization technique, perhaps better called {\em
                 program specialization}, closely related to but
                 different from J{\o}rring and Scherlis' {\em staging
                 transformations\/} [1986]. It emphasizes, in comparison
                 with Burstall and Darlington [1977] and J{\o}rring and
                 Scherlis [1986] and other program transformation work,
                 {\em full automation\/} and the generation of {\em
                 program generators\/} as well as transforming single
                 programs. Much partial evaluation work to date has
                 concerned automatic compiler generation from an
                 interpretive definition of programming language, but it
                 also has important applications to scientific
                 computing, logic programming, metaprogramming, and
                 expert systems; some pointers are given later.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "compiler generators; compilers; interpreters;
                 miscellaneous; partial evaluation; processors.; program
                 specialization; programming languages; rapid
                 prototyping. {\bf d.3.4}: software; software
                 engineering; {\bf d.2.m}: software",
  subject =      "{\bf D.2.m}: Software, SOFTWARE ENGINEERING,
                 Miscellaneous, Rapid prototyping. {\bf D.3.4}:
                 Software, PROGRAMMING LANGUAGES, Processors.",
}

@Article{Gallian:1996:EDM,
  author =       "Joseph A. Gallian",
  title =        "Error Detection Methods",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "3",
  pages =        "504--517",
  month =        sep,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/243439.243457",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:32 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-3/p504-gallian/",
  abstract =     "The use of check digits with identification numbers
                 for error detection is now standard practice. Notable
                 exceptions such as social security numbers, telephone
                 numbers and serial numbers on currency predate
                 computers. Despite their ubiquity and utility, few
                 people are knowledgeable about the myriad of check
                 digit schemes in use by businesses. In this article we
                 survey many of these schemes. Among them are three that
                 have not been described in journal articles
                 previously.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "codes",
  subject =      "{\bf A.1}: General Literature, INTRODUCTORY AND
                 SURVEY. {\bf E.4}: Data, CODING AND INFORMATION THEORY,
                 Error control codes. {\bf G.2}: Mathematics of
                 Computing, DISCRETE MATHEMATICS.",
}

@Article{Soderquist:1996:APT,
  author =       "Peter Soderquist and Miriam Leeser",
  title =        "Area and Performance Tradeoffs in Floating-Point
                 Divide and Square-Root Implementations",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "3",
  pages =        "518--564",
  month =        sep,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/243439.243481",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:32 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-3/p518-soderquist/",
  abstract =     "Floating-point divide and square-root operations are
                 essential to many scientific and engineering
                 applications, and are required in all computer systems
                 that support the IEEE floating-point standard. Yet many
                 current microprocessors provide only weak support for
                 these operations. The latency and throughput of
                 division are typically far inferior to those of
                 floating-point addition and multiplication, and
                 square-root performance is often even lower. This
                 article argues the case for high-performance division
                 and square root. It also explains the algorithms and
                 implementations of the primary techniques, subtractive
                 and multiplicative methods, employed in microprocessor
                 floating-point units with their associated
                 area/performance tradeoffs. Case studies of
                 representative floating-point unit configurations are
                 presented, supported by simulation results using a
                 carefully selected benchmark, Givens rotation, to show
                 the dynamic performance impact of the various
                 implementation alternatives. The topology of the
                 implementation is found to be an important performance
                 factor. Multiplicative algorithms, such as the
                 Newton--Raphson method and Goldschmidt's algorithm, can
                 achieve low latencies. However, these implementations
                 serialize multiply, divide, and square root operations
                 through a single pipeline, which can lead to low
                 throughput. While this hardware sharing yields low size
                 requirements for baseline implementations,
                 lower-latency versions require many times more area.
                 For these reasons, multiplicative implementations are
                 best suited to cases where subtractive methods are
                 precluded by area constraints, and modest performance
                 on divide and square root operations is tolerable.
                 Subtractive algorithms, exemplified by radix-4 SRT and
                 radix-16 SRT, can be made to execute in parallel with
                 other floating-point operations.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "area and performance tradeoffs; arithmetic and logic
                 structures; computer arithmetic.; computer system
                 implementation; design studies. {\bf c.5.3}: computer
                 systems organization; design styles; division;
                 floating-point; FPU; general; microcomputers;
                 microprocessors. {\bf g.1.0}: mathematics of computing;
                 numerical analysis; parallel. {\bf c.4}: computer
                 systems organization; performance of systems; square
                 root; SRT; {\bf b.2.1}: hardware",
  subject =      "{\bf B.2.1}: Hardware, ARITHMETIC AND LOGIC
                 STRUCTURES, Design Styles, Parallel. {\bf C.4}:
                 Computer Systems Organization, PERFORMANCE OF SYSTEMS,
                 Design studies. {\bf C.5.3}: Computer Systems
                 Organization, COMPUTER SYSTEM IMPLEMENTATION,
                 Microcomputers, Microprocessors. {\bf G.1.0}:
                 Mathematics of Computing, NUMERICAL ANALYSIS, General,
                 Computer arithmetic.",
}

@Article{Wegner:1996:ESD,
  author =       "Peter Wegner and Jon Doyle",
  title =        "Editorial: {Strategic} directions in computing
                 research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "565--574",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242227",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p565-wegner/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Anonymous:1996:AAI,
  author =       "Anonymous",
  title =        "{ACM} 50th Anniversary Issue --- Strategic Directions
                 in Computing Research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "565--845",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 26 15:49:24 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Loui:1996:SDR,
  author =       "Michael C. Loui and Anne Condon and Faith Fich and
                 Greg N. Frederickson and Andrew V. Goldberg and David
                 S. Johnson and Steven Mahney and Prabhakar Raghavan and
                 John Savage and Alan L. Selman and David B. Shmoys",
  title =        "Strategic directions in research in theory of
                 computing",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "575--590",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242240",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p575-loui/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tamassia:1996:SDC,
  author =       "Roberto Tamassia and Pankaj K. Agarwal and Nancy Amato
                 and Danny Z. Chen and David Dobkin and Scot Drysdale
                 and Steven Fortune and Michael T. Goodrich and John
                 Hershberger and Joseph O'Rourke and Franco P. Preparata
                 and Joerg-Rudiger Sack and Subhash Suri and Ioannis
                 Tollis and Jeffrey S. Vitter and Sue Whitesides",
  title =        "Strategic directions in computational geometry",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "591--606",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242248",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p591-tamassia/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cleaveland:1996:SDC,
  author =       "Rance Cleaveland and Scott A. Smolka and Rajeev Alur
                 and Jos Baeten and Jan A. Bergstra and Eike Best and
                 Rocco {De Nicola} and Helen Gill and Roberto Gorrieri
                 and Mohamed G. Gouda and Jan Friso Groote and Tom A.
                 Henzinger and C. A. R. Hoare and Maj. David Luginbuhl
                 and Albert Meyer and Dale Miller and Jayadev Misra and
                 Faron Moller and Ugo Montanari and Amir Pnueli and
                 Sanjiva Prasad and Vaughan R. Pratt and Joseph Sifakis
                 and Bernhard Steffen and Bent Thomsen and Frits
                 Vaandrager and Moshe Vardi and Pierre Wolper",
  title =        "Strategic directions in concurrency research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "607--625",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242252",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p607-cleaveland/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Clarke:1996:FMS,
  author =       "Edmund M. Clarke and Jeannette M. Wing and Rajeev Alur
                 and Rance Cleaveland and David Dill and Allen Emerson
                 and Stephen Garland and Steven German and John Guttag
                 and Anthony Hall and Thomas Henzinger and Gerard
                 Holzmann and Cliff Jones and Robert Kurshan and Nancy
                 Leveson and Kenneth McMillan and J. Moore and Doron
                 Peled and Amir Pnueli and John Rushby and Natarajan
                 Shankar and Joseph Sifakis and Prasad Sistla and
                 Bernhard Steffen and Pierre Wolper and Jim Woodcock and
                 Pamela Zave",
  title =        "Formal methods: state of the art and future
                 directions",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "626--643",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242257",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p626-clarke/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hankin:1996:SDR,
  author =       "Chris Hankin and Hanne Riis Nielson and Jens Palsberg
                 and others",
  title =        "Strategic directions in research on programming
                 languages",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "644--652",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242260",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p644-hankin/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  remark =       "A footnote on the cover page credits several dozen
                 others.",
}

@Article{Doyle:1996:SDA,
  author =       "Jon Doyle and Thomas Dean and others",
  title =        "Strategic directions in artificial intelligence",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "653--670",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242268",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p653-doyle/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mudge:1996:SDC,
  author =       "Trevor Mudge",
  title =        "Strategic directions in computer architecture",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "671--678",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242271",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p671-mudge/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Clark:1996:SDN,
  author =       "David Clark and Joseph Pasquale and others",
  title =        "Strategic directions in networks and
                 telecommunications",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "679--690",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242273",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p679-clark/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Guerraoui:1996:SDO,
  author =       "Rachid Guerraoui and others",
  title =        "Strategic directions in object-oriented programming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "691--700",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242275",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p691-guerraoui/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{VanHentenryck:1996:SDC,
  author =       "Pascal {Van Hentenryck} and Vijay Saraswat and
                 others",
  title =        "Strategic directions in constraint programming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "701--726",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242279",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p701-van_hentenryck/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gunter:1996:SDS,
  author =       "Carl Gunter and John Mitchell and David Notkin",
  title =        "Strategic directions in software engineering and
                 programming languages",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "727--737",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242283",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p727-gunter/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Osterweil:1996:SDS,
  author =       "Leon Osterweil and others",
  title =        "Strategic directions in software quality",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "738--750",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242288",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p738-osterweil/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Stankovic:1996:SDR,
  author =       "John A. Stankovic and others",
  title =        "Strategic directions in real-time and embedded
                 systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "751--763",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242291",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p751-stankovic/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Silberschatz:1996:SDD,
  author =       "Avi Silberschatz and Stan Zdonik and others",
  title =        "Strategic directions in database systems --- breaking
                 out of the box",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "764--778",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242295",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p764-silberschatz/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gibson:1996:SDS,
  author =       "Garth A. Gibson and Jeffrey Scott Vitter and John
                 Wilkes and others",
  title =        "Strategic directions in storage {I/O} issues in
                 large-scale computing",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "779--793",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242300",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p779-gibson/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Myers:1996:SDH,
  author =       "Brad Myers and Jim Hollan and Isabel Cruz and Steve
                 Bryson and Dick Bulterman and Tiziana Catarci and Wayne
                 Citrin and Ephraim Glinert and Jonathan Grudin and Rob
                 Jacob and Bonnie John and David Kurlander and Dan Olsen
                 and Randy Pausch and Stuart Shieber and Ben Shneiderman
                 and John Stasko and Gary Strong and Kent Wittenburg",
  title =        "Strategic directions in human-computer interaction",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "794--809",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.246855",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p794-myers/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sameh:1996:CSE,
  author =       "A. Sameh and G. Cybenko and M. Kalos and K. Neves and
                 J. Rice and D. Sorensen and F. Sullivan",
  title =        "Computational science and engineering",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "810--817",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.246865",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p810-sameh/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Adam:1996:SDE,
  author =       "Nabil Adam and Yelena Yesha and others",
  title =        "Strategic directions in electronic commerce and
                 digital libraries: towards a digital agora",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "818--835",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.246871",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p818-adam/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tucker:1996:SDC,
  author =       "Allen B. Tucker and others",
  title =        "Strategic directions in computer science education",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "836--845",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.246876",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:54:52 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4/p836-tucker/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Anonymous:1996:AIV,
  author =       "Anonymous",
  title =        "Author Index: Vols. 24--28 (1992--1996)",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "846--854",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 26 15:49:24 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Anonymous:1996:SIV,
  author =       "Anonymous",
  title =        "Subject Index: Vols. 24--28 (1992--1996)",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4",
  pages =        "854--859",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 26 15:49:24 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

%%% ====================================================================
%%% Volume 28, number 4es, is an electronic supplement that is published
%%% online at the indicated URLs; the table of contents entries in
%%% number 4 lists these short articles, but the paper issue of the
%%% journal itself does not contain them.  The last article in 4es,
%%% labeled Harper:1996:MB below, does not appear in the table of
%%% contents.
%%% ====================================================================
@Article{Brachman:1996:UBU,
  author =       "Ronald J. Brachman and Hector J. Levesque",
  title =        "Undirected behavior without unbounded search",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "1:1--1:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242227",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a1-brachman/",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dean:1996:ITP,
  author =       "Thomas L. Dean",
  title =        "Integrating theory and practice in planning",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "2:1--2:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242240",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a2-dean/",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dietterich:1996:ML,
  author =       "Tom Dietterich",
  title =        "Machine learning",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "3:1--3:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242248",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a3-dietterich/",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Doyle:1996:CAI,
  author =       "Jon Doyle",
  title =        "Cleaving (unto) artificial intelligence",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "4:1--4:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242252",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a4-doyle/",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Green:1996:FHS,
  author =       "Cordell Green",
  title =        "Formality helps scalability and robustness",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "5:1--5:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242257",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a5-green/",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Grosz:1996:IIA,
  author =       "Barbara J. Grosz",
  title =        "The importance of integration for {AI}",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "6:1--6:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242260",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a6-grosz/",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Horswill:1996:ISN,
  author =       "Ian Horswill",
  title =        "Integrated systems and naturalistic tasks",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "7:1--7:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242268",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a7-horswill/",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Koller:1996:SRI,
  author =       "Daphne Koller",
  title =        "Structured representations and intractability",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "8:1--8:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242271",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a8-koller/",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pereira:1996:LCA,
  author =       "Fernando Pereira",
  title =        "Language, computation and artificial intelligence",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "9:1--9:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242273",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a9-pereira/",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Selman:1996:CCA,
  author =       "Bart Selman",
  title =        "Computational challenges in artificial intelligence",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "10:1--10:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242275",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a10-selman/",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shoham:1996:OSB,
  author =       "Yoav Shoham",
  title =        "The open scientific borders of {AI}, and the case of
                 economics",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "11:1--11:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242279",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a11-shoham/",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shrobe:1996:TCD,
  author =       "Howard E. Shrobe",
  title =        "Two challenging domains",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "12:1--12:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242283",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a12-shrobe/",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Swartout:1996:FDK,
  author =       "William R. Swartout",
  title =        "Future directions in knowledge-based systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "13:1--13:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242288",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a13-swartout/",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wellman:1996:EAA,
  author =       "Michael P. Wellman",
  title =        "The economic approach to artificial intelligence",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "14:1--14:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242291",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a14-wellman/",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zilberstein:1996:RBR,
  author =       "Shlomo Zilberstein",
  title =        "Resource-bounded reasoning in intelligent systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "15:1--15:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242295",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a15-zilberstein/",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Agarwal:1996:SPG,
  author =       "Pankaj K. Agarwal and Subhash Suri",
  title =        "Simple and practical geometric algorithms",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "16:1--16:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.242300",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a16-agarwal/",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Amato:1996:ECC,
  author =       "Nancy M. Amato",
  title =        "Equipping {CAD\slash CAM} systems with geometric
                 intelligence",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "17:1--17:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.246855",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a17-amato/",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chen:1996:DAS,
  author =       "Danny Z. Chen",
  title =        "Developing algorithms and software for geometric path
                 planning problems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "18:1--18:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.246865",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a18-chen/",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tollis:1996:GDI,
  author =       "Ioannis G. Tollis",
  title =        "Graph drawing and information visualization",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "19:1--19:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.246871",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a19-tollis/",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Vitter:1996:CIL,
  author =       "Jeffrey S. Vitter",
  title =        "Communication issues in large-scale geometric
                 computation",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "20:1--20:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242223.246876",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a20-vitter/",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cybenko:1996:LSC,
  author =       "George Cybenko",
  title =        "Large-scope computing: the industrial challenges",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "21:1--21:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242250",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a21-cybenko/",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kalos:1996:CCS,
  author =       "Melvin Kalos",
  title =        "Challenges in computational science",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "22:1--22:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242251",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a22-kalos/",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Neves:1996:TCC,
  author =       "Kenneth Neves",
  title =        "Thoughts on {CSE} candidates for industrial
                 positions",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "23:1--23:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242253",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a23-neves/",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rice:1996:CSO,
  author =       "John R. Rice",
  title =        "Computational science as one driving force for all
                 aspects of computing research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "24:1--24:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242254",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a24-rice/",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sullivan:1996:TP,
  author =       "Francis Sullivan",
  title =        "From theory to practice",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "25:1--25:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242255",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a25-sullivan/",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Conte:1996:IPC,
  author =       "Tom Conte",
  title =        "Importance of profiling and compatibility",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "26:1--26:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242256",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a26-conte/",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Emer:1996:IVR,
  author =       "Joel Emer",
  title =        "Incremental versus revolutionary research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "27:1--27:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242258",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a27-emer/",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Farrens:1996:DDC,
  author =       "Matt Farrens",
  title =        "Distributed decentralized computing",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "28:1--28:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242259",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a28-farrens/",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Grunwald:1996:EGP,
  author =       "Dirk Grunwald",
  title =        "Embedded, general-purpose, and high-performance
                 systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "29:1--29:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242261",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a29-grunwald/",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Li:1996:ASH,
  author =       "Kai Li",
  title =        "Applications, storage hierarchy, and integration",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "30:1--30:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242262",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a30-li/",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mills:1996:IPC,
  author =       "Jack Mills",
  title =        "An industrial perspective on computer architecture",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "31:1--31:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242263",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a31-mills/",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nagle:1996:SBS,
  author =       "David Nagle",
  title =        "Synergy between software and hardware",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "32:1--32:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242264",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a32-nagle/",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Patt:1996:MCA,
  author =       "Yale Patt",
  title =        "Microarchitecture, compilers and algorithms",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "33:1--33:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242265",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a33-patt/",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Smith:1996:MNA,
  author =       "Jim Smith",
  title =        "Multiscalar as a new architecture paradigm",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "34:1--34:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242266",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a34-smith/",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wang:1996:MAC,
  author =       "Wen-Hann Wang",
  title =        "Microprocessor architecture challenges --- the best is
                 yet to come!",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "35:1--35:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242267",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a35-wang/",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wood:1996:PCI,
  author =       "David Wood",
  title =        "Problems, challenges and the importance of performance
                 evaluation",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "36:1--36:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242269",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a36-wood/",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Yung:1996:IPT,
  author =       "Robert Yung",
  title =        "The importance of process technology to
                 microarchitecture",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "37:1--37:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242270",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a37-yung/",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Baeten:1996:SIC,
  author =       "Jos C. M. Baeten and Jan A. Bergstra",
  title =        "Six issues concerning future directions in concurrency
                 research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "39:1--39:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242272",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a39-baeten/",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Best:1996:SMD,
  author =       "Eike Best",
  title =        "Some major dichotomies relating to future research in
                 concurrency",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "40:1--40:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242274",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a40-best/",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cleaveland:1996:STS,
  author =       "Rance Cleaveland",
  title =        "Semantic theories and system design",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "41:1--41:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242276",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a41-cleaveland/",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gorrieri:1996:PCT,
  author =       "Roberto Gorrieri",
  title =        "On the power of concurrency theory",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "42:1--42:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242277",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a42-gorrieri/",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gouda:1996:NPB,
  author =       "Mohamed G. Gouda",
  title =        "Network protocols between exact specifications and
                 pragmatic implementations",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "43:1--43:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242278",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a43-gouda/",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Groote:1996:CTW,
  author =       "Jan Friso Groote",
  title =        "Concurrency theory will set standards for description
                 and analysis of software",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "44:1--44:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242280",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a44-groote/",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hoare:1996:UTP,
  author =       "C. A. R. Hoare",
  title =        "Unifying theories: a personal statement",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "46:1--46:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242282",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a46-hoare/",
  acknowledgement = ack-nhfb,
  articleno =    "46",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Luginbuhl:1996:ICS,
  author =       "David Luginbuhl",
  title =        "Issues in concurrent systems research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "47:1--47:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242284",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a47-luginbuhl/",
  acknowledgement = ack-nhfb,
  articleno =    "47",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Miller:1996:LFO,
  author =       "Dale Miller",
  title =        "Logical foundations for open system design",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "48:1--48:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242285",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a48-miller/",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Misra:1996:DM,
  author =       "Jayadev Misra",
  title =        "A discipline of multiprogramming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "49:1--49:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242286",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a49-misra/",
  acknowledgement = ack-nhfb,
  articleno =    "49",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Moller:1996:LCS,
  author =       "Faron Moller",
  title =        "Logics for concurrency: structure versus automata",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "50:1--50:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242287",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a50-moller/",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Montanari:1996:CC,
  author =       "Ugo Montanari",
  title =        "Causal computing",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "51:1--51:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242289",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a51-montanari/",
  acknowledgement = ack-nhfb,
  articleno =    "51",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{DeNicola:1996:CTP,
  author =       "Rocco {De Nicola} and Scott A. Smolka",
  title =        "Concurrency: theory and practice",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "52:1--52:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242290",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a52-de_nicola/",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Prasad:1996:MMC,
  author =       "Sanjiva Prasad",
  title =        "Models for mobile computing agents",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "53:1--53:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242292",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a53-prasad/",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pratt:1996:CCO,
  author =       "Vaughan R. Pratt",
  title =        "Concurrency concepts: an ongoing search",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "54:1--54:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242293",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a54-pratt/",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sifakis:1996:RDC,
  author =       "Joseph Sifakis",
  title =        "Research directions for concurrency",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "55:1--55:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242294",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a55-sifakis/",
  acknowledgement = ack-nhfb,
  articleno =    "55",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Steffen:1996:MER,
  author =       "Bernhard Steffen and Tiziana Margaria",
  title =        "Method engineering for real-life concurrent systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "56:1--56:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242296",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a56-steffen/",
  acknowledgement = ack-nhfb,
  articleno =    "56",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Thomsen:1996:PLA,
  author =       "Bent Thomsen",
  title =        "Programming languages, analysis tools, and concurrency
                 theory",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "57:1--57:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242297",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a57-thomsen/",
  acknowledgement = ack-nhfb,
  articleno =    "57",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wolper:1996:WAS,
  author =       "Pierre Wolper",
  title =        "Where is the algorithmic support?",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "58:1--58:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242298",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a58-wolper/",
  acknowledgement = ack-nhfb,
  articleno =    "58",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Brodsky:1996:CDP,
  author =       "Alexander Brodsky",
  title =        "Constraint databases: promising technology or just
                 intellectual exercise?",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "59:1--59:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242299",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a59-brodsky/",
  acknowledgement = ack-nhfb,
  articleno =    "59",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Codognet:1996:VCC,
  author =       "Philippe Codognet",
  title =        "The virtuality of constraints and the constraints of
                 virtuality",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "60:1--60:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242301",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a60-codognet/",
  acknowledgement = ack-nhfb,
  articleno =    "60",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dechter:1996:BEU,
  author =       "R. Dechter",
  title =        "Bucket elimination: a unifying framework for
                 processing hard and soft constraints",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "61:1--61:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242302",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a61-dechter/",
  acknowledgement = ack-nhfb,
  articleno =    "61",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dincbas:1996:CP,
  author =       "M. Dincbas",
  title =        "Constraint programming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "62:1--62:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242303",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a62-dincbas/",
  acknowledgement = ack-nhfb,
  articleno =    "62",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Freuder:1996:PHG,
  author =       "E. Freuder",
  title =        "In pursuit of the holy grail",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "63:1--63:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242304",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a63-freuder/",
  acknowledgement = ack-nhfb,
  articleno =    "63",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hermenegildo:1996:SCC,
  author =       "Manuel Hermenegildo",
  title =        "Some challenges for constraint programming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "64:1--64:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242305",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a64-hermenegildo/",
  acknowledgement = ack-nhfb,
  articleno =    "64",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jaffar:1996:CP,
  author =       "J. Jaffar and R. Yap",
  title =        "Constraint programming 2000",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "65:1--65:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242307",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a65-jaffar/",
  acknowledgement = ack-nhfb,
  articleno =    "65",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kasif:1996:TCB,
  author =       "S. Kasif",
  title =        "Towards a constraint-based engineering framework for
                 algorithm design and application",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "66:1--66:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242308",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a66-kasif/",
  acknowledgement = ack-nhfb,
  articleno =    "66",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mackworth:1996:CBD,
  author =       "Alan Mackworth",
  title =        "Constraint-based design of embedded intelligent
                 systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "67:1--67:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242309",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a67-mackworth/",
  acknowledgement = ack-nhfb,
  articleno =    "67",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{McAllester:1996:RNM,
  author =       "D. McAllester",
  title =        "The rise of nonlinear mathematical programming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "68:1--68:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242311",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a68-mcallester/",
  acknowledgement = ack-nhfb,
  articleno =    "68",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{McAloon:1996:CBP,
  author =       "Ken McAloon",
  title =        "Constraint-based programming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "69:1--69:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242313",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a69-mcaloon/",
  acknowledgement = ack-nhfb,
  articleno =    "69",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Montanari:1996:CSP,
  author =       "Ugo Montanari and Francesca Rossi",
  title =        "Constraint solving and programming: what's next?",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "70:1--70:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242314",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a70-montanari/",
  acknowledgement = ack-nhfb,
  articleno =    "70",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Older:1996:CI,
  author =       "William J. Older",
  title =        "{CLP} (intervals)",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "71:1--71:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242315",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a71-older/",
  acknowledgement = ack-nhfb,
  articleno =    "71",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Puget:1996:FCP,
  author =       "Jean-Fran{\c{c}}ois Puget",
  title =        "Future of constraint programming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "72:1--72:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242317",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a72-puget/",
  acknowledgement = ack-nhfb,
  articleno =    "72",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ramakrishnan:1996:CD,
  author =       "R. Ramakrishnan",
  title =        "Constraints in databases",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "73:1--73:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242318",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a73-ramakrishnan/",
  acknowledgement = ack-nhfb,
  articleno =    "73",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Saraswat:1996:CC,
  author =       "Vijay Saraswat",
  title =        "Compositional computing",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "74:1--74:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242320",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a74-saraswat/",
  acknowledgement = ack-nhfb,
  articleno =    "74",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Smolka:1996:CO,
  author =       "Gert Smolka",
  title =        "Constraints in {OZ}",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "75:1--75:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242321",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a75-smolka/",
  acknowledgement = ack-nhfb,
  articleno =    "75",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{VanHentenryck:1996:CPC,
  author =       "Pascal {Van Hentenryck}",
  title =        "Constraint programming for combinatorial search
                 problems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "76:1--76:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242322",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a76-van_hentenryck/",
  acknowledgement = ack-nhfb,
  articleno =    "76",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Blakeley:1996:TDD,
  author =       "Jos{\'e} Blakeley",
  title =        "Thoughts on directions in database research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "77:1--77:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242324",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a77-blakeley/",
  acknowledgement = ack-nhfb,
  articleno =    "77",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dayal:1996:DTC,
  author =       "Umeshwar Dayal",
  title =        "Database technology at a crossroads",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "78:1--78:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242326",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a78-dayal/",
  acknowledgement = ack-nhfb,
  articleno =    "78",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jajodia:1996:MSP,
  author =       "Sushil Jajodia",
  title =        "Managing security and privacy of information",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "79:1--79:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242327",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a79-jajodia/",
  acknowledgement = ack-nhfb,
  articleno =    "79",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Korth:1996:NFP,
  author =       "Henry F. Korth",
  title =        "New focal points for research in database systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "80:1--80:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242328",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a80-korth/",
  acknowledgement = ack-nhfb,
  articleno =    "80",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lohman:1996:YTY,
  author =       "Guy M. Lohman",
  title =        "You think your {DBMS} is complex now\ldots{}?",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "81:1--81:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242330",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a81-lohman/",
  acknowledgement = ack-nhfb,
  articleno =    "81",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lomet:1996:RRD,
  author =       "David Lomet",
  title =        "A role for research in the database industry",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "82:1--82:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242332",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a82-lomet/",
  acknowledgement = ack-nhfb,
  articleno =    "82",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Maier:1996:RDS,
  author =       "David Maier",
  title =        "Repackaging database systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "83:1--83:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242335",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a83-maier/",
  acknowledgement = ack-nhfb,
  articleno =    "83",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Manola:1996:TDS,
  author =       "Frank Manola",
  title =        "Transforming the database system into an open service
                 concept",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "84:1--84:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242336",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a84-manola/",
  acknowledgement = ack-nhfb,
  articleno =    "84",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ozsu:1996:FDS,
  author =       "M. Tamer {\"O}zsu",
  title =        "Future of database systems: changing applications and
                 technological developments",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "85:1--85:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242337",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a85-ozsu/",
  acknowledgement = ack-nhfb,
  articleno =    "85",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ramakrishnan:1996:SPD,
  author =       "Raghu Ramakrishnan",
  title =        "Some promising directions for database research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "86:1--86:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242339",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a86-ramakrishnan/",
  acknowledgement = ack-nhfb,
  articleno =    "86",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ramamritham:1996:AOD,
  author =       "Krithi Ramamritham",
  title =        "Application-oriented database support",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "87:1--87:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242340",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a87-ramamritham/",
  acknowledgement = ack-nhfb,
  articleno =    "87",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Schek:1996:IRF,
  author =       "Hans-J. Schek",
  title =        "Improving the role of future database systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "88:1--88:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242341",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a88-schek/",
  acknowledgement = ack-nhfb,
  articleno =    "88",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Snodgrass:1996:IM,
  author =       "Richard Thomas Snodgrass",
  title =        "The inefficiency of misalignment",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "89:1--89:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242342",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a89-snodgrass/",
  acknowledgement = ack-nhfb,
  articleno =    "89",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ullman:1996:MDT,
  author =       "Jeff Ullman",
  title =        "Moving database theory into database practice",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "90:1--90:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242343",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a90-ullman/",
  acknowledgement = ack-nhfb,
  articleno =    "90",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Widom:1996:IHD,
  author =       "Jennifer Widom",
  title =        "Integrating heterogeneous databases: lazy or eager?",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "91:1--91:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242344",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a91-widom/",
  acknowledgement = ack-nhfb,
  articleno =    "91",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Astrachan:1996:EGP,
  author =       "Owen Astrachan",
  title =        "Education goals and priorities",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "92:1--92:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242345",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a92-astrachan/",
  acknowledgement = ack-nhfb,
  articleno =    "92",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bruce:1996:TCS,
  author =       "Kim Bruce",
  title =        "Thoughts on computer science education",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "93:1--93:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242346",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a93-bruce/",
  acknowledgement = ack-nhfb,
  articleno =    "93",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cupper:1996:RCF,
  author =       "Robert Cupper",
  title =        "A revised curriculum framework",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "94:1--94:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242347",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a94-cupper/",
  acknowledgement = ack-nhfb,
  articleno =    "94",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1996:BDU,
  author =       "Peter Denning",
  title =        "Business designs of the university",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "95:1--95:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242348",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a95-denning/",
  acknowledgement = ack-nhfb,
  articleno =    "95",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Drysdale:1996:WSW,
  author =       "Scot Drysdale",
  title =        "What should we teach?",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "96:1--96:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242349",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a96-drysdale/",
  acknowledgement = ack-nhfb,
  articleno =    "96",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kelemen:1996:FCN,
  author =       "Charles Kelemen",
  title =        "First courses for nonmajors and public understanding
                 of computer science",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "97:1--97:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242350",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a97-kelemen/",
  acknowledgement = ack-nhfb,
  articleno =    "97",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{McGeoch:1996:RCW,
  author =       "Catherine McGeoch",
  title =        "Research in the curriculum, and the {Web}",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "98:1--98:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242352",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a98-mcgeoch/",
  acknowledgement = ack-nhfb,
  articleno =    "98",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Patt:1996:FCF,
  author =       "Yale Patt",
  title =        "First courses and fundamentals",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "99:1--99:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242353",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a99-patt/",
  acknowledgement = ack-nhfb,
  articleno =    "99",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Proulx:1996:FCS,
  author =       "Richard Proulx and Richard Rosala",
  title =        "The future of computer science education",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "100:1--100:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242354",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a100-proulx/",
  acknowledgement = ack-nhfb,
  articleno =    "100",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rada:1996:CVC,
  author =       "Roy Rada",
  title =        "Calling for a virtual computing college",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "101:1--101:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242356",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a101-rada/",
  acknowledgement = ack-nhfb,
  articleno =    "101",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Roberts:1996:DCS,
  author =       "Eric Roberts",
  title =        "Directions in computer science education",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "102:1--102:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242357",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a102-roberts/",
  acknowledgement = ack-nhfb,
  articleno =    "102",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Stein:1996:IPR,
  author =       "Lynn Andrea Stein",
  title =        "Interactive programming: revolutionizing introductory
                 computer science",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "103:1--103:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242358",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a103-stein/",
  acknowledgement = ack-nhfb,
  articleno =    "103",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tucker:1996:CCS,
  author =       "Allen Tucker",
  title =        "Crisis in computer science education",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "104:1--104:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242359",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a104-tucker/",
  acknowledgement = ack-nhfb,
  articleno =    "104",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Adam:1996:UAD,
  author =       "Nabil R. Adam and Shamim Naqvi",
  title =        "Universal access in digital libraries",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "105:1--105:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242360",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a105-adam/",
  acknowledgement = ack-nhfb,
  articleno =    "105",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Awerbuch:1996:MGN,
  author =       "Baruch Awerbuch",
  title =        "Maximizing gross network product {(GNP)}: resource
                 management on the {GII}",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "106:1--106:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242361",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a106-awerbuch/",
  acknowledgement = ack-nhfb,
  articleno =    "106",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Brodsky:1996:CDT,
  author =       "Alex Brodsky",
  title =        "Constraint database technology for electronic trade
                 with complex objectives",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "107:1--107:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242362",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a107-brodsky/",
  acknowledgement = ack-nhfb,
  articleno =    "107",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Grossman:1996:DMC,
  author =       "Robert Grossman",
  title =        "Database mining challenges for digital libraries",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "108:1--108:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242364",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a108-grossman/",
  acknowledgement = ack-nhfb,
  articleno =    "108",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Johnson:1996:PPI,
  author =       "Jim Johnson",
  title =        "The physics of politics in the information age",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "109:1--109:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242365",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a109-johnson/",
  acknowledgement = ack-nhfb,
  articleno =    "109",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Blaustein:1996:FSP,
  author =       "Barbara T. Blaustein and Catherine McCollum and Arnon
                 Rosenthal",
  title =        "Flexible security policies for digital libraries",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "110:1--110:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242366",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a110-blaustein/",
  acknowledgement = ack-nhfb,
  articleno =    "110",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Neches:1996:FEC,
  author =       "Anna-Lena Neches",
  title =        "The future of electronic commerce: a pragmatic view",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "111:1--111:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242368",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a111-neches/",
  acknowledgement = ack-nhfb,
  articleno =    "111",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bennet:1996:ECP,
  author =       "Karen Bennet and Jacob Slonim",
  title =        "The electronic commerce position paper",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "112:1--112:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242369",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a112-bennet/",
  acknowledgement = ack-nhfb,
  articleno =    "112",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wolfson:1996:ICM,
  author =       "Ouri Wolfson",
  title =        "Infrastructure and cost models for digital libraries",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "113:1--113:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242371",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a113-wolfson/",
  acknowledgement = ack-nhfb,
  articleno =    "113",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wactlar:1996:NGE,
  author =       "Howard D. Wactlar",
  title =        "The next generation electronic library --- capturing
                 the experience",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "114:1--114:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242372",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a114-wactlar/",
  acknowledgement = ack-nhfb,
  articleno =    "114",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Alur:1996:NSF,
  author =       "Rajeev Alur",
  title =        "Next steps in formal verification",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "115:1--115:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242373",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a115-alur/",
  acknowledgement = ack-nhfb,
  articleno =    "115",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Clarke:1996:TPA,
  author =       "Edmund Clarke and Jeannette M. Wing",
  title =        "Tools and partial analysis",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "116:1--116:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242374",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a116-clarke/",
  acknowledgement = ack-nhfb,
  articleno =    "116",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cleaveland:1996:FSD,
  author =       "Rance Cleaveland",
  title =        "Formality and software design",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "117:1--117:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242376",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a117-cleaveland/",
  acknowledgement = ack-nhfb,
  articleno =    "117",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{German:1996:RGF,
  author =       "Steven German",
  title =        "Research goals for formal methods",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "118:1--118:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242377",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a118-german/",
  acknowledgement = ack-nhfb,
  articleno =    "118",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Henzinger:1996:SMA,
  author =       "Thomas A. Henzinger",
  title =        "Some myths about formal verification",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "119:1--119:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242378",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a119-henzinger/",
  acknowledgement = ack-nhfb,
  articleno =    "119",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Holzmann:1996:FMC,
  author =       "Gerard Holzmann",
  title =        "On-the-fly model checking",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "120:1--120:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242379",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a120-holzmann/",
  acknowledgement = ack-nhfb,
  articleno =    "120",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jones:1996:FML,
  author =       "Cliff Jones",
  title =        "Formal methods light",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "121:1--121:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242380",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a121-jones/",
  acknowledgement = ack-nhfb,
  articleno =    "121",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Peled:1996:UIF,
  author =       "Doron Peled",
  title =        "User interfaces for formal methods",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "122:1--122:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242381",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a122-peled/",
  acknowledgement = ack-nhfb,
  articleno =    "122",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rushby:1996:EUF,
  author =       "John Rushby",
  title =        "Enhancing the utility of formal methods",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "123:1--123:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242382",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a123-rushby/",
  acknowledgement = ack-nhfb,
  articleno =    "123",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sifakis:1996:SSQ,
  author =       "Joseph Sifakis",
  title =        "Safety, security and quality",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "124:1--124:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242383",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a124-sifakis/",
  acknowledgement = ack-nhfb,
  articleno =    "124",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sistla:1996:HIM,
  author =       "Prasad Sistla",
  title =        "Hybrid and incremental modelchecking techniques",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "125:1--125:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242384",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a125-sistla/",
  acknowledgement = ack-nhfb,
  articleno =    "125",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Steffen:1996:TGF,
  author =       "Bernhard Steffen and Tiziana Margaria",
  title =        "Tools get formal methods into practice",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "126:1--126:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242385",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a126-steffen/",
  acknowledgement = ack-nhfb,
  articleno =    "126",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wolper:1996:MF,
  author =       "Pierre Wolper",
  title =        "The meaning of ``formal''",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "127:1--127:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242386",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a127-wolper/",
  acknowledgement = ack-nhfb,
  articleno =    "127",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Woodcock:1996:SER,
  author =       "Jim Woodcock",
  title =        "Software engineering research directions",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "128:1--128:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242387",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a128-woodcock/",
  acknowledgement = ack-nhfb,
  articleno =    "128",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bryson:1996:INR,
  author =       "Steve Bryson",
  title =        "Implications of near-real-time three-dimensional
                 interfaces",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "129:1--129:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242389",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a129-bryson/",
  acknowledgement = ack-nhfb,
  articleno =    "129",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bulterman:1996:MTS,
  author =       "Dick C. A. Bulterman",
  title =        "Making the technology serve the user",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "130:1--130:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242390",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a130-bulterman/",
  acknowledgement = ack-nhfb,
  articleno =    "130",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Catarci:1996:DWN,
  author =       "Tiziana Catarci",
  title =        "Databases and the {Web}: new requirements for an easy
                 access",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "131:1--131:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242391",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a131-catarci/",
  acknowledgement = ack-nhfb,
  articleno =    "131",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Citrin:1996:SDV,
  author =       "Wayne Citrin",
  title =        "Strategic directions in visual languages research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "132:1--132:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242392",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a132-citrin/",
  acknowledgement = ack-nhfb,
  articleno =    "132",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cruz:1996:TIV,
  author =       "Isabel F. Cruz",
  title =        "Tailorable information visualization",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "133:1--133:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.250708",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a133-cruz/",
  acknowledgement = ack-nhfb,
  articleno =    "133",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Glinert:1996:AMI,
  author =       "Ephraim P. Glinert and R. Lindsay Todd and G. Bowden
                 Wise",
  title =        "The adaptive multi-interface multimodal environment",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "134:1--134:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242394",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a134-glinert/",
  acknowledgement = ack-nhfb,
  articleno =    "134",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Grudin:1996:EE,
  author =       "Jonathan Grudin",
  title =        "The end of exile",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "135:1--135:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242396",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a135-grudin/",
  acknowledgement = ack-nhfb,
  articleno =    "135",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hollan:1996:SIH,
  author =       "James D. Hollan",
  title =        "Strategic issues for human-computer interaction",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "136:1--136:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242397",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a136-hollan/",
  acknowledgement = ack-nhfb,
  articleno =    "136",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ioannidis:1996:VUI,
  author =       "Yannis E. Ioannidis",
  title =        "Visual user interfaces for database systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "137:1--137:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242399",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a137-ioannidis/",
  acknowledgement = ack-nhfb,
  articleno =    "137",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jacob:1996:FID,
  author =       "Robert J. K. Jacob",
  title =        "The future of input devices",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "138:1--138:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242400",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a138-jacob/",
  acknowledgement = ack-nhfb,
  articleno =    "138",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{John:1996:EUE,
  author =       "Bonnie E. John",
  title =        "Evaluating usability evaluation techniques",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "139:1--139:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242402",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a139-john/",
  acknowledgement = ack-nhfb,
  articleno =    "139",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kurlander:1996:TUI,
  author =       "David Kurlander",
  title =        "Thoughts on user interface processes and agendas",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "140:1--140:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242403",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a140-kurlander/",
  acknowledgement = ack-nhfb,
  articleno =    "140",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Myers:1996:PHU,
  author =       "Brad A. Myers",
  title =        "Programmability and heuristics in the user
                 interfaces",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "141:1--141:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242404",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a141-myers/",
  acknowledgement = ack-nhfb,
  articleno =    "141",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Olsen:1996:CRI,
  author =       "Dan R. {Olsen, Jr.}",
  title =        "Computational resources and the {Internet}",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "142:1--142:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242407",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a142-olsen/",
  acknowledgement = ack-nhfb,
  articleno =    "142",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shieber:1996:CCI,
  author =       "Stuart M. Shieber",
  title =        "A call for collaborative interfaces",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "143:1--143:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242408",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a143-shieber/",
  acknowledgement = ack-nhfb,
  articleno =    "143",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shneiderman:1996:AGU,
  author =       "Ben Shneiderman",
  title =        "Advanced graphic user interfaces: elastic and tightly
                 coupled windows",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "144:1--144:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242409",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a144-shneiderman/",
  acknowledgement = ack-nhfb,
  articleno =    "144",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Stasko:1996:FRD,
  author =       "John Stasko",
  title =        "Future research directions in human-computer
                 interaction",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "145:1--145:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242410",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a145-stasko/",
  acknowledgement = ack-nhfb,
  articleno =    "145",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Strong:1996:HCI,
  author =       "Gary W. Strong",
  title =        "Human-centered information systems {(HCIS)}",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "146:1--146:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242411",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a146-strong/",
  acknowledgement = ack-nhfb,
  articleno =    "146",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wittenburg:1996:WIG,
  author =       "Kent Wittenburg",
  title =        "The {WWW} information glut: implications for
                 next-generation {HCI} technologies",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "147:1--147:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242412",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a147-wittenburg/",
  acknowledgement = ack-nhfb,
  articleno =    "147",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Aksit:1996:SCC,
  author =       "M. Aksit",
  title =        "Separation and composition of concerns in the
                 object-oriented model",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "148:1--148:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242413",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a148-aksit/",
  acknowledgement = ack-nhfb,
  articleno =    "148",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Black:1996:OOL,
  author =       "A. P. Black",
  title =        "Object-oriented languages: the next generation",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "149:1--149:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242414",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a149-black/",
  acknowledgement = ack-nhfb,
  articleno =    "149",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cardelli:1996:BEP,
  author =       "L. Cardelli",
  title =        "Bad engineering properties of object-orient
                 languages",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "150:1--150:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242415",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a150-cardelli/",
  acknowledgement = ack-nhfb,
  articleno =    "150",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cointe:1996:RLM,
  author =       "P. Cointe",
  title =        "Reflective languages and metalevel architectures",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "151:1--151:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242416",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a151-cointe/",
  acknowledgement = ack-nhfb,
  articleno =    "151",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Coplien:1996:BBO,
  author =       "J. Coplien",
  title =        "Broadening beyond objects to patterns and to other
                 paradigms",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "152:1--152:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242418",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a152-coplien/",
  acknowledgement = ack-nhfb,
  articleno =    "152",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Guerraoui:1996:DPA,
  author =       "R. Guerraoui",
  title =        "Distributed programming abstractions",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "153:1--153:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242419",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a153-guerraoui/",
  acknowledgement = ack-nhfb,
  articleno =    "153",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kiczales:1996:AOP,
  author =       "G. Kiczales",
  title =        "Aspect-oriented programming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "154:1--154:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242420",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a154-kiczales/",
  acknowledgement = ack-nhfb,
  articleno =    "154",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lea:1996:SAI,
  author =       "D. Lea",
  title =        "Specification, architecture, and interoperability",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "155:1--155:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242422",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a155-lea/",
  acknowledgement = ack-nhfb,
  articleno =    "155",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lieberherr:1996:TPO,
  author =       "K. Lieberherr",
  title =        "From transience to persistence in object-oriented
                 programming: architectures and patterns",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "156:1--156:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242423",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a156-lieberherr/",
  acknowledgement = ack-nhfb,
  articleno =    "156",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Madsen:1996:SRD,
  author =       "O. Madsen",
  title =        "Strategic research directions in object-oriented
                 programming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "157:1--157:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242424",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a157-madsen/",
  acknowledgement = ack-nhfb,
  articleno =    "157",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Magnusson:1996:TI,
  author =       "B. Magnusson",
  title =        "Technology integration",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "158:1--158:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242425",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a158-magnusson/",
  acknowledgement = ack-nhfb,
  articleno =    "158",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Meseguer:1996:WON,
  author =       "Jos{\'e} Meseguer",
  title =        "Why {OOP} needs new semantic foundations",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "159:1--159:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242426",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a159-meseguer/",
  acknowledgement = ack-nhfb,
  articleno =    "159",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mossenbock:1996:TOO,
  author =       "H. M{\"o}ssenb{\"o}ck",
  title =        "Trends in object-oriented programming",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "160:1--160:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242427",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a160-mossenbock/",
  acknowledgement = ack-nhfb,
  articleno =    "160",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Palsberg:1996:CTO,
  author =       "J. Palsberg",
  title =        "Compiler technology for object-oriented languages",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "161:1--161:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242428",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a161-palsberg/",
  acknowledgement = ack-nhfb,
  articleno =    "161",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Schmidt:1996:UDP,
  author =       "D. Schmidt",
  title =        "Using design patterns to guide the development of
                 reusable object-oriented software",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "162:1--162:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242429",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a162-schmidt/",
  acknowledgement = ack-nhfb,
  articleno =    "162",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cardelli:1996:GC,
  author =       "Luca Cardelli",
  title =        "Global computation",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "163:1--163:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242430",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a163-cardelli/",
  acknowledgement = ack-nhfb,
  articleno =    "163",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Consel:1996:PAB,
  author =       "Charles Consel",
  title =        "Program adaptation based on program transformation",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "164:1--164:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242431",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a164-consel/",
  acknowledgement = ack-nhfb,
  articleno =    "164",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cousot:1996:PAA,
  author =       "Patrick Cousot",
  title =        "Program analysis: the abstract interpretation
                 perspective",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "165:1--165:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242433",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a165-cousot/",
  acknowledgement = ack-nhfb,
  articleno =    "165",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hanus:1996:IDP,
  author =       "Michael Hanus",
  title =        "Integration of declarative paradigms: benefits and
                 challenges",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "166:1--166:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242434",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a166-hanus/",
  acknowledgement = ack-nhfb,
  articleno =    "166",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Metayer:1996:PAS,
  author =       "Daniel Le M{\'e}tayer",
  title =        "Program analysis for software engineering: new
                 applications, new requirements, new tools",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "167:1--167:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242435",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a167-le_metayer/",
  acknowledgement = ack-nhfb,
  articleno =    "167",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nielson:1996:PPA,
  author =       "Flemming Nielson",
  title =        "Perspectives on program analysis",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "168:1--168:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242441",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a168-nielson/",
  acknowledgement = ack-nhfb,
  articleno =    "168",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Odersky:1996:CTS,
  author =       "Martin Odersky",
  title =        "Challenges in type systems research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "169:1--169:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242442",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a169-odersky/",
  acknowledgement = ack-nhfb,
  articleno =    "169",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Paige:1996:FDP,
  author =       "Robert Paige",
  title =        "Future directions in program transformations",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "170:1--170:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242444",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a170-paige/",
  acknowledgement = ack-nhfb,
  articleno =    "170",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pettorossi:1996:FDP,
  author =       "Alberto Pettorossi and Maurizio Proietti",
  title =        "Future directions in program transformation",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "171:1--171:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242445",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a171-pettorossi/",
  acknowledgement = ack-nhfb,
  articleno =    "171",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Reynolds:1996:BM,
  author =       "John Reynolds",
  title =        "Beyond {ML}",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "172:1--172:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242447",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a172-reynolds/",
  acknowledgement = ack-nhfb,
  articleno =    "172",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Riecke:1996:SDC,
  author =       "Jon G. Riecke",
  title =        "Semantics: the description of computational
                 structures",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "173:1--173:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242448",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a173-riecke/",
  acknowledgement = ack-nhfb,
  articleno =    "173",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ryder:1996:FPA,
  author =       "Barbara Ryder",
  title =        "The future of program analysis",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "174:1--174:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242450",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a174-ryder/",
  acknowledgement = ack-nhfb,
  articleno =    "174",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Schmidt:1996:NPF,
  author =       "David A. Schmidt",
  title =        "On the need for a popular formal semantics",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "175:1--175:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242451",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a175-schmidt/",
  acknowledgement = ack-nhfb,
  articleno =    "175",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Volpano:1996:PSP,
  author =       "Dennis Volpano",
  title =        "Provably secure programming languages for remote
                 evaluation",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "176:1--176:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242453",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a176-volpano/",
  acknowledgement = ack-nhfb,
  articleno =    "176",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wilhelm:1996:PAT,
  author =       "Reinhard Wilhelm",
  title =        "Program analysis --- a toolmaker's perspective",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "177:1--177:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242454",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a177-wilhelm/",
  acknowledgement = ack-nhfb,
  articleno =    "177",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Burns:1996:BRT,
  author =       "Alan Burns",
  title =        "Broadening real-time systems research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "178:1--178:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242456",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a178-burns/",
  acknowledgement = ack-nhfb,
  articleno =    "178",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jeffay:1996:TEC,
  author =       "Kevin Jeffay",
  title =        "Technical and educational challenges for real-time
                 computing",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "179:1--179:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242457",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a179-jeffay/",
  acknowledgement = ack-nhfb,
  articleno =    "179",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jones:1996:CRT,
  author =       "Mike Jones",
  title =        "Consumer real-time systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "180:1--180:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242459",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a180-jones/",
  acknowledgement = ack-nhfb,
  articleno =    "180",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Koob:1996:LSD,
  author =       "Gary Koob",
  title =        "Large-scale distributed real-time systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "181:1--181:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242460",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a181-koob/",
  acknowledgement = ack-nhfb,
  articleno =    "181",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lee:1996:FVT,
  author =       "Insup Lee",
  title =        "Formal verification, testing and checking of real-time
                 systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "182:1--182:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242461",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a182-lee/",
  acknowledgement = ack-nhfb,
  articleno =    "182",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lehoczky:1996:AMR,
  author =       "John Lehoczky",
  title =        "Analytical methods for real-time computing",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "183:1--183:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242463",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a183-lehoczky/",
  acknowledgement = ack-nhfb,
  articleno =    "183",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Liu:1996:VTP,
  author =       "Jane Liu",
  title =        "Validation of timing properties",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "184:1--184:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242464",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a184-liu/",
  acknowledgement = ack-nhfb,
  articleno =    "184",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mok:1996:FRT,
  author =       "Al Mok",
  title =        "Firm real-time systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "185:1--185:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242465",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a185-mok/",
  acknowledgement = ack-nhfb,
  articleno =    "185",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ramamritham:1996:PDR,
  author =       "Krithi Ramamritham",
  title =        "Predictability: demonstrating real-time properties",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "186:1--186:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242466",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a186-ramamritham/",
  acknowledgement = ack-nhfb,
  articleno =    "186",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sha:1996:RTR,
  author =       "Lui Sha",
  title =        "Real-time in the real world",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "187:1--187:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242467",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a187-sha/",
  acknowledgement = ack-nhfb,
  articleno =    "187",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Stankovic:1996:PRT,
  author =       "Jack Stankovic",
  title =        "The pervasiveness of real-time computing",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "188:1--188:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242468",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a188-stankovic/",
  acknowledgement = ack-nhfb,
  articleno =    "188",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{vanTilborg:1996:RTR,
  author =       "Andre {van Tilborg}",
  title =        "Real-time research in the {Department of Defense}",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "189:1--189:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242470",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a189-van_tilborg/",
  acknowledgement = ack-nhfb,
  articleno =    "189",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Abowd:1996:SEP,
  author =       "Gregory Abowd",
  title =        "Software engineering and programming language
                 considerations for ubiquitous computing",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "190:1--190:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242471",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a190-abowd/",
  acknowledgement = ack-nhfb,
  articleno =    "190",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chambers:1996:TRE,
  author =       "Craig Chambers",
  title =        "Towards reusable, extensible components",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "192:1--192:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242473",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a192-chambers/",
  acknowledgement = ack-nhfb,
  articleno =    "192",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Clarke:1996:NFP,
  author =       "Lori A. Clarke and Peri Tarr",
  title =        "New functionality for programming languages",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "193:1--193:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242474",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a193-clarke/",
  acknowledgement = ack-nhfb,
  articleno =    "193",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Griswold:1996:PLR,
  author =       "William G. Griswold and Richard Wolski and Scott B.
                 Baden and Stephen J. Fink and Scott R. Kohn",
  title =        "Programming language requirements for the next
                 millennium",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "194:1--194:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242475",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a194-griswold/",
  acknowledgement = ack-nhfb,
  articleno =    "194",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Harper:1996:RPL,
  author =       "Robert Harper and Peter Lee",
  title =        "Research in programming languages for composability,
                 safety, and performance",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "195:1--195:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242476",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a195-harper/",
  acknowledgement = ack-nhfb,
  articleno =    "195",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hudak:1996:BDS,
  author =       "Paul Hudak",
  title =        "Building domain-specific embedded languages",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "196:1--196:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242477",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a196-hudak/",
  acknowledgement = ack-nhfb,
  articleno =    "196",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kamin:1996:CLT,
  author =       "Sam Kamin",
  title =        "The challenge of language technology transfer",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "197:1--197:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242478",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a197-kamin/",
  acknowledgement = ack-nhfb,
  articleno =    "197",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Moore:1996:RIR,
  author =       "Melody M. Moore",
  title =        "Representation issues for reengineering interactive
                 systems",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "199:1--199:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242479",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a199-moore/",
  acknowledgement = ack-nhfb,
  articleno =    "199",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Palsberg:1996:SEI,
  author =       "Jens Palsberg",
  title =        "Software evolution and integration",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "200:1--200:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242480",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a200-palsberg/",
  acknowledgement = ack-nhfb,
  articleno =    "200",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Scherlis:1996:BC,
  author =       "Bill Scherlis",
  title =        "Beyond coding",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "201:1--201:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242481",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a201-scherlis/",
  acknowledgement = ack-nhfb,
  articleno =    "201",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wileden:1996:PLS,
  author =       "Jack Wileden",
  title =        "Programming languages and software engineering: past,
                 present and future",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "202:1--202:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242482",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a202-wileden/",
  acknowledgement = ack-nhfb,
  articleno =    "202",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Clarke:1996:HDW,
  author =       "Lori A. Clarke",
  title =        "How do we improve software quality and how do we show
                 that it matters?",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "203:1--203:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242483",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a203-clarke/",
  acknowledgement = ack-nhfb,
  articleno =    "203",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{DeMillo:1996:MCA,
  author =       "Richard A. DeMillo",
  title =        "Mission-critical applications, commercial value and
                 software quality",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "204:1--204:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242484",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a204-demillo/",
  acknowledgement = ack-nhfb,
  articleno =    "204",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{McKeeman:1996:SCS,
  author =       "William McKeeman",
  title =        "Separating concerns in software quality",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "205:1--205:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242486",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a205-mckeeman/",
  acknowledgement = ack-nhfb,
  articleno =    "205",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Miller:1996:GQM,
  author =       "Edward F. {Miller, Jr.}",
  title =        "Getting quality methods into practice",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "206:1--206:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242487",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a206-miller/",
  acknowledgement = ack-nhfb,
  articleno =    "206",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Choudhary:1996:LSF,
  author =       "Alok Choudhary and David Kotz",
  title =        "Large-scale file systems with the flexibility of
                 databases",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "207:1--207:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242488",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a207-choudhary/",
  acknowledgement = ack-nhfb,
  articleno =    "207",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cormen:1996:BMP,
  author =       "Thomas H. Cormen and Michael T. Goodrich",
  title =        "A bridging model for parallel computation,
                 communication, and {I}/{O}",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "208:1--208:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242490",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a208-cormen/",
  acknowledgement = ack-nhfb,
  articleno =    "208",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gibson:1996:SMN,
  author =       "Garth A. Gibson and John Wilkes",
  title =        "Self-managing network-attached storage",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "209:1--209:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242491",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a209-gibson/",
  acknowledgement = ack-nhfb,
  articleno =    "209",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Muntz:1996:SLD,
  author =       "Richard R. Muntz and Joseph Pasquale",
  title =        "System-level design issues for storage {I/O}",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "210:1--210:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242492",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a210-muntz/",
  acknowledgement = ack-nhfb,
  articleno =    "210",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Satyanarayanan:1996:AKM,
  author =       "M. Satyanarayanan and Carla Schlatter Ellis",
  title =        "Adaptation: the key to mobile {I/O}",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "211:1--211:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242494",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a211-satyanarayanan/",
  acknowledgement = ack-nhfb,
  articleno =    "211",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Vengroff:1996:EAE,
  author =       "Darren Erik Vengroff and Jeffrey Scott Vitter",
  title =        "{I/O}-efficient algorithms and environments",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "212:1--212:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242495",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a212-vengroff/",
  acknowledgement = ack-nhfb,
  articleno =    "212",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Green:1996:IWN,
  author =       "Paul Green",
  title =        "The impact of the {Web} on networking research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "213:1--213:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242497",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a213-green/",
  acknowledgement = ack-nhfb,
  articleno =    "213",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kurose:1996:FDN,
  author =       "Jim Kurose",
  title =        "Future directions in networking research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "214:1--214:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242498",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a214-kurose/",
  acknowledgement = ack-nhfb,
  articleno =    "214",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pasquale:1996:TIC,
  author =       "Joseph Pasquale",
  title =        "Towards {Internet} computing",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "215:1--215:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242499",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a215-pasquale/",
  acknowledgement = ack-nhfb,
  articleno =    "215",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Angluin:1996:SCL,
  author =       "Dana Angluin",
  title =        "A 1996 snapshot of computational learning theory",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "216:1--216:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242501",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a216-angluin/",
  acknowledgement = ack-nhfb,
  articleno =    "216",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fich:1996:IIR,
  author =       "Faith Fich",
  title =        "Infrastructure issues related to theory of computing
                 research",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "217:1--217:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242502",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a217-fich/",
  acknowledgement = ack-nhfb,
  articleno =    "217",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goldreich:1996:TCS,
  author =       "Oded Goldreich and Avi Wigderson",
  title =        "Theory of computing: a scientific perspective",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "218:1--218:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242503",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a218-goldreich/",
  acknowledgement = ack-nhfb,
  articleno =    "218",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Harper:1996:MB,
  author =       "Robert Harper and John Mitchell",
  title =        "{ML} and beyond",
  journal =      j-COMP-SURV,
  volume =       "28",
  number =       "4es",
  pages =        "219:1--219:??",
  month =        dec,
  year =         "1996",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/242224.242438",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:56:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1996-28-4es/a219-harper/",
  acknowledgement = ack-nhfb,
  articleno =    "219",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wegner:1997:ES,
  author =       "Peter Wegner",
  title =        "Editorial Statement",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "1",
  pages =        "1--2",
  month =        mar,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/248621.251369",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:04:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-1/p1-wegner/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Reid:1997:SGI,
  author =       "M. M. Reid and R. J. Millar and N. D. Black",
  title =        "Second-Generation Image Coding: An Overview",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "1",
  pages =        "3--29",
  month =        mar,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/248621.248622",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:04:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-1/p3-reid/",
  abstract =     "This article gives an overview of a diverse selection
                 of currently used second-generation image coding
                 techniques. These techniques have been grouped into
                 similar categories in order to allow a direct
                 comparison among the varying methods. An attempt has
                 been made, where possible, to expand upon and clarify
                 the details given by the original authors. The relative
                 merits and shortcomings of each of the techniques are
                 compared and contrasted.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; compression; human factors; image coding;
                 MRi; theory",
  subject =      "{\bf I.4.2} Computing Methodologies, IMAGE PROCESSING
                 AND COMPUTER VISION, Compression (Coding), Approximate
                 methods. {\bf E.4} Data, CODING AND INFORMATION THEORY,
                 Data compaction and compression. {\bf G.2.2}
                 Mathematics of Computing, DISCRETE MATHEMATICS, Graph
                 Theory, Trees. {\bf I.4.2} Computing Methodologies,
                 IMAGE PROCESSING AND COMPUTER VISION, Compression
                 (Coding), Exact coding**. {\bf I.4.3} Computing
                 Methodologies, IMAGE PROCESSING AND COMPUTER VISION,
                 Enhancement, Filtering. {\bf I.4.3} Computing
                 Methodologies, IMAGE PROCESSING AND COMPUTER VISION,
                 Enhancement, Smoothing. {\bf I.5.4} Computing
                 Methodologies, PATTERN RECOGNITION, Applications,
                 Waveform analysis.",
}

@Article{Walicki:1997:AAN,
  author =       "Micha{\l} Walicki and Sigurd Meldal",
  title =        "Algebraic approaches to nondeterminism --- an
                 overview",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "1",
  pages =        "30--81",
  month =        mar,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/248621.248623",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:04:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-1/p30-walicki/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "theory",
  subject =      "{\bf F.1.1} Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Models of Computation. {\bf F.1.2}
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Modes of Computation, Alternation and nondeterminism.
                 {\bf F.3.2} Theory of Computation, LOGICS AND MEANINGS
                 OF PROGRAMS, Semantics of Programming Languages,
                 Algebraic approaches to semantics. {\bf F.4.1} Theory
                 of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Mathematical Logic.",
}

@Article{Pong:1997:VTC,
  author =       "Fong Pong and Michel Dubois",
  title =        "Verification Techniques for Cache Coherence
                 Protocols",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "1",
  pages =        "82--126",
  month =        mar,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/248621.248624",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:04:27 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-1/p82-pong/",
  abstract =     "In this article we present a comprehensive survey of
                 various approaches for the verification of cache
                 coherence protocols based on {\em state enumeration},
                 {\em symbolic model checking}, and {\em symbolic state
                 models}. Since these techniques search the state space
                 of the protocol exhaustively, the amount of memory
                 required to manipulate that state information and the
                 verification time grow very fast with the number of
                 processors and the complexity of the protocol
                 mechanisms. To be successful for systems of arbitrary
                 complexity, a verification technique must solve this
                 so-called {\em state space explosion\/} problem. The
                 emphasis of our discussion is on the underlying theory
                 in each method of handling the state space explosion
                 problem, and formulating and checking the {\em
                 safety\/} properties (e.g., data consistency) and the
                 {\em liveness\/} properties (absence of deadlock and
                 livelock). We compare the efficiency and discuss the
                 limitations of each technique in terms of memory and
                 computation time. Also, we discuss issues of {\em
                 generality, applicability, automaticity, and amenity\/}
                 for existing tools in each class of methods. No method
                 is truly superior because each method has its own
                 strengths and weaknesses. Finally, refinements that can
                 further reduce the verification time and/or the memory
                 requirement are also discussed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "cache coherence; finite state machine; protocol
                 verification; shared-memory multiprocessors; state
                 representation and expansion; verification",
  subject =      "{\bf B.3.3} Hardware, MEMORY STRUCTURES, Performance
                 Analysis and Design Aids, Formal models**. {\bf B.3.2}
                 Hardware, MEMORY STRUCTURES, Design Styles, Shared
                 memory. {\bf B.4.4} Hardware, INPUT/OUTPUT AND DATA
                 COMMUNICATIONS, Performance Analysis and Design Aids,
                 Formal models**. {\bf B.4.4} Hardware, INPUT/OUTPUT AND
                 DATA COMMUNICATIONS, Performance Analysis and Design
                 Aids, Verification**.",
}

@Article{Wegner:1997:AIL,
  author =       "Peter Wegner",
  title =        "About this Issue \ldots{}",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "2",
  pages =        "127--127",
  month =        jun,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/254180.257471",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:04:42 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-2/p127-wegner/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "{\bf A.0} General Literature, GENERAL.",
}

@Article{Uhlig:1997:TDM,
  author =       "Richard A. Uhlig and Trevor N. Mudge",
  title =        "Trace-Driven Memory Simulation: a Survey",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "2",
  pages =        "128--170",
  month =        jun,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/254180.254184",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:04:42 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See erratum \cite{Anonymous:1997:E}.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-2/p128-uhlig/",
  abstract =     "As the gap between processor and memory speeds
                 continues to widen, methods for evaluating memory
                 system designs before they are implemented in hardware
                 are becoming increasingly important. One such method,
                 trace-driven memory simulation, has been the subject of
                 intense interest among researchers and has, as a
                 result, enjoyed rapid development and substantial
                 improvements during the past decade. This article
                 surveys and analyzes these developments by establishing
                 criteria for evaluating trace-driven methods, and then
                 applies these criteria to describe, categorize, and
                 compare over 50 trace-driven simulation tools. We
                 discuss the strengths and weaknesses of different
                 approaches and show that no single method is best when
                 all criteria, including accuracy, speed, memory,
                 flexibility, portability, expense, and ease of use are
                 considered. In a concluding section, we examine
                 fundamental limitations to trace-driven simulation, and
                 survey some recent developments in memory simulation
                 that may overcome these bottlenecks.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "caches; experimentation; measurement; memory
                 management; memory simulation; TLBs; trace-driven
                 simulation",
  subject =      "{\bf B.3.3} Hardware, MEMORY STRUCTURES, Performance
                 Analysis and Design Aids, Simulation**. {\bf C.4}
                 Computer Systems Organization, PERFORMANCE OF SYSTEMS,
                 Measurement techniques. {\bf I.6.0} Computing
                 Methodologies, SIMULATION AND MODELING, General.",
}

@Article{Paschos:1997:SAO,
  author =       "Vangelis T. Paschos",
  title =        "A Survey of Approximately Optimal Solutions to Some
                 Covering and Packing Problems",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "2",
  pages =        "171--209",
  month =        jun,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/254180.254190",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:04:42 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-2/p171-paschos/",
  abstract =     "We survey approximation algorithms for some well-known
                 and very natural combinatorial optimization problems,
                 the minimum set covering, the minimum vertex covering,
                 the maximum set packing, and maximum independent set
                 problems; we discuss their approximation performance
                 and their complexity. For already known results, any
                 time we have conceived simpler proofs than those
                 already published, we give these proofs, and, for the
                 rest, we cite the simpler published ones. Finally, we
                 discuss how one can relate the approximability behavior
                 (from both a positive and a negative point of view) of
                 vertex covering to the approximability behavior of a
                 restricted class of independent set problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithm analysis; algorithms; approximation
                 algorithms; combinatorial algorithms; constrained
                 optimization; problem complexity; theory",
  subject =      "{\bf G.2.1} Mathematics of Computing, DISCRETE
                 MATHEMATICS, Combinatorics, Combinatorial algorithms.
                 {\bf G.4} Mathematics of Computing, MATHEMATICAL
                 SOFTWARE, Algorithm design and analysis. {\bf G.1.6}
                 Mathematics of Computing, NUMERICAL ANALYSIS,
                 Optimization, Integer programming. {\bf F.2.2} Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Nonnumerical Algorithms and Problems,
                 Computations on discrete structures. {\bf G.1.6}
                 Mathematics of Computing, NUMERICAL ANALYSIS,
                 Optimization, Linear programming.",
}

@Article{Thorn:1997:PLM,
  author =       "Tommy Thorn",
  title =        "Programming languages for mobile code",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "3",
  pages =        "213--239",
  month =        sep,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/262009.262010",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:04:53 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See erratum \cite{Anonymous:1997:E}.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-3/p213-thorn/",
  abstract =     "Sun's announcement of the programming language Java
                 more that anything popularized the notion of mobile
                 code, that is, programs traveling on a heterogeneous
                 network and automatically executing upon arrival at the
                 destination. We describe several classes of mobile code
                 and extract their common characteristics, where
                 security proves to be one of the major concerns. With
                 these characteristics as reference points, we examine
                 six representative languages proposed for mobile code.
                 The conclusion of this study leads to our
                 recommendations for future work, illustrated by
                 examples of ongoing research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "distribution; formal methods; Java; languages; Limbo;
                 mobile code; network programming; object orientation;
                 Objective Caml; Obliq; portability; Safe-Tcl; safety;
                 security; telescript",
  subject =      "{\bf A.1} General Literature, INTRODUCTORY AND SURVEY.
                 {\bf D.3.2} Software, PROGRAMMING LANGUAGES, Language
                 Classifications, Object-oriented languages. {\bf C.2.4}
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, Distributed Systems, Distributed
                 applications. {\bf D.4.6} Software, OPERATING SYSTEMS,
                 Security and Protection, Access controls.",
}

@Article{Wadler:1997:HDI,
  author =       "Philip Wadler",
  title =        "How to declare an imperative",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "3",
  pages =        "240--263",
  month =        sep,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/262009.262011",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:04:53 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-3/p240-wadler/",
  abstract =     "How can we integrate interaction into a purely
                 declarative language? This tutorial describes a
                 solution to this problem based on a monad. The solution
                 has been implemented in the functional language Haskell
                 and the declarative language Escher. Comparisons are
                 given with other approaches to interaction based on
                 synchronous streams, continuations, linear logic, and
                 side effects.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "functional programming; Haskell; monad; theory",
  subject =      "{\bf D.3.3} Software, PROGRAMMING LANGUAGES, Language
                 Constructs and Features, Input/Output. {\bf F.4.1}
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Mathematical Logic, Lambda calculus and
                 related systems.",
}

@Article{Ji:1997:MIC,
  author =       "Qiang Ji and Michael M. Marefat",
  title =        "Machine interpretation of {CAD} data for manufacturing
                 applications",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "3",
  pages =        "264--311",
  month =        sep,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/262009.262012",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:04:53 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-3/p264-ji/",
  abstract =     "Machine interpretation of the shape of a component for
                 CAD databases is an important problem in CAD/CAM,
                 computer vision, and intelligent manufacturing. It can
                 be used in CAD/CAM for evaluation of designs, in
                 computer vision for machine recognition and machine
                 inspection of objects, and in intelligent manufacturing
                 for automating and integrating the link between design
                 and manufacturing. This topic has been an active area
                 of research since the late '70s, and a significant
                 number of computational methods have been proposed to
                 identify portions of the geometry of a part having
                 engineering significance (here called ``features'').
                 However, each proposed mechanism has been able to solve
                 the problem only for components within a restricted
                 geometric domain (such as polyhedral components), or
                 only for components whose features interact with each
                 other in a restricted manner. The purposes of this
                 article are to review and summarize the development of
                 research on machine recognition of features from CAD
                 data, to discuss the advantages and potential problems
                 of each approach, and to point out some of the
                 promising directions future investigations may take.
                 Since most work in this field has focused on machining
                 features, the article primarily covers those features
                 associated with the manufacturing domain. In order to
                 better understand the state of the art, methods of
                 automated feature recognition are divided into the
                 following categories of methods based on their
                 approach: graph-based, syntactic pattern recognition,
                 rule-based, and volumetric. Within each category we
                 have studied issues such as the definition of features,
                 mechanisms developed for recognition of features, the
                 application scope, and the assumptions made. In
                 addition, the problem is addressed from the perspective
                 of information input requirements and the advantages
                 and disadvantages of boundary representation,
                 constructive solid geometry (CSG), and 2D drawings with
                 respect to machine recognition of features are
                 examined. Emphasis is placed on the mechanisms for
                 attacking problems associated with interacting
                 features.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "artificial intelligence; automated process planning;
                 computer-aided design; computer-integrated
                 manufacturing; feature recognition; flexible
                 automation; performance; reliability",
  subject =      "{\bf I.3.5} Computing Methodologies, COMPUTER
                 GRAPHICS, Computational Geometry and Object Modeling,
                 Boundary representations. {\bf I.3.8} Computing
                 Methodologies, COMPUTER GRAPHICS, Applications. {\bf
                 I.3.5} Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling,
                 Constructive solid geometry (CSG)**. {\bf I.3.5}
                 Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling, Curve,
                 surface, solid, and object representations. {\bf I.3.5}
                 Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling, Geometric
                 algorithms, languages, and systems. {\bf I.5.1}
                 Computing Methodologies, PATTERN RECOGNITION, Models,
                 Geometric. {\bf I.5.2} Computing Methodologies, PATTERN
                 RECOGNITION, Design Methodology, Pattern analysis. {\bf
                 I.5.0} Computing Methodologies, PATTERN RECOGNITION,
                 General. {\bf I.2.10} Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Vision and Scene
                 Understanding, Shape. {\bf I.2.9} Computing
                 Methodologies, ARTIFICIAL INTELLIGENCE, Robotics. {\bf
                 J.2} Computer Applications, PHYSICAL SCIENCES AND
                 ENGINEERING, Engineering.",
}

@Article{Zave:1997:CRE,
  author =       "Pamela Zave",
  title =        "Classification of research efforts in requirements
                 engineering",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "4",
  pages =        "315--321",
  month =        dec,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/267580.267581",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:05:04 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-4/p315-zave/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; performance",
  subject =      "{\bf D.2.1} Software, SOFTWARE ENGINEERING,
                 Requirements/Specifications.",
}

@Article{Nwana:1997:CSE,
  author =       "Hyacinth S. Nwana",
  title =        "Is computer science education in crisis?",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "4",
  pages =        "322--324",
  month =        dec,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/267580.267582",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:05:04 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-4/p322-nwana/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; performance",
  subject =      "{\bf K.3.2} Computing Milieux, COMPUTERS AND
                 EDUCATION, Computer and Information Science
                 Education.",
}

@Article{Weinhaus:1997:TMM,
  author =       "Frederick M. Weinhaus and Venkat Devarajan",
  title =        "Texture mapping {$3$D} models of real-world scenes",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "4",
  pages =        "325--365",
  month =        dec,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/267580.267583",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:05:04 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-4/p325-weinhaus/",
  abstract =     "Texture mapping has become a popular tool in the
                 computer graphics industry in the last few years
                 because it is an easy way to achieve a high degree of
                 realism in computer-generated imagery with very little
                 effort. Over the last decade, texture-mapping
                 techniques have advanced to the point where it is
                 possible to generate real-time perspective simulations
                 of real-world areas by texture mapping every object
                 surface with texture from photographic images of these
                 real-world areas. The techniques for generating such
                 perspective transformations are variations on
                 traditional texture mapping that in some circles have
                 become known as the {\em Image Perspective
                 Transformation\/} or IPT technology. This article first
                 presents a background survey of traditional texture
                 mapping. It then continues with a description of the
                 texture-mapping variations that achieve these
                 perspective transformations of photographic images of
                 real-world scenes. The style of the presentation is
                 that of a resource survey rather thatn an in-depth
                 analysis.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; anti-aliasing; height field; homogeneous
                 coordinates; image perspective transformation; image
                 warping; multiresolution data; perspective projection;
                 polygons; ray tracing; real-time scene generation;
                 rectification; registration; texture mapping; visual
                 simulators; voxels",
  subject =      "{\bf I.3.7} Computing Methodologies, COMPUTER
                 GRAPHICS, Three-Dimensional Graphics and Realism,
                 Color, shading, shadowing, and texture. {\bf I.3.3}
                 Computing Methodologies, COMPUTER GRAPHICS,
                 Picture/Image Generation, Antialiasing**. {\bf I.3.5}
                 Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling, Curve,
                 surface, solid, and object representations. {\bf I.3.5}
                 Computing Methodologies, COMPUTER GRAPHICS,
                 Computational Geometry and Object Modeling, Hierarchy
                 and geometric transformations. {\bf I.3.7} Computing
                 Methodologies, COMPUTER GRAPHICS, Three-Dimensional
                 Graphics and Realism, Hidden line/surface removal. {\bf
                 I.3.7} Computing Methodologies, COMPUTER GRAPHICS,
                 Three-Dimensional Graphics and Realism, Raytracing.",
}

@Article{Zhu:1997:SUT,
  author =       "Hong Zhu and Patrick A. V. Hall and John H. R. May",
  title =        "Software unit test coverage and adequacy",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "4",
  pages =        "366--427",
  month =        dec,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/267580.267590",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:05:04 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-4/p366-zhu/",
  abstract =     "Objective measurement of test quality is one of the
                 key issues in software testing. It has been a major
                 research focus for the last two decades. Many test
                 criteria have been proposed and studied for this
                 purpose. Various kinds of rationales have been
                 presented in support of one criterion or another. We
                 survey the research work in this area. The notion of
                 adequacy criteria is examined together with its role in
                 software dynamic testing. A review of criteria
                 classification is followed by a summary of the methods
                 for comparison and assessment of criteria.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "comparing testing effectiveness; fault detection;
                 measurement; performance; reliability; software unit
                 test; test adequacy criteria; test coverage; testing
                 methods; verification",
  subject =      "{\bf D.2.5} Software, SOFTWARE ENGINEERING, Testing
                 and Debugging.",
}

@Article{Anonymous:1997:E,
  author =       "Anonymous",
  title =        "Errata",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "4",
  pages =        "428--428",
  month =        dec,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/267580.269951",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 10 14:53:57 MST 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Uhlig:1997:TDM,Thorn:1997:PLM}.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-4/p428-errata/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Anonymous:1997:AIV,
  author =       "Anonymous",
  title =        "Author index: Vols. 25--29 (1993--1997)",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "4",
  pages =        "429--437",
  month =        dec,
  year =         "1997",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 10 14:53:57 MST 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-4/p429-author_index/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Anonymous:1997:AI,
  author =       "Anonymous",
  title =        "Author index",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "4",
  pages =        "429--437",
  month =        dec,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/267580.269949",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:05:04 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Anonymous:1997:SIV,
  author =       "Anonymous",
  title =        "Subject index: Vols. 25--29 (1993--1997)",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "4",
  pages =        "437--442",
  month =        dec,
  year =         "1997",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 10 14:53:57 MST 1998",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1997-29-4/p437-subject_index/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{index:1997:SI,
  author =       "Subject index",
  title =        "Subject index",
  journal =      j-COMP-SURV,
  volume =       "29",
  number =       "4",
  pages =        "437--442",
  month =        dec,
  year =         "1997",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/267580.269950",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:05:04 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wegner:1998:AIa,
  author =       "Peter Wegner",
  title =        "About this issue",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "1",
  pages =        "1--1",
  month =        mar,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/274440.275545",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:05:26 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-1/p1-wegner/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lewandowski:1998:FCB,
  author =       "Scott M. Lewandowski",
  title =        "Frameworks for component-based client\slash server
                 computing",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "1",
  pages =        "3--27",
  month =        mar,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/274440.274441",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:05:26 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-1/p3-lewandowski/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{El-Yaniv:1998:CSO,
  author =       "Ran El-Yaniv",
  title =        "Competitive solutions for online financial problems",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "1",
  pages =        "28--69",
  month =        mar,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/274440.274442",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:05:26 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-1/p28-el-yaniv/",
  abstract =     "This article surveys results concerning online
                 algorithms for solving problems related to the
                 management of money and other assets. In particular,
                 the survey focuses on search, replacement, and
                 portfolio selection problems",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; measurement; performance; theory",
  subject =      "{\bf F.1.2} Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Modes of Computation, Online
                 computation. {\bf F.2.2} Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Nonnumerical Algorithms and Problems, Sorting and
                 searching. {\bf G.2.m} Mathematics of Computing,
                 DISCRETE MATHEMATICS, Miscellaneous. {\bf G.3}
                 Mathematics of Computing, PROBABILITY AND STATISTICS.
                 {\bf J.1} Computer Applications, ADMINISTRATIVE DATA
                 PROCESSING, Financial. {\bf F.1.2} Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Probabilistic computation.",
}

@Article{Thomasian:1998:CCM,
  author =       "Alexander Thomasian",
  title =        "Concurrency control: methods, performance, and
                 analysis",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "1",
  pages =        "70--119",
  month =        mar,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/274440.274443",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:05:26 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-1/p70-thomasian/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "adaptive methods; algorithms; concurrency control;
                 data contention; deadlocks; flow diagrams; load
                 control; Markov chains; optimistic concurrency control;
                 performance; queueing network models; restart-oriented
                 locking methods; serializability; thrashing; two-phase
                 locking; two-phase processing; wait depth limited
                 methods",
  subject =      "{\bf D.4.8} Software, OPERATING SYSTEMS, Performance,
                 Modeling and prediction. {\bf H.2.4} Information
                 Systems, DATABASE MANAGEMENT, Systems, Transaction
                 processing.",
}

@Article{Skillicorn:1998:MLP,
  author =       "David B. Skillicorn and Domenico Talia",
  title =        "Models and languages for parallel computation",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "2",
  pages =        "123--169",
  month =        jun,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/280277.280278",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:05:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-2/p123-skillicorn/",
  abstract =     "We survey parallel programming models and languages
                 using six criteria to assess their suitability for
                 realistic portable parallel programming. We argue that
                 an ideal model should by easy to program, should have a
                 software development methodology, should be
                 architecture-independent, should be easy to understand,
                 should guarantee performance, and should provide
                 accurate information about the cost of programs. These
                 criteria reflect our belief that developments in
                 parallelism must be driven by a parallel software
                 industry based on portability and efficiency. We
                 consider programming models in six categories,
                 depending on the level of abstraction they provide.
                 Those that are very abstract conceal even the presence
                 of parallelism at the software level. Such models make
                 software easy to build and port, but efficient and
                 predictable performance is usually hard to achieve. At
                 the other end of the spectrum, low-level models make
                 all of the messy issues of parallel programming
                 explicit (how many threads, how to place them, how to
                 express communication, and how to schedule
                 communication), so that software is hard to build and
                 not very portable, but is usually efficient. Most
                 recent models are near the center of this spectrum,
                 exploring the best tradeoffs between expressiveness and
                 performance. A few models have achieved both
                 abstractness and efficiency. Both kinds of models raise
                 the possibility of parallelism as part of the
                 mainstream of computing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "general-purpose parallel computation; languages; logic
                 programming languages; object-oriented languages;
                 parallel programming languages; parallel programming
                 models; performance; software development methods;
                 taxonomy; theory",
  subject =      "{\bf C.4} Computer Systems Organization, PERFORMANCE
                 OF SYSTEMS. {\bf D.1} Software, PROGRAMMING TECHNIQUES.
                 {\bf D.3.2} Software, PROGRAMMING LANGUAGES, Language
                 Classifications.",
}

@Article{Gaede:1998:MAM,
  author =       "Volker Gaede and Oliver G{\"u}nther",
  title =        "Multidimensional access methods",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "2",
  pages =        "170--231",
  month =        jun,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/280277.280279",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:05:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-2/p170-gaede/",
  abstract =     "Search operations in databases require special support
                 at the physical level. This is true for conventional
                 databases as well as spatial databases, where typical
                 search operations include the {\em point query\/} (find
                 all objects that contain a given search point) and the
                 {\em region query\/} (find all objects that overlap a
                 given search region). More than ten years of spatial
                 database research have resulted in a great variety of
                 multidimensional access methods to support such
                 operations. We give an overview of that work. After a
                 brief survey of spatial data management in general, we
                 first present the class of {\em point access methods},
                 which are used to search sets of points in two or more
                 dimensions. The second part of the paper is devoted to
                 {\em spatial access methods\/} to handle extended
                 objects, such as rectangles or polyhedra. We conclude
                 with a discussion of theoretical and experimental
                 results concerning the relative performance of various
                 approaches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data structures; design; experimentation;
                 multidimensional access methods; performance",
  subject =      "{\bf H.2.2} Information Systems, DATABASE MANAGEMENT,
                 Physical Design, Access methods. {\bf H.2.4}
                 Information Systems, DATABASE MANAGEMENT, Systems. {\bf
                 H.2.8} Information Systems, DATABASE MANAGEMENT,
                 Database Applications, Spatial databases and GIS. {\bf
                 H.3.3} Information Systems, INFORMATION STORAGE AND
                 RETRIEVAL, Information Search and Retrieval, Search
                 process. {\bf H.3.3} Information Systems, INFORMATION
                 STORAGE AND RETRIEVAL, Information Search and
                 Retrieval, Selection process.",
}

@Article{Conradi:1998:VMS,
  author =       "Reidar Conradi and Bernhard Westfechtel",
  title =        "Version models for software configuration management",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "2",
  pages =        "232--282",
  month =        jun,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/280277.280280",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:05:38 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-2/p232-conradi/",
  abstract =     "After more than 20 years of research and practice in
                 software configuration management (SCM), constructing
                 consistent configurations of versioned software
                 products still remains a challenge. This article
                 focuses on the version models underlying both
                 commercial systems and research prototypes. It provides
                 an overview and classification of different versioning
                 paradigms and defines and relates fundamental concepts
                 such as revisions, variants, configurations, and
                 changes. In particular, we focus on intensional
                 versioning, that is, construction of versions based on
                 configuration rules. Finally, we provide an overview of
                 systems that have had significant impact on the
                 development of the SCM discipline and classify them
                 according to a detailed taxonomy.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "changes; configuration rules; configurations;
                 languages; management; revisions; variants; versions",
  subject =      "{\bf D.2.2} Software, SOFTWARE ENGINEERING, Design
                 Tools and Techniques, Computer-aided software
                 engineering (CASE). {\bf D.2.6} Software, SOFTWARE
                 ENGINEERING, Programming Environments. {\bf D.2.9}
                 Software, SOFTWARE ENGINEERING, Management, Software
                 configuration management. {\bf H.2.3} Information
                 Systems, DATABASE MANAGEMENT, Languages, Database
                 (persistent) programming languages. {\bf H.2.8}
                 Information Systems, DATABASE MANAGEMENT, Database
                 Applications. {\bf I.2.3} Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem Proving,
                 Deduction. {\bf I.2.3} Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Deduction and Theorem Proving,
                 Logic programming.",
}

@Article{Anonymous:1998:CCS,
  author =       "Anonymous",
  title =        "Contents: {Computing Surveys' Electronic Symposium on
                 Partial Evaluating}:
                 \path=http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/=",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3",
  pages =        "283--283",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Jan 26 17:29:12 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Anonymous:1998:E,
  author =       "Anonymous",
  title =        "Editorial",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3",
  pages =        "284--284",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Jan 26 17:29:12 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wegner:1998:E,
  author =       "Peter Wegner and Marvin Israel",
  title =        "Editorial",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3",
  pages =        "284--284",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/292469.293683",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:00 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Danvy:1998:SPE,
  author =       "Olivier Danvy and Robert Gl{\"u}ck and Peter
                 Thiemann",
  title =        "{1998 Symposium on Partial Evaluation}",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3",
  pages =        "285--290",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/292469.293684",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:00 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Briot:1998:CDO,
  author =       "Jean-Pierre Briot and Rachid Guerraoui and Klaus-Peter
                 Lohr",
  title =        "Concurrency and Distribution in Object-Oriented
                 Programming",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3",
  pages =        "291--329",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/292469.292470",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:00 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3/p291-briot/",
  abstract =     "This paper aims at discussing and classifying the
                 various ways in which the object paradigm is used in
                 concurrent and distributed contexts. We distinguish
                 among the {\em library\/} approach, the {\em
                 integrative\/} approach, and the {\em reflective\/}
                 approach. The library approach applies object-oriented
                 concepts, as they are, to structure concurrent and
                 distributed systems through class libraries. The
                 integrative approach consists of merging concepts such
                 as object and activity, message passing, and
                 transaction, etc. The reflective approach integrates
                 class libraries intimately within an object-based
                 programming language. We discuss and illustrate each of
                 these and point out their complementary levels and
                 goals.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "concurrency; distribution; integration; languages;
                 libraries; message passing; object; performance;
                 reflection; reliability",
  subject =      "{\bf C.1.2} Computer Systems Organization, PROCESSOR
                 ARCHITECTURES, Multiple Data Stream Architectures
                 (Multiprocessors). {\bf C.2.4} Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems. {\bf D.1} Software, PROGRAMMING
                 TECHNIQUES. {\bf D.3.2} Software, PROGRAMMING
                 LANGUAGES, Language Classifications. {\bf D.4.1}
                 Software, OPERATING SYSTEMS, Process Management. {\bf
                 D.4.4} Software, OPERATING SYSTEMS, Communications
                 Management. {\bf D.4.5} Software, OPERATING SYSTEMS,
                 Reliability. {\bf I.2.11} Computing Methodologies,
                 ARTIFICIAL INTELLIGENCE, Distributed Artificial
                 Intelligence.",
}

@Article{Abdullahi:1998:GCI,
  author =       "Saleh E. Abdullahi and Graem A. Ringwood",
  title =        "Garbage Collecting the {Internet}: a Survey of
                 Distributed Garbage Collection",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3",
  pages =        "330--373",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/292469.292471",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:00 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3/p330-abdullahi/",
  abstract =     "Internet programming languages such as Java present
                 new challenges to garbage-collection design. The
                 spectrum of garbage-collection schema for linked
                 structures distributed over a network are reviewed
                 here. Distributed garbage collectors are classified
                 first because they evolved from single-address-space
                 collectors. This taxonomy is used as a framework to
                 explore distribution issues: locality of action,
                 communication overhead and indeterministic
                 communication latency.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "automatic storage reclamation; distributed;
                 distributed file systems; distributed memories;
                 distributed object-oriented management; languages;
                 management; memory management; network communication;
                 object-oriented databases; performance; reference
                 counting; reliability",
  subject =      "{\bf C.2.4} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf D.1.3} Software, PROGRAMMING TECHNIQUES,
                 Concurrent Programming. {\bf D.1.3} Software,
                 PROGRAMMING TECHNIQUES, Concurrent Programming,
                 Distributed programming. {\bf D.1.3} Software,
                 PROGRAMMING TECHNIQUES, Concurrent Programming,
                 Parallel programming. {\bf D.4.2} Software, OPERATING
                 SYSTEMS, Storage Management. {\bf D.4.3} Software,
                 OPERATING SYSTEMS, File Systems Management.",
}

@Article{Mohapatra:1998:WRT,
  author =       "Prasant Mohapatra",
  title =        "Wormhole Routing Techniques for Directly Connected
                 Multicomputer Systems",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3",
  pages =        "374--410",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/292469.292472",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:00 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3/p374-mohapatra/",
  abstract =     "Wormhole routing has emerged as the most widely used
                 switching technique in massively parallel computers. We
                 present a detailed survey of various techniques for
                 enhancing the performance and reliability of
                 wormhole-routing schemes in directly connected
                 networks. We start with an overview of the direct
                 network topologies and a comparison of various
                 switching techniques. Next, the characteristics of the
                 wormhole routing mechanism are described in detail
                 along with the theory behind deadlock-free routing. The
                 performance of routing algorithms depends on the
                 selection of the path between the source and the
                 destination, the network traffic, and the router
                 design. The routing algorithms are implemented in the
                 router chips. We outline the router characteristics and
                 describe the functionality of various elements of the
                 router. Depending on the usage of paths between the
                 source and the destination, routing algorithms are
                 classified as deterministic, fully adaptive, and
                 partially adaptive. We discuss several representative
                 algorithms for all these categories. The algorithms
                 within each category vary in terms of resource
                 requirements and performance under various traffic
                 conditions. The main difference among various adaptive
                 routing schemes is the technique used to avoid
                 deadlocks. We also discuss a few algorithms based on
                 deadlock recovery techniques. Along with performance,
                 fault tolerance is essential for message routing in
                 multicomputers, and we thus discuss several
                 fault-tolerant wormhole routing algorithms along with
                 their fault-handling capabilities. These routing
                 schemes enable a message to reach its destination even
                 in the presence of faults in the network. The
                 implementation details of wormhole routing algorithms
                 in contemporary commercial systems are also discussed.
                 We conclude by itemizing several future directions and
                 open issues.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; design; performance; reliability",
  subject =      "{\bf C.2.6} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Internetworking,
                 Routers. {\bf B.4.3} Hardware, INPUT/OUTPUT AND DATA
                 COMMUNICATIONS, Interconnections (Subsystems),
                 Topology. {\bf C.1.4} Computer Systems Organization,
                 PROCESSOR ARCHITECTURES, Parallel Architectures. {\bf
                 C.2.1} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Architecture
                 and Design. {\bf C.2.2} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
                 Routing protocols.",
}

@Article{Basin:1998:LFB,
  author =       "David Basin",
  title =        "Logical framework based program development",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "1:1--1:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/292469.293683",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 1.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a1-basin/",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Field:1998:EUF,
  author =       "J. Field and J. Heering and T. B. Dinesh",
  title =        "Equations as a uniform framework for partial
                 evaluation and abstract interpretation",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "2:1--2:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/292469.293684",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 2.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a2-field/",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Klimov:1998:PSV,
  author =       "Andrei Klimov",
  title =        "Program specialization vs. program composition",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "3:1--3:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/292469.292470",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 3.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a3-klimov/",
  abstract =     "This paper aims at discussing and classifying the
                 various ways in which the object paradigm is used in
                 concurrent and distributed contexts. We distinguish
                 among the library approach, the integrative approach,
                 and the reflective approach. The library approach
                 applies object-oriented concepts, as they are, to
                 structure concurrent and distributed systems through
                 class libraries. The integrative approach consists of
                 merging concepts such as object and activity, message
                 passing, and transaction, etc. The reflective approach
                 integrates class libraries intimately within an
                 object-based programming language. We discuss and
                 illustrate each of these and point out their
                 complementary levels and goals.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "concurrency; distribution; integration; libraries;
                 message passing; object; reflection",
}

@Article{Leuschel:1998:SAP,
  author =       "Michael Leuschel and B. Martens and D. de Schreye",
  title =        "Some achievements and prospects in partial deduction",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "4:1--4:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/292469.292471",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 4.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a4-leuschel/",
  abstract =     "Internet programming languages such as Java present
                 new challenges to garbage-collection design. The
                 spectrum of garbage-collection schema for linked
                 structures distributed over a network are reviewed
                 here. Distributed garbage collectors are classified
                 first because they evolved from single-address-space
                 collectors. This taxonomy is used as a framework to
                 explore distribution issues: locality of action,
                 communication overhead and indeterministic
                 communication latency.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "automatic storage reclamation; distributed;
                 distributed file systems; distributed memories;
                 distributed object-oriented management; memory
                 management; network communication; object-oriented
                 databases; reference counting",
}

@Article{Mogensen:1998:IL,
  author =       "Torben Mogensen",
  title =        "Inherited limits",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "5:1--5:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/292469.292472",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 5.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a5-mogensen/",
  abstract =     "Wormhole routing has emerged as the most widely used
                 switching technique in massively parallel computers. We
                 present a detailed survey of various techniques for
                 enhancing the performance and reliability of
                 wormhole-routing schemes in directly connected
                 networks. We start with an overview of the direct
                 network topologies and a comparison of various
                 switching techniques. Next, the characteristics of the
                 wormhole routing mechanism are described in detail
                 along with the theory behind deadlock-free routing. The
                 performance of routing algorithms depends on the
                 selection of the path between the source and the
                 destination, the network traffic, and the router
                 design. The routing algorithms are implemented in the
                 router chips. We outline the router characteristics and
                 describe the functionality of various elements of the
                 router. Depending on the usage of paths between the
                 source and the destination, routing algorithms are
                 classified as deterministic, fully adaptive, and
                 partially adaptive. We discuss several representative
                 algorithms for all these categories. The algorithms
                 within each category vary in terms of resource
                 requirements and performance under various traffic
                 conditions. The main difference among various adaptive
                 routing schemes is the technique used to avoid
                 deadlocks. We also discuss a few algorithms based on
                 deadlock recovery techniques. Along with performance,
                 fault tolerance is essential for message routing in
                 multicomputers, and we thus discuss several
                 fault-tolerant wormhole routing algorithms along with
                 their fault-handling capabilities. These routing
                 schemes enable a message to reach its destination even
                 in the presence of faults in the network. The
                 implementation details of wormhole routing algorithms
                 in contemporary commercial systems are also discussed.
                 We conclude by itemizing several future directions and
                 open issues.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pettorossi:1998:PSA,
  author =       "Alberto Pettorossi and Maurizio Proietti",
  title =        "Program specialization via algorithmic unfold\slash
                 fold transformations",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "6:1--6:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289127",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 6.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a6-pettorossi/",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Takano:1998:PTC,
  author =       "Akihiko Takano and Zhenjiang Hu and Masato Takeichi",
  title =        "Program transformation in calculational form",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "7:1--7:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289128",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 7.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a7-takano/",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wickline:1998:MTS,
  author =       "Philip Wickline and Peter Lee and Frank Pfenning and
                 Rowan Davies",
  title =        "Modal types as staging specifications for run-time
                 code generation",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "8:1--8:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289129",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 8.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a8-wickline/",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Alpuente:1998:UVF,
  author =       "Maria Alpuente and Moreno Falaschi and German Vidal",
  title =        "A unifying view of functional and logic program
                 specialization",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "9:1--9:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289130",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 9.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a9-alpuente/",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bugliesi:1998:OML,
  author =       "Michele Bugliesi and Anna Ciampolini and Evelina Lamma
                 and Paola Mello",
  title =        "Optimizing modular logic languages",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "10:1--10:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289131",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 10.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a10-bugliesi/",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Etalle:1998:PEC,
  author =       "Sandro Etalle and Maurizio Gabbrieli",
  title =        "Partial evaluation of concurrent constraint
                 languages",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "11:1--11:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289132",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 11.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a11-etalle/",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gallagher:1998:RTA,
  author =       "J. P. Gallagher and L. Lafave",
  title =        "The role of trace abstractions in program
                 specialization algorithms",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "12:1--12:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289133",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 12.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a12-gallagher/",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hatcliff:1998:FPE,
  author =       "John Hatcliff",
  title =        "Foundations for partial evaluation of functional
                 programs with computational effects",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "13:1--13:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289134",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 13.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a13-hatcliff/",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hughes:1998:TS,
  author =       "John Hughes",
  title =        "Type specialization",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "14:1--14:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289135",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 14.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a14-hughes/",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lafave:1998:EPA,
  author =       "L. Lafave and J. P. Gallagher",
  title =        "Extending the power of automatic constraint-based
                 partial evaluators",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "15:1--15:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289136",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 15.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a15-lafave/",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sagonas:1998:EPD,
  author =       "Konstantinos Sagonas and Michael Leuschel",
  title =        "Extending partial deduction to tabled execution: some
                 results and open issues",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "16:1--16:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289137",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 16.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a16-sagonas/",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Blazy:1998:PEP,
  author =       "Sandrine Blazy and Philippe Facon",
  title =        "Partial evaluation for program comprehension",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "17:1--17:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289138",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 17.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a17-blazy/",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cazenave:1998:SET,
  author =       "Tristan Cazenave",
  title =        "Synthesis of an efficient tactical theorem prover for
                 the game of go",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "18:1--18:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289139",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 18.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a18-cazenave/",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Consel:1998:TSS,
  author =       "C. Consel and L. Hornof and R. Marlet and G. Muller
                 and S. Thibault and E.-N. Volanschi and J. Lawall and
                 J. Noy{\'e}",
  title =        "{Tempo}: specializing systems applications and
                 beyond",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "19:1--19:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289140",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 19.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a19-consel/",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Consel:1998:PES,
  author =       "C. Consel and L. Hornof and R. Marlet and G. Muller
                 and S. Thibault and E.-N. Volanschi and J. Lawall and
                 J. Noy{\'e}",
  title =        "Partial evaluation for software engineering",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "20:1--20:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289141",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 20.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a20-consel/",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Draves:1998:PEM,
  author =       "Scott Draves",
  title =        "Partial evaluation for media processing",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "21:1--21:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289142",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 21.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a21-draves/",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dwyer:1998:UPE,
  author =       "Matthew Dwyer and John Hatcliff and Muhammad Nanda",
  title =        "Using partial evaluation to enable verification of
                 concurrent software",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "22:1--22:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289143",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 22.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a22-dwyer/",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Leone:1998:DSF,
  author =       "Mark Leone and Peter Lee",
  title =        "Dynamic specialization in the {Fabius} system",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "23:1--23:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289144",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 23.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a23-leone/",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Waddell:1998:VPE,
  author =       "Oscar Waddell and R. Kent Dybvig",
  title =        "Visualizing partial evaluation",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "24:1--24:??",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/289121.289145",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:06:21 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article 24.",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/a24-waddell/",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Liou:1998:TIM,
  author =       "Yuan Chang Liou and Yih Nen Jeng",
  title =        "A transfinite interpolation method of grid generation
                 based on multipoints",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "3es",
  pages =        "105--113",
  month =        sep,
  year =         "1998",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jan 4 05:41:38 MST 1999",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/p105-liou/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "performance",
  subject =      "{\bf G.1.1} Mathematics of Computing, NUMERICAL
                 ANALYSIS, Interpolation, Interpolation formulas. {\bf
                 G.1.8} Mathematics of Computing, NUMERICAL ANALYSIS,
                 Partial Differential Equations.",
}

@Article{Wegner:1998:AIb,
  author =       "Peter Wegner",
  title =        "About this issue\ldots{}",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "4",
  pages =        "411--411",
  month =        dec,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/299917.305493",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:07:07 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Agarwal:1998:EAG,
  author =       "Pankaj K. Agarwal and Micha Sharir",
  title =        "Efficient algorithms for geometric optimization",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "4",
  pages =        "412--458",
  month =        dec,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/299917.299918",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:07:07 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-4/p412-agarwal/",
  abstract =     "We review the recent progress in the design of
                 efficient algorithms for various problems in geometric
                 optimization. We present several techniques used to
                 attack these problems, such as parametric searching,
                 geometric alternatives to parametric searching,
                 prune-and-search techniques for linear programming and
                 related problems, and LP-type problems and their
                 efficient solution. We then describe a wide range of
                 applications of these and other techniques to numerous
                 problems in geometric optimization, including facility
                 location, proximity problems, statistical estimators
                 and metrology, placement and intersection of polygons
                 and polyhedra, and ray shooting and other query-type
                 problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; clustering; collision detection; design;
                 linear programming; matrix searching; parametric
                 searching; proximity problems; prune-and-search;
                 randomized algorithms",
  subject =      "{\bf F.2.2} Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Geometrical problems and
                 computations. {\bf A.1} General Literature,
                 INTRODUCTORY AND SURVEY. {\bf I.1.2} Computing
                 Methodologies, SYMBOLIC AND ALGEBRAIC MANIPULATION,
                 Algorithms, Analysis of algorithms.",
}

@Article{Wieringa:1998:SSO,
  author =       "Roel Wieringa",
  title =        "A survey of structured and object-oriented software
                 specification methods and techniques",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "4",
  pages =        "459--527",
  month =        dec,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/299917.299919",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:07:07 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-4/p459-wieringa/",
  abstract =     "This article surveys techniques used in structured and
                 object-oriented software specification methods. The
                 techniques are classified as techniques for the
                 specification of external interaction and internal
                 decomposition. The external specification techniques
                 are further subdivided into techniques for the
                 specification of functions, behavior, and
                 communication. After surveying the techniques, we
                 summarize the way they are used in structured and
                 object-oriented methods and indicate ways in which they
                 can be combined. This article ends with a plea for
                 simplicity in diagram techniques and for the use of
                 formal semantics to define these techniques. The
                 appendices show how the reviewed techniques are used in
                 6 structured and 19 object-oriented specification
                 methods.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design; languages",
  subject =      "{\bf D.2.1} Software, SOFTWARE ENGINEERING,
                 Requirements/Specifications, Tools. {\bf D.2.2}
                 Software, SOFTWARE ENGINEERING, Design Tools and
                 Techniques, Object-oriented design methods. {\bf D.2.2}
                 Software, SOFTWARE ENGINEERING, Design Tools and
                 Techniques, State diagrams.",
}

@Article{Crestani:1998:DRL,
  author =       "Fabio Crestani and Mounia Lalmas and Cornelis J. {Van
                 Rijsbergen} and Iain Campbell",
  title =        "{``Is} this document relevant? \ldots{} probably'': a
                 survey of probabilistic models in information
                 retrieval",
  journal =      j-COMP-SURV,
  volume =       "30",
  number =       "4",
  pages =        "528--552",
  month =        dec,
  year =         "1998",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/299917.299920",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:07:07 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-4/p528-crestani/",
  abstract =     "This article surveys probabilistic approaches to
                 modeling information retrieval. The basic concepts of
                 probabilistic approaches to information retrieval are
                 outlined and the principles and assumptions upon which
                 the approaches are based are presented. The various
                 models proposed in the development of IR are described,
                 classified, and compared using a common formalism. New
                 approaches that constitute the basis of future research
                 are described.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithms; information retrieval; probabilistic
                 indexing; probabilistic modeling; probabilistic
                 retrieval; theory; uncertain inference modeling",
  subject =      "{\bf H.3.3} Information Systems, INFORMATION STORAGE
                 AND RETRIEVAL, Information Search and Retrieval,
                 Retrieval models. {\bf H.3.1} Information Systems,
                 INFORMATION STORAGE AND RETRIEVAL, Content Analysis and
                 Indexing, Indexing methods.",
}

@Article{Gartner:1999:FFT,
  author =       "Felix C. G{\"a}rtner",
  title =        "Fundamentals of fault-tolerant distributed computing
                 in asynchronous environments",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "1",
  pages =        "1--26",
  month =        mar,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/311531.311532",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:07:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-1/p1-gartner/",
  abstract =     "Fault tolerance in distributed computing is a wide
                 area with a significant body of literature that is
                 vastly diverse in methodology and terminology. This
                 paper aims at structuring the area and thus guiding
                 readers into this interesting field. We use a formal
                 approach to define important terms like {\em fault},
                 {\em fault tolerance}, and {\em redundancy}. This leads
                 to four distinct forms of fault tolerance and to two
                 main phases in achieving them: {\em detection\/} and
                 {\em correction}. We show that this can help to reveal
                 inherently fundamental structures that contribute to
                 understanding and unifying methods and terminology. By
                 doing this, we survey many existing methodologies and
                 discuss their relations. The underlying system model is
                 the close-to-reality asynchronous message-passing model
                 of distributed computing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Algorithms; Design; Reliability; Theory",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "agreement problem; algorithms; asynchronous system;
                 consensus problem; design; failure correction; failure
                 detection; fault models; fault tolerance; liveness;
                 message passing; possibility detection; predicate
                 detection; redundancy; reliability; safety; theory",
  subject =      "General Literature --- Introductory and Survey (A.1);
                 Computer Systems Organization --- Performance of
                 Systems (C.4): {\bf Modeling techniques}; Computer
                 Systems Organization --- Performance of Systems (C.4):
                 {\bf Reliability, availability, and serviceability}",
}

@Article{Liu:1999:DDL,
  author =       "Mengchi Liu",
  title =        "Deductive database languages: problems and solutions",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "1",
  pages =        "27--62",
  month =        mar,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/311531.311533",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:07:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-1/p27-liu/",
  abstract =     "Deductive databases result from the integration of
                 relational database and logic programming techniques.
                 However, significant problems remain inherent in this
                 simple synthesis from the language point of view. In
                 this paper, we discuss these problems from four
                 different aspects: complex values, object orientation,
                 higher-orderness, and updates. In each case, we examine
                 four typical languages that address the corresponding
                 issues.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Languages; Theory",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "complex object databases; deductive databases;
                 inheritance; logic programming; nested relational
                 databases; object-oriented databases",
  subject =      "Information Systems --- Database Management ---
                 Languages (H.2.3): {\bf Data description languages
                 (DDL)}; Information Systems --- Database Management ---
                 Languages (H.2.3): {\bf Data manipulation languages
                 (DML)}; Information Systems --- Database Management ---
                 Languages (H.2.3): {\bf Query languages}; Information
                 Systems --- Database Management --- Languages (H.2.3):
                 {\bf Database (persistent) programming languages};
                 Information Systems --- Database Management --- Logical
                 Design (H.2.1): {\bf Data models}; Information Systems
                 --- Database Management --- Logical Design (H.2.1):
                 {\bf Schema and subschema}; Computing Methodologies ---
                 Artificial Intelligence --- Deduction and Theorem
                 Proving (I.2.3): {\bf Deduction}; Computing
                 Methodologies --- Artificial Intelligence --- Deduction
                 and Theorem Proving (I.2.3): {\bf Logic programming};
                 Computing Methodologies --- Artificial Intelligence ---
                 Deduction and Theorem Proving (I.2.3): {\bf
                 Nonmonotonic reasoning and belief revision}; Computing
                 Methodologies --- Artificial Intelligence --- Knowledge
                 Representation Formalisms and Methods (I.2.4): {\bf
                 Representation languages}; Software --- Programming
                 Techniques --- Object-oriented Programming (D.1.5);
                 Software --- Programming Languages --- Language
                 Classifications (D.3.2); Theory of Computation ---
                 Mathematical Logic and Formal Languages ---
                 Mathematical Logic (F.4.1): {\bf Logic and constraint
                 programming}; Software --- Programming Techniques ---
                 Logic Programming (D.1.6)",
}

@Article{Paton:1999:ADS,
  author =       "Norman W. Paton and Oscar D{\'\i}az",
  title =        "Active database systems",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "1",
  pages =        "63--103",
  month =        mar,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/311531.311623",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:07:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-1/p63-paton/",
  abstract =     "Active database systems support mechanisms that enable
                 them to respond automatically to events that are taking
                 place either inside or outside the database system
                 itself. Considerable effort has been directed towards
                 improving understanding of such systems in recent
                 years, and many different proposals have been made and
                 applications suggested. This high level of activity has
                 not yielded a single agreed-upon standard approach to
                 the integration of active functionality with
                 conventional database systems, but has led to improved
                 understanding of active behavior description languages,
                 execution models, and architectures. This survey
                 presents the fundamental characteristics of active
                 database systems, describes a collection of
                 representative systems within a common framework,
                 considers the consequences for implementations of
                 certain design decisions, and discusses tools for
                 developing active applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Languages",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "active databases; events; object-oriented databases;
                 relational databases",
  subject =      "Information Systems --- Database Management ---
                 Languages (H.2.3)",
}

@Article{Mills:1999:IESa,
  author =       "Kevin L. Mills",
  title =        "Introduction to the {Electronic Symposium on
                 Computer-Supported Cooperative Work}",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2",
  pages =        "105--115",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/319806.319810",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:02 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2/p105-mills/p105-mills.pdf;
                 http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a1-mills/a1-mills.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2/p105-mills/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2/p105-mills/#abstract;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2/p105-mills/#indterms;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a1-mills/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a1-mills/#abstract",
  abstract =     "Computer-supported cooperative work (CSCW) holds great
                 importance and promise for modern society. This paper
                 provides an overview of seventeen papers comprising a
                 symposium on CSCW. The overview also discusses some
                 relationships among the contributions made by each
                 paper, and places those contributions into a larger
                 context by identifying some of the key challenges faced
                 by computer science researchers who aim to help us work
                 effectively as teams mediated through networks of
                 computers. The paper also describes why the promise of
                 CSCW holds particular salience for the U.S. military.
                 In the context of a military setting, the paper
                 describes five particular challenges for CSCW
                 researchers. While most of these challenges might seem
                 specific to military environments, many others probably
                 already face similar challenges, or soon will, when
                 attempting to collaborate through networks of
                 computers. To support this claim, the paper includes a
                 military scenario that might hit fairly close to home
                 for many, and certainly for civilian emergency response
                 personnel. After discussing the military needs for
                 collaboration technology, the paper briefly outlines
                 for motivation for a recent DARPA research program
                 along these lines. That program, called Intelligent
                 Collaboration and Visualization, sponsored the work
                 reported in this symposium.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "asynchronous collaboration; computer-supported
                 collaborative work; human-computer interaction;
                 information management; multimedia collaboration;
                 multimodal collaboration",
  subject =      "Information Systems --- Information Interfaces and
                 Presentation --- Group and Organization Interfaces
                 (H.5.3): {\bf Computer-supported cooperative work};
                 Computer Applications --- Administrative Data
                 Processing (J.1): {\bf Military}",
}

@Article{Anonymous:1999:TCE,
  author =       "Anonymous",
  title =        "Table of Contents: Electronic Symposium on
                 Computer-Supported Cooperative Work",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2",
  pages =        "116--116",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Apr 05 06:17:51 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "These articles are only available electronically, and
                 are cited as volume 31, number 2es.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jing:1999:CSC,
  author =       "Jin Jing and Abdelsalam Sumi Helal and Ahmed
                 Elmagarmid",
  title =        "Client-server computing in mobile environments",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2",
  pages =        "117--157",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/319806.319814",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:02 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2/p117-jing/p117-jing.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2/p117-jing/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2/p117-jing/#abstract;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2/p117-jing/#indterms",
  abstract =     "Recent advances in wireless data networking and
                 portable information appliances have engendered a new
                 paradigm of computing, called {\em mobile computing},
                 in which users carrying portable devices have access to
                 data and information services regardless of their
                 physical location or movement behavior. In the
                 meantime, research addressing information access in
                 mobile environments has proliferated. In this survey,
                 we provide a concrete framework and categorization of
                 the various ways of supporting mobile client-server
                 computing for information access. We examine
                 characteristics of mobility that distinguish mobile
                 client-server computing from its traditional
                 counterpart. We provide a comprehensive analysis of new
                 paradigms and enabler concepts for mobile client-server
                 computing, including mobile-aware adaptation, extended
                 client-server model, and mobile data access. A
                 comparative and detailed review of major research
                 prototypes for mobile information access is also
                 presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Algorithms; Design; Experimentation",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "application adaptation; cache invalidation; caching;
                 client/server; data dissemination; disconnected
                 operation; mobile applications; mobile client/server;
                 mobile computing; mobile data; mobility awareness;
                 survey; system application",
  subject =      "Computer Systems Organization ---
                 Computer-Communication Networks --- Distributed Systems
                 (C.2.4): {\bf Client/server}; Computer Systems
                 Organization --- Computer-Communication Networks ---
                 Distributed Systems (C.2.4); Computer Systems
                 Organization --- Computer-Communication Networks ---
                 Network Architecture and Design (C.2.1): {\bf Wireless
                 communication}",
}

%%% ====================================================================
%%% Volume 31, number 2es is an electronic supplement that is published
%%% online at the indicated URLs; the table of contents entries in
%%% number 1 lists these short articles, but the paper issue of the
%%% journal itself does not contain them.  They have no assigned page
%%% numbers, so they are listed in citation label order here.
%%% ====================================================================
@Article{Salzberg:1999:CAM,
  author =       "Betty Salzberg and Vassilis J. Tsotras",
  title =        "Comparison of access methods for time-evolving data",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2",
  pages =        "158--221",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/319806.319816",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:02 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2/p158-salzberg/p158-salzberg.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2/p158-salzberg/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2/p158-salzberg/#abstract;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2/p158-salzberg/#indterms",
  abstract =     "This paper compares different indexing techniques
                 proposed for supporting efficient access to temporal
                 data. The comparison is based on a collection of
                 important performance criteria, including the space
                 consumed, update processing, and query time for
                 representative queries. The comparison is based on
                 worst-case analysis, hence no assumptions on data
                 distribution or query frequencies are made. When a
                 number of methods have the same asymptotic worst-case
                 behavior, features in the methods that affect average
                 case behavior are discussed. Additional criteria
                 examined are the pagination of an index, the ability to
                 cluster related data together, and the ability to
                 efficiently separate old from current data (so that
                 larger archival storage media such as write-once
                 optical disks can be used). The purpose of the paper is
                 to identify the difficult problems in accessing
                 temporal data and describe how the different methods
                 aim to solve them. A general lower bound for answering
                 basic temporal queries is also introduced.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Management; Performance",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "access methods; I/O performance; structures; temporal
                 databases",
  subject =      "Information Systems --- Database Management ---
                 Physical Design (H.2.2): {\bf Access methods};
                 Information Systems --- Information Storage and
                 Retrieval --- Content Analysis and Indexing (H.3.1):
                 {\bf Indexing methods}",
}

@Article{Mills:1999:IESb,
  author =       "Kevin L. Mills",
  title =        "Introduction to the {Electronic Symposium} on
                 {Computer-Supported Cooperative Work}",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "1:1--1:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/319806.319810",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Computer-supported cooperative work (CSCW) holds great
                 importance and promise for modern society. This paper
                 provides an overview of seventeen papers comprising a
                 symposium on CSCW. The overview also discusses some
                 relationships among the contributions made by each
                 paper, and places those contributions into a larger
                 context by identifying some of the key challenges faced
                 by computer science researchers who aim to help us work
                 effectively as teams mediated through networks of
                 computers. The paper also describes why the promise of
                 CSCW holds particular salience for the U.S. military.
                 In the context of a military setting, the paper
                 describes five particular challenges for CSCW
                 researchers. While most of these challenges might seem
                 specific to military environments, many others probably
                 already face similar challenges, or soon will, when
                 attempting to collaborate through networks of
                 computers. To support this claim, the paper includes a
                 military scenario that might hit fairly close to home
                 for many, and certainly for civilian emergency response
                 personnel. After discussing the military needs for
                 collaboration technology, the paper briefly outlines
                 for motivation for a recent DARPA research program
                 along these lines. That program, called Intelligent
                 Collaboration and Visualization, sponsored the work
                 reported in this symposium.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "asynchronous collaboration; computer-supported
                 collaborative work; human-computer interaction;
                 information management; multimedia collaboration;
                 multimodal collaboration",
}

@Article{McCanne:1999:MES,
  author =       "Steven McCanne and Eric Brewer and Randy Katz and Elan
                 Amir and Yatin Chawathe and Todd Hodes and Ketan
                 Mayer-Patel and Suchitra Raman and Cynthia Romer and
                 Angela Schuett and Andrew Swan and Teck-Lee Tung and
                 Tina Wong and Kristin Wright",
  title =        "{MASH}: enabling scalable multipoint collaboration",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "2:1--2:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/319806.319814",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a2-mccanne/a2-mccanne.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a2-mccanne/",
  abstract =     "Recent advances in wireless data networking and
                 portable information appliances have engendered a new
                 paradigm of computing, called mobile computing, in
                 which users carrying portable devices have access to
                 data and information services regardless of their
                 physical location or movement behavior. In the
                 meantime, research addressing information access in
                 mobile environments has proliferated. In this survey,
                 we provide a concrete framework and categorization of
                 the various ways of supporting mobile client-server
                 computing for information access. We examine
                 characteristics of mobility that distinguish mobile
                 client-server computing from its traditional
                 counterpart. We provide a comprehensive analysis of new
                 paradigms and enabler concepts for mobile client-server
                 computing, including mobile-aware adaptation, extended
                 client-server model, and mobile data access. A
                 comparative and detailed review of major research
                 prototypes for mobile information access is also
                 presented.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "application adaptation; cache invalidation; caching;
                 client/server; data dissemination; disconnected
                 operation; mobile applications; mobile client/server;
                 mobile computing; mobile data; mobility awareness;
                 survey; system application",
}

@Article{Dao:1999:SMI,
  author =       "Son Dao and Eddie Shek and Asha Vellaikal and Richard
                 R. Muntz and Lixia Zhang and Miodrag Potkonjak and Ouri
                 Wolfson",
  title =        "Semantic multicast: intelligently sharing
                 collaborative sessions",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "3:1--3:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323221",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a3-dao/a3-dao.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a3-dao/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a3-dao/#abstract;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a3-dao/#indterms",
  abstract =     "We introduce the concept of semantic multicast to
                 implement a large-scale shared interaction
                 infrastructure providing mechanisms for collecting,
                 indexing, and disseminating the information produced in
                 collaborative sessions. This infrastructure captures
                 the interactions between users (as video, text, audio
                 and other data streams) and promotes a philosophy of
                 filtering, archiving, and correlating collaborative
                 sessions in user and context sensitive groupings. The
                 semantic multicast service efficiently disseminates
                 relevant information to every user engaged in the
                 collaborative session, making the aggregated streams of
                 the collaborative session available to the correct
                 users at the right amount of detail. This contextual
                 focus is accomplished by introducing proxy servers to
                 gather, annotate, and filter the streams appropriate
                 for specific interest groups. Users are subscribed to
                 appropriate proxies, based on their profiles, and the
                 collaborative session becomes a multi-level multicast
                 of data from sources through proxies and to user
                 interest groups.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "access methods; I/O performance; structures; temporal
                 databases",
  subject =      "Categories and Subject Descriptors: Information
                 Systems --- Information Storage and Retrieval (H.3);
                 Information Systems --- Information Storage and
                 Retrieval --- Content Analysis and Indexing (H.3.1):
                 Abstracting methods; Information Systems ---
                 Information Storage and Retrieval --- Content Analysis
                 and Indexing (H.3.1): Indexing methods; Information
                 Systems --- Information Storage and Retrieval ---
                 Information Search and Retrieval (H.3.3): Clustering;
                 Information Systems --- Information Storage and
                 Retrieval --- Information Search and Retrieval (H.3.3):
                 Information filtering; Information Systems ---
                 Information Storage and Retrieval --- Information
                 Search and Retrieval (H.3.3): Relevance feedback;
                 Information Systems --- Information Storage and
                 Retrieval --- Systems and Software (H.3.4): Distributed
                 systems; Information Systems --- Information Storage
                 and Retrieval --- Systems and Software (H.3.4): User
                 profiles and alert services",
}

@Article{Marsic:1999:DFM,
  author =       "Ivan Marsic",
  title =        "{DISCIPLE}: a framework for multimodal collaboration
                 in heterogeneous environments",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "4:1--4:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323225",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a4-marsic/a4-marsic.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a4-marsic/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a4-marsic/#abstract;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a4-marsic/#indterms",
  abstract =     "This paper presents a framework for sharing JavaBeans
                 applications in real-time synchronous collaboration. A
                 generic collaboration bus provides a plug-and-play
                 environment that enables collaboration with
                 applications that may or may not be collaboration
                 aware. Research on knowledge-based quality-of-service
                 management and multimodel human/machine interface is
                 described.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "CSCW frameworks; group communication; JavaBeans;
                 multimodal interface; shared electronic workspaces;
                 synchronous groupware",
  subject =      "Information Systems --- Information Interfaces and
                 Presentation --- User Interfaces (H.5.2); Information
                 Systems --- Information Interfaces and Presentation ---
                 Group and Organization Interfaces (H.5.3); Software ---
                 Software Engineering --- Design Tools and Techniques
                 (D.2.2); Computer Systems Organization ---
                 Computer-Communication Networks --- Distributed Systems
                 (C.2.4); General Terms: Design, Human Factors",
}

@Article{Reed:1999:OVC,
  author =       "Daniel A. Reed and Simon M. Kaplan",
  title =        "{Orbit\slash Virtue}: collaboration and visualization
                 toolkits",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "5:1--5:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323226",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a5-reed/a5-reed.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a5-reed/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a5-reed/#indterms",
  abstract =     "In distributed collaborative virtual environments,
                 participants are often embodied or represented in some
                 form within a virtual world. The representations take
                 many different forms and are often driven by
                 limitations in the available technology. Desktop Web
                 based environments typically use textual or two
                 dimensional representations, while high end
                 environments use motion trackers to embody a
                 participant and their actions in an avatar or human
                 form. This paper describes this wide range of virtual
                 user representations and their creation and performance
                 issues investigated as part of the Human-Computer
                 Symbiotes project within DARPA's Intelligent
                 Collaboration and Visualization (IC and V) program.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Martin:1999:CPA,
  author =       "Kevin Martin",
  title =        "Creation and performance analysis of user
                 representations in collaborative virtual environments",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "6:1--6:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323227",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a6-martin/a6-martin.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a6-martin/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a6-martin/#abstract",
  abstract =     "In distributed collaborative virtual environments,
                 participants are often embodied or represented in some
                 form within a virtual world. The representations take
                 many different forms and are often driven by
                 limitations in the available technology. Desktop Web
                 based environments typically use textual or two
                 dimensional representations, while high end
                 environments use motion trackers to embody a
                 participant and their actions in an avatar or human
                 form. This paper describes this wide range of virtual
                 user representations and their creation and performance
                 issues investigated as part of the Human-Computer
                 Symbiotes project within DARPA's Intelligent
                 Collaboration and Visualization (IC\&V) program.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kubala:1999:RMR,
  author =       "Francis Kubala and Sean Colbath and Daben Liu and John
                 Makhoul",
  title =        "{Rough'n'Ready}: a meeting recorder and browser",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "7:1--7:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323354",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a7-kubala/a7-kubala.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a7-kubala/",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Payton:1999:DCD,
  author =       "David Payton and Mike Daily and Kevin Martin",
  title =        "Dynamic collaborator discovery in information
                 intensive environments",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "8:1--8:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323355",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a8-payton/a8-payton.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a8-payton/",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wactlar:1999:IED,
  author =       "Howard D. Wactlar and Michael G. Christel and
                 Alexander G. Hauptmann and Yihong Gong",
  title =        "{Informedia Experience-on-Demand}: capturing,
                 integrating and communicating experiences across
                 people, time and space",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "9:1--9:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323356",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a9-wactlar/a9-wactlar.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a9-wactlar/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a9-wactlar/#abstract",
  abstract =     "The Informedia Experience-on-Demand system uses
                 speech, image, and natural language processing combined
                 with GPS information to capture, integrate, and
                 communicate personal multimedia experiences. This paper
                 discusses in initial prototype of the EOD system.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "audio; multimedia information systems; video and
                 location content analysis",
}

@Article{Wolverton:1999:TBI,
  author =       "Michael Wolverton",
  title =        "Task-based information management",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "10:1--10:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323357",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a10-wolverton/a10-wolverton.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a10-wolverton/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a10-wolverton/#abstract",
  abstract =     "Effective collaboration in fast-changing environment
                 can put great demands on a collaborator's time.
                 Therefore, information retrieval and filtering tools
                 for these environments should impose as little on that
                 time as possible. Not only should they exclude as many
                 irrelevant documents as possible from those presented
                 to the user (to avoid the time wasted sorting through
                 and reading those documents), they should also minimize
                 the user's effort in characterizing his or her
                 information needs. The goal of the Task-based
                 Information Distribution Environment (TIDE) system is
                 to achieve these objectives by explicitly representing
                 each collaborator's current task and using those
                 representations to deliver documents that meet the
                 information needs implied by those tasks. It does this
                 by treating information gathering as a diagnosis
                 problem, in which the situation (i.e., the current
                 state of beliefs about various questions related to a
                 task) leads probabilistically to test that will provide
                 the most evidence toward reaching a diagnosis (i.e., a
                 description of the documents most likely to be useful
                 to that task). It encodes tasks as nodes in a Bayesian
                 network, and computes document descriptions based on
                 the probabilistic relationship among tasks and their
                 corresponding information requirements.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Morris:1999:IIC,
  author =       "James H. Morris and Christine M. Neuwirth and Susan
                 Harkness Regli and Ravinder Chandhok and Geoffrey C.
                 Wenger",
  title =        "Interface issues in computer support for asynchronous
                 communication",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "11:1--11:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323358",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a11-morris/a11-morris.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a11-morris/",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jackson:1999:ISA,
  author =       "Larry S. Jackson and Ed Grossman",
  title =        "Integration of synchronous and asynchronous
                 collaboration activities",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "12:1--12:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323359",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a12-jackson/a12-jackson.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a12-jackson/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a12-jackson/#abstract",
  abstract =     "The integrated synchronous and asynchronous
                 collaboration (ISAAC) project [1] is constructing a
                 communication and collaboration system to bridge
                 traditional workgroup barriers of time and space.
                 Possible applications include military command and
                 control, corporate real-time collaboration, and
                 distributed teams of research scientists. Thus, this
                 system must host the widest possible range of
                 applications, and must run on heterogeneous hardware.
                 ISAAC incorporates real-time (synchronous)
                 collaboration technologies developed by the
                 Habanero{\reg} project [2,3] at the National Center for
                 Supercomputing Applications at the University of
                 Illinois Urbana-Champaign, with asynchronous
                 extensions. ISAAC research is aimed at moving
                 information between synchronous and asynchronous modes.
                 ISAAC's session capture conceptually transforms a
                 real-time multiple tool collaboration into multimedia
                 document, which can be analyzed and reused by other
                 programs. Automated segmentation and indexing of
                 captured audio and videoteleconference traffic adds
                 further information.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rees:1999:CMD,
  author =       "Jonathan Rees and Sarah Ferguson and Sankar
                 Virdhagriswaran",
  title =        "Consistency management for distributed collaboration",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "13:1--13:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323360",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a13-rees/a13-rees.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a13-rees/",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Thompson:1999:IAI,
  author =       "Craig Thompson and Paul Pazandak and Venu Vasudevan
                 and Frank Manola and Mark Palmer and Gil Hansen and Tom
                 Bannon",
  title =        "Intermediary Architecture: {Interposing} middleware
                 object services between {Web} client and server",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "14:1--14:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323361",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a14-thompson/a14-thompson.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a14-thompson/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a14-thompson/#abstract;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a14-thompson/#indterms",
  abstract =     "This paper describes the Intermediary Architecture, a
                 middleware architecture which interposes distributed
                 object services between Web client and server. The
                 architecture extends current Web architectures with a
                 new kind of plug-in, making a new collection of Web
                 applications easier to develop. Example services
                 including Web annotations and Web performance
                 monitoring are described.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "annotations; distributed objects; object request
                 brokers; World Wide Web",
  subject =      "Information Systems --- Information Storage and
                 Retrieval --- Systems and Software (H.3.4): Information
                 networks",
}

@Article{Damianos:1999:ECS,
  author =       "Laurie Damianos and Lynette Hirschman and Robyn
                 Kozierok and Jeffrey Kurtz and Andrew Greenberg and
                 Kimberley Walls and Sharon Laskowski and Jean Scholtz",
  title =        "Evaluation for collaborative systems",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "15:1--15:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323362",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a15-damianos/a15-damianos.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a15-damianos/",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ranganathan:1999:RCD,
  author =       "M. Ranganathan and Laurent Andrey and Virginie Schaal
                 and Jean-Philippe Favreau",
  title =        "Re-configurable distributed scripting",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "16:1--16:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323363",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a16-ranganathan/a16-ranganathan.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a16-ranganathan/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a16-ranganathan/#abstract",
  abstract =     "Several distributed testing, control and collaborative
                 applications are reactive or event driven in nature.
                 Such applications can be structured as a set of
                 handlers that react to events and that in turn can
                 trigger other events. We have developed an application
                 building toolkit that facilitates development of such
                 applications. Our system is based on the concept of
                 Mobile Streams. Applications developed in our system
                 are dynamically extensible and re-configurable and our
                 system provides the application designer a mechanism to
                 control extension and re-configuration. We describe our
                 system model and give examples of its use.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bayer:1999:MMM,
  author =       "Samuel Bayer and Laurie E. Damianos and Robyn Kozierok
                 and James Mokwa",
  title =        "The {MITRE Multi-Modal Logger}: its use in evaluation
                 of collaborative systems",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "17:1--17:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323364",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a17-bayer/a17-bayer.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a17-bayer/",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kurtz:1999:MMN,
  author =       "Jeffrey L. Kurtz and Laurie E. Damianos and Robyn
                 Kozierok and Lynette Hirschman",
  title =        "The {MITRE} map navigation experiment",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "2es",
  pages =        "18:1--18:??",
  month =        jun,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/323216.323365",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-2es/a18-kurtz/a18-kurtz.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-2es/a18-kurtz/",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Degano:1999:CSEa,
  author =       "P. Degano and R. Gorrieri and A. Marchetti-Spaccamela
                 and P. Wegner",
  title =        "{Computing Surveys' Electronic Symposium on the Theory
                 of Computation}",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3",
  pages =        "223--225",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/331499.382387",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:57 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a1-degano/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Anonymous:1999:STC,
  author =       "Anonymous",
  title =        "Symposium on the Theory of Computation: Table of
                 Contents",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3",
  pages =        "226--226",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 28 17:54:34 MDT 2000",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/contents/journals/surveys/1999-31",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fraternali:1999:TAD,
  author =       "Piero Fraternali",
  title =        "Tools and approaches for developing data-intensive
                 {Web} applications: a survey",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3",
  pages =        "227--263",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/331499.331502",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:57 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-3/p227-fraternali/p227-fraternali.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-3/p227-fraternali/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-3/p227-fraternali/#indterms",
  abstract =     "The exponential growth and capillar diffusion of the
                 Web are nurturing a novel generation of applications,
                 characterized by a direct business-to-customer
                 relationship. The development of such applications is a
                 hybrid between traditional IS development and
                 Hypermedia authoring, and challenges the existing tools
                 and approaches for software production. This paper
                 investigates the current situation of Web development
                 tools, both in the commercial and research fields, by
                 identifying and characterizing different categories of
                 solutions, evaluating their adequacy to the
                 requirements of Web application development,
                 enlightening open problems, and exposing possible
                 future trends.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Design; Experimentation; Languages; Reliability",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "application; development; HTML; Intranet; WWW",
  subject =      "Information Systems --- Information Interfaces and
                 Presentation --- Hypertext/Hypermedia (H.5.4); Software
                 --- Software Engineering --- Design Tools and
                 Techniques (D.2.2); General Terms: Design,
                 Experimentation, Languages, Reliability",
}

%%% ====================================================================
%%% Volume 31, number 3es is an electronic supplement that is published
%%% online at the indicated URLs; the table of contents entries in
%%% number 3 lists these short articles, but the paper issue of the
%%% journal itself does not contain them.  They have no assigned page
%%% numbers, so they are listed in table-of-contents order here.
%%% ====================================================================
@Article{Jain:1999:DCR,
  author =       "A. K. Jain and M. N. Murty and P. J. Flynn",
  title =        "Data clustering: a review",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3",
  pages =        "264--323",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/331499.331504",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:08:57 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-3/p264-jain/p264-jain.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-3/p264-jain/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-3/p264-jain/#indterms",
  abstract =     "Clustering is the unsupervised classification of
                 patterns (observations, data items, or feature vectors)
                 into groups (clusters). The clustering problem has been
                 addressed in many contexts and by researchers in many
                 disciplines; this reflects its broad appeal and
                 usefulness as one of the steps in exploratory data
                 analysis. However, clustering is a difficult problem
                 combinatorially, and differences in assumptions and
                 contexts in different communities has made the transfer
                 of useful generic concepts and methodologies slow to
                 occur. This paper presents an overview of pattern
                 clustering methods from a statistical pattern
                 recognition perspective, with a goal of providing
                 useful advice and references to fundamental concepts
                 accessible to the broad community of clustering
                 practitioners. We present a taxonomy of clustering
                 techniques, and identify cross-cutting themes and
                 recent advances. We also describe some important
                 applications of clustering algorithms such as image
                 segmentation, object recognition, and information
                 retrieval.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Algorithms",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "cluster analysis; clustering applications; exploratory
                 data analysis; incremental clustering; similarity
                 indices; unsupervised learning",
  subject =      "Computing Methodologies --- Pattern Recognition ---
                 Models (I.5.1); Computing Methodologies --- Pattern
                 Recognition --- Clustering (I.5.3); Computing
                 Methodologies --- Pattern Recognition --- Applications
                 (I.5.4): {\bf Computer vision}; Information Systems ---
                 Information Storage and Retrieval --- Information
                 Search and Retrieval (H.3.3): {\bf Clustering};
                 Computing Methodologies --- Artificial Intelligence ---
                 Learning (I.2.6): {\bf Knowledge acquisition}",
}

@Article{Degano:1999:CSEb,
  author =       "P. Degano and R. Gorrieri and A. Marchetti-Spaccamela
                 and P. Wegner",
  title =        "Computing surveys' electronic symposium on the theory
                 of computation",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "1:1--1:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/331499.382387",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Noltemeier:1999:NDI,
  author =       "H. Noltemeier and H.-C. Wirth and S. O. Krumke",
  title =        "Network design and improvement",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "2:1--2:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/331499.331502",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The exponential growth and capillar diffusion of the
                 Web are nurturing a novel generation of applications,
                 characterized by a direct business-to-customer
                 relationship. The development of such applications is a
                 hybrid between traditional IS development and
                 Hypermedia authoring, and challenges the existing tools
                 and approaches for software production. This paper
                 investigates the current situation of Web development
                 tools, both in the commercial and research fields, by
                 identifying and characterizing different categories of
                 solutions, evaluating their adequacy to the
                 requirements of Web application development,
                 enlightening open problems, and exposing possible
                 future trends.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "application; development; HTML; Intranet; WWW",
}

@Article{Cattaneo:1999:AE,
  author =       "Giuseppe Cattaneo and Giuseppe Italiano",
  title =        "Algorithm engineering",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "3:1--3:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/331499.331504",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a3-cattaneo/",
  abstract =     "Clustering is the unsupervised classification of
                 patterns (observations, data items, or feature vectors)
                 into groups (clusters). The clustering problem has been
                 addressed in many contexts and by researchers in many
                 disciplines; this reflects its broad appeal and
                 usefulness as one of the steps in exploratory data
                 analysis. However, clustering is a difficult problem
                 combinatorially, and differences in assumptions and
                 contexts in different communities has made the transfer
                 of useful generic concepts and methodologies slow to
                 occur. This paper presents an overview of pattern
                 clustering methods from a statistical pattern
                 recognition perspective, with a goal of providing
                 useful advice and references to fundamental concepts
                 accessible to the broad community of clustering
                 practitioners. We present a taxonomy of clustering
                 techniques, and identify cross-cutting themes and
                 recent advances. We also describe some important
                 applications of clustering algorithms such as image
                 segmentation, object recognition, and information
                 retrieval.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "cluster analysis; clustering applications; exploratory
                 data analysis; incremental clustering; similarity
                 indices; unsupervised learning",
}

@Article{Albers:1999:LA,
  author =       "Susanne Albers and Stefano Leonardi",
  title =        "On-line algorithms",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "4:1--4:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/333580.333583",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a4-albers/",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hankin:1999:PAG,
  author =       "Chris Hankin and Pasquale Malacaria",
  title =        "Program analysis games",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "5:1--5:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/333580.333584",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a5-hankin/",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cousot:1999:DRA,
  author =       "Patric Cousot",
  title =        "Directions for research in approximate system
                 analysis",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "6:1--6:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/333580.333585",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a6-cousot/",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bernardo:1999:LEP,
  author =       "Marco Bernardo",
  title =        "Let's evaluate performance algebraically",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "7:1--7:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/333580.333586",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a7-bernardo/",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hromkovic:1999:SCS,
  author =       "Juraj Hromkovi{\v{c}}",
  title =        "Some contributions of the study of abstract
                 communication complexity to other areas of computer
                 science",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "8:1--8:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/333580.333587",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a8-hromkovic/",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ehrig:1999:GRG,
  author =       "Hartmut Ehrig and Gabriele Taentzer",
  title =        "Graphical representation and graph transformation",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "9:1--9:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/333580.333588",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a9-ehrig/",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sannella:1999:AMS,
  author =       "Donald Sannella and Andrzei Tarlecki",
  title =        "Algebraic methods for specification and formal
                 development of programs",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "10:1--10:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/333580.333589",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a10-sannella/",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Miller:1999:FAS,
  author =       "Dale Miller and Catuscia Palmidessi",
  title =        "Foundational aspects of syntax",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "11:1--11:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/333580.333590",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a11-miller/",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Giammarresi:1999:EFL,
  author =       "Dora Giammarresi and Antonio Restivo",
  title =        "Extending formal language hierarchies to higher
                 dimensions",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "12:1--12:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/333580.333591",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a12-giammarresi/",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Priami:1999:OMT,
  author =       "Corrado Priami",
  title =        "Operational methods in theoretical computer science",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "13:1--13:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/333580.333592",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a13-priami/",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Honda:1999:SSR,
  author =       "Kohei Honda",
  title =        "Semantics study and reality of computing",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "14:1--14:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/333580.333593",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a14-honda/",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Freivalds:1999:HSF,
  author =       "Rusins Freivalds",
  title =        "How to simulate free will in a computational device",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "15:1--15:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/333580.333594",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a15-freivalds/",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wiedermann:1999:SMG,
  author =       "Jiri Wiedermann",
  title =        "Simulating the mind: a gauntlet thrown to computer
                 science",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "3es",
  pages =        "16:1--16:??",
  month =        sep,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/333580.333595",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-3es/a16-wiedermann/",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ashman:1999:CSEa,
  author =       "Helen Ashman and Rosemary Michelle Simpson",
  title =        "{Computing Surveys' Electronic Symposium on Hypertext
                 and Hypermedia}: {Editorial}",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4",
  pages =        "325--334",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/344588.344596",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:50 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/1999-31-4es/a1-ashman/a1-ashman.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-4/p325-ashman/;
                 http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a1-ashman/",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Computing Methodologies --- Artificial Intelligence
                 --- General (I.2.0)",
}

@Article{Antoniou:1999:TDL,
  author =       "Grigoris Antoniou",
  title =        "A tutorial on default logics",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4",
  pages =        "337--359",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/344588.344602",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:50 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4/p337-antoniou/",
  abstract =     "Default logic is one of the most prominent approaches
                 to nonmonotonic reasoning, and allows one to make
                 plausible conjectures when faced with incomplete
                 information about the problem at hand. Default rules
                 prevail in many application domains such as medical and
                 legal reasoning.\par

                 Several variants have been developed over the past
                 year, either to overcome some perceived deficiencies of
                 the original presentation, or to realize somewhat
                 different intuitions. This paper provides a
                 tutorial-style introduction to some important
                 approaches of Default Logic. The presentation is based
                 on operational models for these approaches, thus making
                 them easily accessible to a broader audience, and more
                 easily usable in practical applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "default logic; nonmonotonic reasoning; operational
                 models",
  subject =      "Computing Methodologies --- Artificial Intelligence
                 --- Deduction and Theorem Proving (I.2.3): {\bf
                 Nonmonotonic reasoning and belief revision}; Computing
                 Methodologies --- Artificial Intelligence --- Knowledge
                 Representation Formalisms and Methods (I.2.4): {\bf
                 Representation languages}",
}

@Article{Iren:1999:TLT,
  author =       "Sami Iren and Paul D. Amer and Phillip T. Conrad",
  title =        "The transport layer: tutorial and survey",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4",
  pages =        "360--404",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/344588.344609",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:50 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4/p360-iren/",
  abstract =     "Transport layer protocols provide for end-to-end
                 communication between two or more hosts. This paper
                 presents a tutorial on transport layer concepts and
                 terminology, and a survey of transport layer services
                 and protocols. The transport layer protocol TCP is used
                 as a reference point, and compared and contrasted with
                 nineteen other protocols designed over the past two
                 decades. The service and protocol features of twelve of
                 the most important protocols are summarized in both
                 text and tables.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "congestion control; flow control; TCP/IP networks;
                 transport protocol; transport service",
  subject =      "Computer Systems Organization ---
                 Computer-Communication Networks --- General (C.2.0):
                 {\bf Data communications}; Computer Systems
                 Organization --- Computer-Communication Networks ---
                 Network Architecture and Design (C.2.1): {\bf Network
                 communications}; Computer Systems Organization ---
                 Computer-Communication Networks --- Network
                 Architecture and Design (C.2.1): {\bf Packet-switching
                 networks}; Computer Systems Organization ---
                 Computer-Communication Networks --- Network
                 Architecture and Design (C.2.1): {\bf Store and forward
                 networks}; Computer Systems Organization ---
                 Computer-Communication Networks --- Network Protocols
                 (C.2.2): {\bf Protocol architecture}; Computer Systems
                 Organization --- Computer-Communication Networks ---
                 Local and Wide-Area Networks (C.2.5); Computer Systems
                 Organization --- Computer-Communication Networks ---
                 General (C.2.0): {\bf Open Systems Interconnection
                 reference model (OSI)}",
}

%%% ====================================================================
%%% Volume 31, number 4es is an electronic supplement that is published
%%% online at the indicated URLs; the table of contents entries in
%%% number 4 lists these short articles, but the paper issue of the
%%% journal itself does not contain them.  They have no assigned page
%%% numbers, so they are listed in table-of-contents order here.
%%% ====================================================================
@Article{Kwok:1999:SSA,
  author =       "Yu-Kwong Kwok and Ishfaq Ahmad",
  title =        "Static scheduling algorithms for allocating directed
                 task graphs to multiprocessors",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4",
  pages =        "406--471",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/344588.344618",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:09:50 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4/p406-kwok/",
  abstract =     "Static scheduling of a program represented by a
                 directed task graph on a multiprocessor system to
                 minimize the program completion time is a well-known
                 problem in parallel processing. Since finding an
                 optimal schedule is an NP-complete problem in general,
                 researchers have resorted to devising efficient
                 heuristics. A plethora of heuristics have been proposed
                 based on a wide spectrum of techniques, including
                 branch-and-bound, integer-programming, searching,
                 graph-theory, randomization, genetic algorithms, and
                 evolutionary methods. The objective of this survey is
                 to describe various scheduling algorithms and their
                 functionalities in a contrasting fashion as well as
                 examine their relative merits in terms of performance
                 and time-complexity. Since these algorithms are based
                 on diverse assumptions, they differ in their
                 functionalities, and hence are difficult to describe in
                 a unified context. We propose a taxonomy that
                 classifies these algorithms into different categories.
                 We consider 27 scheduling algorithms, with each
                 algorithm explained through an easy-to-understand
                 description followed by an illustrative example to
                 demonstrate its operation. We also outline some of the
                 novel and promising optimization approaches and current
                 research trends in the area. Finally, we give an
                 overview of the software tools that provide
                 scheduling/mapping functionalities.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "automatic parallelization; DAG; multiprocessors;
                 parallel processing; software tools; static scheduling;
                 task graphs",
  subject =      "Computer Systems Organization --- Processor
                 Architectures --- Multiple Data Stream Architectures
                 (Multiprocessors) (C.1.2): {\bf Parallel processors**};
                 Software --- Programming Techniques --- Concurrent
                 Programming (D.1.3): {\bf Parallel programming};
                 Software --- Operating Systems --- Process Management
                 (D.4.1): {\bf
                 Multiprocessing/multiprogramming/multitasking}; Theory
                 of Computation --- Computation by Abstract Devices ---
                 Modes of Computation (F.1.2): {\bf Parallelism and
                 concurrency}; Software --- Operating Systems ---
                 Process Management (D.4.1): {\bf Scheduling}",
}

@Article{Ashman:1999:CSEb,
  author =       "Helen Ashman and Rosemary Michelle Simpson",
  title =        "{Computing Surveys' Electronic Symposium on Hypertext
                 and Hypermedia}: {Editorial}",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "1:1--1:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/344588.344596",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wiil:1999:HRD,
  author =       "Uffe K. Wiil and Peter J. N{\"u}rnberg and John J.
                 Leggett",
  title =        "Hypermedia research directions: an infrastructure
                 perspective",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "2:1--2:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/344588.344602",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a2-wiil/",
  abstract =     "Default logic is one of the most prominent approaches
                 to nonmonotonic reasoning, and allows one to make
                 plausible conjectures when faced with incomplete
                 information about the problem at hand. Default rules
                 prevail in many application domains such as medical and
                 legal reasoning. Several variants have been developed
                 over the past year, either to overcome some perceived
                 deficiencies of the original presentation, or to
                 realize somewhat different intuitions. This paper
                 provides a tutorial-style introduction to some
                 important approaches of Default Logic. The presentation
                 is based on operational models for these approaches,
                 thus making them easily accessible to a broader
                 audience, and more easily usable in practical
                 applications.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "default logic; nonmonotonic reasoning; operational
                 models",
}

@Article{Treloar:1999:AHH,
  author =       "Andrew E. Treloar",
  title =        "Applying hypertext and hypermedia to scholarly
                 journals enables both product and process innovation",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "3:1--3:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/344588.344609",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a3-treloar/",
  abstract =     "Transport layer protocols provide for end-to-end
                 communication between two or more hosts. This paper
                 presents a tutorial on transport layer concepts and
                 terminology, and a survey of transport layer services
                 and protocols. The transport layer protocol TCP is used
                 as a reference point, and compared and contrasted with
                 nineteen other protocols designed over the past two
                 decades. The service and protocol features of twelve of
                 the most important protocols are summarized in both
                 text and tables.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "congestion control; flow control; TCP/IP networks;
                 transport protocol; transport service",
}

@Article{Tudhope:1999:SIH,
  author =       "Douglas Tudhope and Daniel Cunliffe",
  title =        "Semantically indexed hypermedia: linking information
                 disciplines",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "4:1--4:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/344588.344618",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a4-tudhope/",
  abstract =     "Static scheduling of a program represented by a
                 directed task graph on a multiprocessor system to
                 minimize the program completion time is a well-known
                 problem in parallel processing. Since finding an
                 optimal schedule is an NP-complete problem in general,
                 researchers have resorted to devising efficient
                 heuristics. A plethora of heuristics have been proposed
                 based on a wide spectrum of techniques, including
                 branch-and-bound, integer-programming, searching,
                 graph-theory, randomization, genetic algorithms, and
                 evolutionary methods. The objective of this survey is
                 to describe various scheduling algorithms and their
                 functionalities in a contrasting fashion as well as
                 examine their relative merits in terms of performance
                 and time-complexity. Since these algorithms are based
                 on diverse assumptions, they differ in their
                 functionalities, and hence are difficult to describe in
                 a unified context. We propose a taxonomy that
                 classifies these algorithms into different categories.
                 We consider 27 scheduling algorithms, with each
                 algorithm explained through an easy-to-understand
                 description followed by an illustrative example to
                 demonstrate its operation. We also outline some of the
                 novel and promising optimization approaches and current
                 research trends in the area. Finally, we give an
                 overview of the software tools that provide
                 scheduling/mapping functionalities.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "automatic parallelization; DAG; multiprocessors;
                 parallel processing; software tools; static scheduling;
                 task graphs",
}

@Article{Kleinberg:1999:HAC,
  author =       "Jon M. Kleinberg",
  title =        "Hubs, authorities, and communities",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "5:1--5:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.345982",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a5-kleinberg/",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "graph algorithms; hypertext structure; link analysis;
                 World Wide Web",
}

@Article{Mukherjea:1999:IVH,
  author =       "Sougata Mukherjea",
  title =        "Information visualization for hypermedia systems",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "6:1--6:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.345984",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a6-mukherjea/",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "focus+context views; information visualization",
}

@Article{Oinas-Kukkonen:1999:FCH,
  author =       "Harri Oinas-Kukkonen",
  title =        "Flexible {CASE} and hypertext",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "7:1--7:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.345985",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a7-oinas-kukkonen/",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer-aided software engineering; integrated
                 environments",
}

@Article{Rossi:1999:DHA,
  author =       "Gustavo Rossi and Fernando Daniel Lyardet and Daniel
                 Schwabe",
  title =        "Developing hypermedia applications with methods and
                 patterns",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "8:1--8:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.345987",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a8-rossi/",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Web information systems",
}

@Article{Carr:1999:EHL,
  author =       "Leslie Carr and Wendy Hall and David {De Roure}",
  title =        "The evolution of hypertext link services",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "9:1--9:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.345989",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a9-carr/",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "electronic publishing; link services; open hypermedia
                 systems",
}

@Article{Lewis:1999:SL,
  author =       "Paul H. Lewis and Wendy Hall and Leslie A. Carr and
                 David De Roure",
  title =        "The significance of linking",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "10:1--10:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.345992",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a10-lewis/",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "content-based navigation; semantics",
}

@Article{Reich:1999:WYB,
  author =       "Siegfried Reich and Leslie Carr and David {De Roure}
                 and Wendy Hall",
  title =        "Where have you been from here? {Trials} in hypertext
                 systems",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "11:1--11:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.345994",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a11-reich/",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "open hypermedia system; software agents; user trails",
}

@Article{DeBra:1999:AHS,
  author =       "Paul {De Bra} and Peter Brusilovsky and Geert-Jan
                 Houben",
  title =        "Adaptive hypermedia: from systems to framework",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "12:1--12:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.345996",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a12-de_bra/",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "adaptation; adaptive navigation support; hypermedia;
                 navigation adaptive presentation",
}

@Article{Li:1999:ICS,
  author =       "Wen-Syan Li and K. Sel{\c{c}}uk Candan",
  title =        "Integrating content search with structure analysis for
                 hypermedia retrieval and management",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "13:1--13:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.345999",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a13-li/",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "link analysis; organization; topic distillation",
}

@Article{Shipman:1999:SHA,
  author =       "Frank M. {Shipman, III} and Catherine C. Marshall",
  title =        "Spatial hypertext: an alternative to navigational and
                 semantic links",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "14:1--14:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346001",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a14-shipman/",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bodner:1999:DHQ,
  author =       "Richard Bodner and Mark Chignell",
  title =        "Dynamic hypertext: querying and linking",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "15:1--15:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346002",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a15-bodner/",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "dynamic linking; hypertext browsing; information
                 retrieval interface",
}

@Article{Kopak:1999:FLT,
  author =       "Richard W. Kopak",
  title =        "Functional link typing in hypertext",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "16:1--16:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346005",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a16-kopak/",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "electronic publishing; link taxonomies; link typing",
}

@Article{Chakrabarti:1999:RRA,
  author =       "Soumen Chakrabarti",
  title =        "Recent results in automatic {Web} resource discovery",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "17:1--17:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346007",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a17-chakrabarti/",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Furner:1999:ILC,
  author =       "Jonathan Furner and David Ellis and Peter Willett",
  title =        "Inter-linker consistency in the manual construction of
                 hypertext documents",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "18:1--18:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346008",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a18-furner/",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "graph theory; inter-indexer consistency; link
                 creation; similarity; topological indices",
}

@Article{Bernstein:1999:SPH,
  author =       "Mark Bernstein",
  title =        "Structural patterns and hypertext rhetoric",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "19:1--19:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346011",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a19-bernstein/",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "criticism; design; fiction; hypertext structure;
                 pattern languages; patterns; rhetoric",
}

@Article{Anderson:1999:SSE,
  author =       "Kenneth M. Anderson",
  title =        "Supporting software engineering with open hypermedia",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "20:1--20:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346013",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a20-anderson/",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "case study; open hypermedia; software engineering",
}

@Article{DeRose:1999:XL,
  author =       "Steven J. DeRose",
  title =        "{XML} linking",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "21:1--21:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346015",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a21-derose/",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Green:1999:LSA,
  author =       "Stephen J. Green",
  title =        "Lexical semantics and automatic hypertext
                 construction",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "22:1--22:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346016",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a22-green/",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "automatic hypertext construction; lexical semantics",
}

@Article{Hardman:1999:HLT,
  author =       "Lynda Hardman and Jacco van Ossenbruggen and Lloyd
                 Rutledge and Dick C. A. Bulterman",
  title =        "Hypermedia: the link with time",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "23:1--23:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346018",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a23-hardman/",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "document models; multimedia; W3C recommendations",
}

@Article{Vitali:1999:VH,
  author =       "Fabio Vitali",
  title =        "Versioning hypermedia",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "24:1--24:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346019",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a24-vitali/",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Benford:1999:TDV,
  author =       "Steve Benford and Ian Taylor and David Brailsford and
                 Boriana Koleva and Mike Craven and Mike Fraser and Gail
                 Reynard and Chris Greenhalgh",
  title =        "Three dimensional visualization of the {World Wide
                 Web}",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "25:1--25:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346021",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a25-benford/",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Quentin-Baxter:1999:QED,
  author =       "Megan Quentin-Baxter",
  title =        "Quantitative evidence for differences between learners
                 making use of passive hypermedia learning
                 environments",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "26:1--26:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346022",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a26-quentin-baxter/",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "evaluation; hypermedia; hypertext; learning style;
                 quantitative",
}

@Article{Wilkinson:1999:ALG,
  author =       "Ross Wilkinson and Alan F. Smeaton",
  title =        "Automatic link generation",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "27:1--27:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346024",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a27-wilkinson/",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Davis:1999:HLI,
  author =       "Hugh C. Davis",
  title =        "Hypertext link integrity",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "28:1--28:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346026",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a28-davis/",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "broken links; content reference problem; dangling
                 links; link integrity",
}

@Article{Bieber:1999:HDP,
  author =       "Michael Bieber and Joonhee Yoo",
  title =        "Hypermedia: a design philosophy",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "29:1--29:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346028",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a29-bieber/",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "hypermedia; hypertext; links; navigation; relationship
                 analysis; relationship taxonomy",
}

@Article{Brailsford:1999:SHD,
  author =       "David F. Brailsford",
  title =        "Separable hyperstructure and delayed link binding",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "30:1--30:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346029",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a30-brailsford/",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Vitali:1999:HWW,
  author =       "Fabio Vitali and Michael Bieber",
  title =        "Hypermedia on the {Web}: what will it take?",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "31:1--31:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346030",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a31-vitali/",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "browsers; hypermedia; hypertext; hypertext
                 functionality; link attributes; linkbases; World Wide
                 Web",
}

@Article{Bieber:1999:HF,
  author =       "Michael Bieber and Harri Oinas-Kukkonen and V.
                 Balasubramanian",
  title =        "Hypertext functionality",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "32:1--32:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346032",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a32-bieber/",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "added value; analysis; hypertext functionality",
}

@Article{Nelson:1999:XSN,
  author =       "Theodor Holm Nelson",
  title =        "Xanalogical structure, needed now more than ever:
                 parallel documents, deep links to content, deep
                 versioning, and deep re-use",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "33:1--33:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346033",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a33-nelson/",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Verbyla:1999:UL,
  author =       "Janet Verbyla",
  title =        "Unlinking the link",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "34:1--34:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346035",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a34-verbyla/",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cailliau:1999:HWH,
  author =       "Robert Cailliau and Helen Ashman",
  title =        "Hypertext in the {Web} --- a history",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "35:1--35:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346036",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a35-cailliau/",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "browsers; hypermedia; hypertext; World Wide Web; XML",
}

@Article{vanDam:1999:EUR,
  author =       "Andries van Dam",
  title =        "Education: the unfinished revolution",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "36:1--36:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346038",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a36-van_dam/",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nelson:1999:URX,
  author =       "Theodor Holm Nelson",
  title =        "The unfinished revolution and {Xanadu}",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "37:1--37:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346039",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a37-nelson/",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Engelbart:1999:BOC,
  author =       "Douglas Engelbart and Jeff Ruilifson",
  title =        "Bootstrapping our collective intelligence",
  journal =      j-COMP-SURV,
  volume =       "31",
  number =       "4es",
  pages =        "38:1--38:??",
  month =        dec,
  year =         "1999",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/345966.346040",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:10:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/1999-31-4es/a38-engelbart/",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bellini:2000:TLR,
  author =       "P. Bellini and R. Mattolini and P. Nesi",
  title =        "Temporal logics for real-time system specification",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1",
  pages =        "12--42",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/349194.349197",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:11:58 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-1/p12-bellini/p12-bellini.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p12-bellini/",
  abstract =     "The specification of reactive and real-time systems
                 must be supported by formal, mathematically-founded
                 methods in order to be satisfactory and reliable.
                 Temporal logics have been used to this end for several
                 years. Temporal logics allow the specification of
                 system behavior in terms of logical formulas, including
                 temporal constraints, events, and the relationships
                 between the two. In the last ten years, temporal logics
                 have reached a high degree of expressiveness. Most of
                 the temporal logics proposed in the last few years can
                 be used for specifying reactive systems, although not
                 all are suitable for specifying real-time systems. In
                 this paper we present a series of criteria for
                 assessing the capabilities of temporal logics for the
                 specification, validation, and verification of
                 real-time systems. Among the criteria are the logic's
                 expressiveness, the logic's order, presence of a metric
                 for time, the type of temporal operators, the
                 fundamental time entity, and the structure of time. We
                 examine a selection of temporal logics proposed in the
                 literature. To make the comparison clearer, a set of
                 typical specifications is identified and used with most
                 of the temporal logics considered, thus presenting the
                 reader with a number of real examples.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Theory; Verification",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "logic specification languages; metric of time; modal
                 logic; reactive systems; real-time; specification
                 model; temporal constraints; temporal logics; temporal
                 relationships",
  subject =      "Theory of Computation --- Mathematical Logic and
                 Formal Languages --- Mathematical Logic (F.4.1): {\bf
                 Temporal logic}; Theory of Computation --- Mathematical
                 Logic and Formal Languages --- Mathematical Logic
                 (F.4.1): {\bf Modal logic}; Software --- Software
                 Engineering --- Requirements/Specifications (D.2.1):
                 {\bf Languages}; Software --- Software Engineering ---
                 Software/Program Verification (D.2.4): {\bf Formal
                 methods}; Computer Applications --- Computers in Other
                 Systems (J.7): {\bf Real time}",
}

@Article{Hasselbring:2000:PLS,
  author =       "Wilhelm Hasselbring",
  title =        "Programming languages and systems for prototyping
                 concurrent applications",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1",
  pages =        "43--79",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/349194.349199",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:11:58 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-1/p43-hasselbring/p43-hasselbring.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p43-hasselbring/",
  abstract =     "Concurrent programming is conceptually harder to
                 undertake and to understand than sequential
                 programming, because a programmer has to manage the
                 coexistence and coordination of multiple concurrent
                 activities. To alleviate this task several high-level
                 approaches to concurrent programming have been
                 developed. For some high-level programming approaches,
                 {\em prototyping\/} for facilitating early evaluation
                 of new ideas is a central goal. \par

                 Prototyping is used to explore the essential features
                 of a proposed system through practical experimentation
                 before its actual implementation to make the correct
                 design choices early in the process of software
                 development. Approaches to prototyping {\em
                 concurrent\/} applications with very high-level
                 programming systems intend to alleviate the development
                 in different ways. Early experimentation with alternate
                 design choices or problem decompositions for concurrent
                 applications is suggested to make concurrent
                 programming easier. \par

                 This paper presents a survey of programming languages
                 and systems for prototyping concurrent applications to
                 review the state of the art in this area. The surveyed
                 approaches are classified with respect to the
                 prototyping process.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Languages",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "concurrency; distribution; parallelism; rapid
                 prototyping; very high-level languages",
  subject =      "Software --- Programming Techniques --- Concurrent
                 Programming (D.1.3): {\bf Parallel programming};
                 Software --- Programming Techniques --- Concurrent
                 Programming (D.1.3): {\bf Distributed programming};
                 Software --- Software Engineering ---
                 Requirements/Specifications (D.2.1); Software ---
                 Software Engineering --- Design Tools and Techniques
                 (D.2.2): {\bf Computer-aided software engineering
                 (CASE)}; Software --- Software Engineering --- Design
                 Tools and Techniques (D.2.2): {\bf Petri nets};
                 Software --- Software Engineering --- Design Tools and
                 Techniques (D.2.2): {\bf Software libraries}; Software
                 --- Software Engineering --- Programming Environments
                 (D.2.6): {\bf Interactive environments}; Software ---
                 Programming Languages --- Language Classifications
                 (D.3.2): {\bf Concurrent, distributed, and parallel
                 languages}; Software --- Programming Languages ---
                 Language Classifications (D.3.2): {\bf Very high-level
                 languages}; Software --- Programming Languages ---
                 Language Constructs and Features (D.3.3): {\bf
                 Concurrent programming structures}",
}

@Article{Sarkar:2000:BHC,
  author =       "Palash Sarkar",
  title =        "A brief history of cellular automata",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1",
  pages =        "80--107",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/349194.349202",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:11:58 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-1/p80-sarkar/p80-sarkar.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p80-sarkar/",
  abstract =     "Cellular automata are simple models of computation
                 which exhibit fascinatingly complex behavior. They have
                 captured the attention of several generations of
                 researchers, leading to an extensive body of work. Here
                 we trace a history of cellular automata from their
                 beginnings with von Neumann to the present day. The
                 emphasis is mainly on topics closer to computer science
                 and mathematics rather than physics, biology or other
                 applications. The work should be of interest to both
                 new entrants into the field as well as researchers
                 working on particular aspects of cellular automata.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "cellular automata; cellular space; homogeneous
                 structures; systolic arrays; tessellation automata",
  subject =      "Theory of Computation --- Computation by Abstract
                 Devices --- Models of Computation (F.1.1); Computing
                 Milieux --- History of Computing (K.2)",
}

@Article{Fayad:2000:ICS,
  author =       "Mohamed E. Fayad",
  title =        "Introduction to the {Computing Surveys' Electronic
                 Symposium on Object-Oriented Application Frameworks}",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "1:1--1:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/349194.349197",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 4",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-1/p1-fayad/p1-fayad.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p1-fayad/",
  abstract =     "The specification of reactive and real-time systems
                 must be supported by formal, mathematically-founded
                 methods in order to be satisfactory and reliable.
                 Temporal logics have been used to this end for several
                 years. Temporal logics allow the specification of
                 system behavior in terms of logical formulas, including
                 temporal constraints, events, and the relationships
                 between the two. In the last ten years, temporal logics
                 have reached a high degree of expressiveness. Most of
                 the temporal logics proposed in the last few years can
                 be used for specifying reactive systems, although not
                 all are suitable for specifying real-time systems. In
                 this paper we present a series of criteria for
                 assessing the capabilities of temporal logics for the
                 specification, validation, and verification of
                 real-time systems. Among the criteria are the logic's
                 expressiveness, the logic's order, presence of a metric
                 for time, the type of temporal operators, the
                 fundamental time entity, and the structure of time. We
                 examine a selection of temporal logics proposed in the
                 literature. To make the comparison clearer, a set of
                 typical specifications is identified and used with most
                 of the temporal logics considered, thus presenting the
                 reader with a number of real examples.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  generalterms = "Design; Documentation; Languages",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "logic specification languages; metric of time; modal
                 logic; reactive systems; real-time; specification
                 model; temporal constraints; temporal logics; temporal
                 relationships",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Software Engineering --- Reusable Software
                 (D.2.13); Software --- Programming Techniques ---
                 Object-oriented Programming (D.1.5)",
  xxpages =      "1--9",
}

@Article{Brugali:2000:FPL,
  author =       "Davide Brugali and Katia Sycara",
  title =        "Frameworks and pattern languages: an intriguing
                 relationship",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/349194.349199",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 2",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p2-brugali/",
  abstract =     "Concurrent programming is conceptually harder to
                 undertake and to understand than sequential
                 programming, because a programmer has to manage the
                 coexistence and coordination of multiple concurrent
                 activities. To alleviate this task several high-level
                 approaches to concurrent programming have been
                 developed. For some high-level programming approaches,
                 prototyping for facilitating early evaluation of new
                 ideas is a central goal. Prototyping is used to explore
                 the essential features of a proposed system through
                 practical experimentation before its actual
                 implementation to make the correct design choices early
                 in the process of software development. Approaches to
                 prototyping concurrent applications with very
                 high-level programming systems intend to alleviate the
                 development in different ways. Early experimentation
                 with alternate design choices or problem decompositions
                 for concurrent applications is suggested to make
                 concurrent programming easier. This paper presents a
                 survey of programming languages and systems for
                 prototyping concurrent applications to review the state
                 of the art in this area. The surveyed approaches are
                 classified with respect to the prototyping process.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "concurrency; design patterns; development method;
                 distribution; framework documentation; parallelism;
                 pattern languages; rapid prototyping; very high-level
                 languages",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Patterns};
                 Software --- Software Engineering --- Reusable Software
                 (D.2.13); Software --- Programming Techniques ---
                 Object-oriented Programming (D.1.5)",
}

@Article{Bosch:2000:OOF,
  author =       "Jan Bosch and Peter Molin and Michael Mattsson and
                 PerOlof Bengtsson",
  title =        "Object-oriented framework-based software development:
                 problems and experiences",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "3:1--3:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/349194.349202",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 3",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p3-bosch/",
  abstract =     "Cellular automata are simple models of computation
                 which exhibit fascinatingly complex behavior. They have
                 captured the attention of several generations of
                 researchers, leading to an extensive body of work. Here
                 we trace a history of cellular automata from their
                 beginnings with von Neumann to the present day. The
                 emphasis is mainly on topics closer to computer science
                 and mathematics rather than physics, biology or other
                 applications. The work should be of interest to both
                 new entrants into the field as well as researchers
                 working on particular aspects of cellular automata.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "cellular automata; cellular space; homogeneous
                 structures; object-oriented frameworks; software reuse;
                 systolic arrays; tessellation automata",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Software Engineering --- Reusable Software
                 (D.2.13); Software --- Programming Techniques ---
                 Object-oriented Programming (D.1.5)",
}

@Article{Fayad:2000:EFG,
  author =       "Mohamed E. Fayad and David S. Hamu",
  title =        "Enterprise frameworks: guidelines for selection",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "4:1--4:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351940",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 4",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p4-fayad/",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "aspect-oriented frameworks; customization; distributed
                 computing; enterprise frameworks; extensibility;
                 framework economics; object-orientation; software
                 architecture; software stability",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Software Engineering --- Software
                 Architectures (D.2.11); Software --- Programming
                 Techniques --- Object-oriented Programming (D.1.5);
                 Software --- Programming Languages --- Language
                 Classifications (D.3.2): {\bf Concurrent, distributed,
                 and parallel languages}",
}

@Article{Baumer:2000:DDF,
  author =       "Dirk B{\"a}umer and Guido Gryczan and Rolf Knoll and
                 Carola Lilienthal and Dirk Riehle and Heinz
                 Z{\"u}llighoven",
  title =        "Domain-driven framework layering in large systems",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "5:1--5:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351941",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 5",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p5-baumer/",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "domain modeling; framework; framework layering",
  subject =      "Software --- Programming Techniques ---
                 Object-oriented Programming (D.1.5); Software ---
                 Software Engineering --- General (D.2.0); Software ---
                 Software Engineering --- Design Tools and Techniques
                 (D.2.2); Software --- Software Engineering --- Design**
                 (D.2.10); Software --- Software Engineering ---
                 Software Architectures (D.2.11); Software ---
                 Programming Languages --- Language Constructs and
                 Features (D.3.3): {\bf Frameworks}; Computer
                 Applications --- Administrative Data Processing (J.1):
                 {\bf Financial}",
}

@Article{Pree:2000:FSL,
  author =       "Wolfgang Pree and Kai Koskimies",
  title =        "Framelets --- small and loosely coupled frameworks",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "6:1--6:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351942",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p6-pree/",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  generalterms = "Design; Languages; Performance",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5); Software --- Programming Languages
                 --- Language Classifications (D.3.2): {\bf Java};
                 Software --- Software Engineering --- Reusable Software
                 (D.2.13)",
}

@Article{Wang:2000:BTR,
  author =       "Yingwu Wang and Dilip Patel and Graham King and Ian
                 Court and Geoff Staples and Maraget Ross and Mohamad
                 Fayad",
  title =        "On built-in test reuse in object-oriented framework
                 design",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "7:1--7:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351943",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 7",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p7-wang/",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "built-in test; code reuse; framework; framework reuse;
                 object-oriented technology; pattern; software
                 engineering; test reuse; testable software",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5); Software --- Software Engineering
                 --- Testing and Debugging (D.2.5)",
}

@Article{Hedin:2000:RLC,
  author =       "G{\"o}rel Hedin and J{\o}rgen Lindskov Knudsen",
  title =        "On the role of language constructs for framework
                 design",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "8:1--8:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351944",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 8",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p8-hedin/",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5)",
}

@Article{Carey:2000:DDD,
  author =       "James E. Carey and Brent A. Carlson",
  title =        "Deferring design decisions in an application
                 framework",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "9:1--9:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351945",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 9",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p9-carey/",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Techniques ---
                 Object-oriented Programming (D.1.5); Software ---
                 Software Engineering --- Design Tools and Techniques
                 (D.2.2): {\bf Object-oriented design methods}; Software
                 --- Programming Languages --- Language Constructs and
                 Features (D.3.3): {\bf Frameworks}; Software ---
                 Programming Languages --- Language Constructs and
                 Features (D.3.3): {\bf Patterns}",
}

@Article{Riehle:2000:PDR,
  author =       "Dirk Riehle and Roger Brudermann and Thomas Gross and
                 Kai-Uwe M{\"a}tzel",
  title =        "Pattern density and role modeling of an object
                 transport service",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "10:1--10:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351946",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 10",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p10-riehle/",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "framework; inter-process communication; object
                 migration; object transport; pattern; pattern
                 application; pattern composition; pattern density;
                 role; role model; role model composition",
  subject =      "Computer Systems Organization ---
                 Computer-Communication Networks --- Distributed Systems
                 (C.2.4); Software --- Programming Techniques ---
                 Concurrent Programming (D.1.3); Software ---
                 Programming Techniques --- Object-oriented Programming
                 (D.1.5); Software --- Software Engineering --- General
                 (D.2.0); Software --- Software Engineering --- Design
                 Tools and Techniques (D.2.2); Software --- Software
                 Engineering --- Design** (D.2.10); Software ---
                 Software Engineering --- Software Architectures
                 (D.2.11); Software --- Software Engineering ---
                 Reusable Software (D.2.13)",
}

@Article{Aksit:2000:DOO,
  author =       "Mehmet Aksit and Francesco Marcelloni and Bedir
                 Tekinerdogan",
  title =        "Developing object-oriented frameworks using domain
                 models",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "11:1--11:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351947",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 11",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p11-aksit/",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5)",
}

@Article{Succi:2000:FED,
  author =       "Giancarlo Succi and Andrea Valerio and Tullio Vernazza
                 and Massimo Fenaroli and Paolo Predonzani",
  title =        "Framework extraction with domain analysis",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "12:1--12:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351948",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 12",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p12-succi/",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5); Information Systems ---
                 Information Interfaces and Presentation --- User
                 Interfaces (H.5.2): {\bf Graphical user interfaces
                 (GUI)}",
}

@Article{Roy:2000:FAC,
  author =       "Pierre Roy and Anne Liret and Fran{\c{c}}ois Pachet",
  title =        "The framework approach for constraint satisfaction",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "13:1--13:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351949",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 13",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p13-roy/",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "constraint satisfaction; frameworks; object-oriented
                 programming",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Constraints};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5)",
}

@Article{Soundarajan:2000:DFB,
  author =       "Neelam Soundarajan",
  title =        "Documenting framework behavior",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "14:1--14:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351950",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 14",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p14-soundarajan/",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "specifying OO frameworks; traces of method calls",
  subject =      "Software --- Programming Techniques ---
                 Object-oriented Programming (D.1.5); Software ---
                 Software Engineering --- Requirements/Specifications
                 (D.2.1); Software --- Programming Languages ---
                 Language Constructs and Features (D.3.3): {\bf
                 Frameworks}",
}

@Article{Butler:2000:FFD,
  author =       "Greg Butler and Rudolf K. Keller and Hafedh Mili",
  title =        "A framework for framework documentation",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "15:1--15:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351951",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 15",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p15-butler/",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "application frameworks; CASE; design patterns; use
                 case",
  subject =      "Software --- Software Engineering --- Miscellaneous
                 (D.2.m): {\bf Reusable software**}; Software ---
                 Programming Techniques --- Object-oriented Programming
                 (D.1.5); Software --- Programming Languages ---
                 Language Constructs and Features (D.3.3): {\bf
                 Frameworks}",
}

@Article{Silva:2000:FDU,
  author =       "Ant{\'o}nio Rito Silva and Francisco Assis Rosa and
                 Teresa Gon{\c{c}}alves",
  title =        "Framework description using concern-specific design
                 patterns composition",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "16:1--16:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351952",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 16",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p16-silva/",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "object-oriented composition; object-oriented design
                 patterns; object-oriented frameworks",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5)",
}

@Article{Froehlich:2000:COO,
  author =       "Garry Froehlich and H. James Hoover and Paul G.
                 Sorenson",
  title =        "Choosing an object-oriented domain framework",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "17:1--17:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351953",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p17-froehlich/",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5)",
}

@Article{Bansiya:2000:EFA,
  author =       "Jagdish Bansiya",
  title =        "Evaluating framework architecture structural
                 stability",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "18:1--18:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351954",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 18",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p18-bansiya/",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5); Software --- Software Engineering
                 --- Software Architectures (D.2.11)",
}

@Article{Maamar:2000:OSA,
  author =       "Zakaria Maamar and Bernard Moulin",
  title =        "An overview of software agent-oriented frameworks",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "19:1--19:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351955",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 19",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p19-maamar/",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Computer Systems Organization ---
                 Computer-Communication Networks --- Distributed Systems
                 (C.2.4); Computing Methodologies --- Artificial
                 Intelligence --- Distributed Artificial Intelligence
                 (I.2.11): {\bf Multiagent systems}; Information Systems
                 --- Information Storage and Retrieval --- Digital
                 Libraries (H.3.7)",
}

@Article{Kendall:2000:AFI,
  author =       "Elizabeth A. Kendall and P. V. Murali Krishna and C.
                 B. Suresh and Chira G. V. Pathak",
  title =        "An application framework for intelligent and mobile
                 agents",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "20:1--20:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351956",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 20",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p20-kendall/",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Computing Methodologies --- Artificial Intelligence ---
                 Distributed Artificial Intelligence (I.2.11): {\bf
                 Intelligent agents}; Software --- Software Engineering
                 --- Software Architectures (D.2.11); Software ---
                 Programming Techniques --- Object-oriented Programming
                 (D.1.5); Software --- Programming Languages ---
                 Language Constructs and Features (D.3.3): {\bf
                 Patterns}",
}

@Article{Brugali:2000:TAO,
  author =       "Davide Brugali and Katia Sycara",
  title =        "Towards agent oriented application frameworks",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "21:1--21:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351957",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 21",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p21-brugali/",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "component customization; software agents",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5); Computing Methodologies ---
                 Artificial Intelligence --- Distributed Artificial
                 Intelligence (I.2.11): {\bf Intelligent agents}",
}

@Article{Garbinato:2000:OFR,
  author =       "Beno{\^\i}t Garbinato and Rachid Guerraoui",
  title =        "An open framework for reliable distributed computing",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "22:1--22:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351958",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 22",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p22-garbinato/",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5)",
}

@Article{Michaloski:2000:OSF,
  author =       "John Michaloski and Sushil Birla and C. Jerry Yen and
                 Richard Igou and George Weinert",
  title =        "An open system framework for component-based {CNC}
                 machines",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "23:1--23:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351959",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 23",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p23-michaloski/",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "API; architecture; classes; CNC; object-oriented",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Computer Applications --- Computers in Other Systems
                 (J.7): {\bf Industrial control}; Software ---
                 Programming Techniques --- Object-oriented Programming
                 (D.1.5)",
}

@Article{Fuentes:2000:TOM,
  author =       "Lidia Fuentes and Jos{\'e}e M. Troya",
  title =        "Towards an open multimedia service framework",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "24:1--24:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351960",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 24",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p24-fuentes/",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "compositional frameworks; distributed systems;
                 Java/Web; multimedia services",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Information Systems --- Information Interfaces and
                 Presentation --- Multimedia Information Systems
                 (H.5.1); Information Systems --- Information Interfaces
                 and Presentation --- Group and Organization Interfaces
                 (H.5.3): {\bf Web-based interaction}; Software ---
                 Programming Languages --- Language Classifications
                 (D.3.2): {\bf Java}",
}

@Article{Johnson:2000:SFP,
  author =       "Verlyn Johnson",
  title =        "The {San Francisco Project}: {Business} process
                 components and infrastructure",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "25:1--25:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351961",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 25",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p25-johnson/",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "application domain; business process components;
                 design patterns; distributed object infrastructure;
                 frameworks; Java; object oriented application
                 development",
  subject =      "Software --- Software Engineering (D.2); Software ---
                 Programming Languages --- Language Constructs and
                 Features (D.3.3): {\bf Frameworks}; Software ---
                 Software Engineering --- Reusable Software (D.2.13);
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5); Software --- Programming Languages
                 --- Language Classifications (D.3.2): {\bf Java}",
}

@Article{Capobianchi:2000:FAS,
  author =       "Riccardo Capobianchi and Alberto Coen-Porisini and
                 Dino Mandrioli and Angelo Morzenti",
  title =        "A framework architecture for supervision and control
                 systems",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "26:1--26:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351962",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 26",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p26-capobianchi/",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Software Engineering ---
                 Requirements/Specifications (D.2.1): {\bf CORBA};
                 Computer Applications --- Computers in Other Systems
                 (J.7): {\bf Real time}; Software --- Programming
                 Techniques --- Object-oriented Programming (D.1.5)",
}

@Article{Kappel:2000:FWM,
  author =       "Gerti Kappel and Stefan Rausch-Schott and Werner
                 Retschitzegger",
  title =        "A framework for workflow management systems based on
                 objects, rules and roles",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "27:1--27:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351963",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p27-kappel/",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "context dependent behavior; event/condition/action
                 rule; object-oriented frameworks; role modeling",
  subject =      "Information Systems --- Information Systems
                 Applications --- Office Automation (H.4.1): {\bf
                 Workflow management}; Software --- Software Engineering
                 --- Software Architectures (D.2.11): {\bf
                 Domain-specific architectures}; Software ---
                 Programming Languages --- Language Constructs and
                 Features (D.3.3): {\bf Frameworks}; Software ---
                 Programming Techniques --- Object-oriented Programming
                 (D.1.5)",
}

@Article{Koch:2000:AFG,
  author =       "Michael Koch and J{\"u}rgen Koch",
  title =        "Application of frameworks in groupware --- the {Iris}
                 group editor environment",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "28:1--28:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351964",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p28-koch/",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  generalterms = "Design; Human Factors; Languages",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "group editors; Iris; Java",
  subject =      "Software --- Programming Techniques ---
                 Object-oriented Programming (D.1.5); Software ---
                 Programming Languages --- Language Constructs and
                 Features (D.3.3): {\bf Frameworks}; Information Systems
                 --- Information Systems Applications --- Office
                 Automation (H.4.1): {\bf Groupware}; Software ---
                 Software Engineering --- Design Tools and Techniques
                 (D.2.2): {\bf IRIS}; Software --- Programming Languages
                 --- Language Classifications (D.3.2): {\bf Java}",
}

@Article{Pal:2000:FIC,
  author =       "Partha Pratim Pal",
  title =        "A Framework for Isolating Connection Exception
                 Management",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "29:1--29:10",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351965",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p29-pal/",
  abstract =     "This paper presents an abstract, object-oriented
                 application framework for isolating connection related
                 failure management from the main application. It also
                 describes our experience in designing and developing a
                 specific realization of this abstract
                 framework.\par

                 The isolation is achieved by introducing a ``connection
                 layer'', designed as an objectoriented application
                 framework, in between the application and the
                 middleware. The main contribution of such a framework
                 is the loose coupling between the application and the
                 underlying middleware. Furthermore, the ``connection
                 layer'' provides a simple middleware independent API
                 enabling applications to be migrated to multiple
                 middleware platforms.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  xxauthor =     "Partha pratim Pal",
}

@Article{pratimPal:2000:FIC,
  author =       "Partha {pratim Pal}",
  title =        "A framework for isolating connection exception
                 management",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "29:1--29:??",
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351965",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jul 26 06:52:17 MDT 2001",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 29",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5)",
}

@Article{Rossi:2000:NBO,
  author =       "Gustavo Rossi and Alejandra Garrido and Daniel
                 Schwabe",
  title =        "Navigating between objects. {Lessons} from an
                 object-oriented framework perspective",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "30:1--30:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351966",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 30",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p30-rossi/",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5); Information Systems ---
                 Information Interfaces and Presentation ---
                 Hypertext/Hypermedia (H.5.4); Information Systems ---
                 Information Interfaces and Presentation --- Group and
                 Organization Interfaces (H.5.3): {\bf Web-based
                 interaction}",
}

@Article{Jezequel:2000:OOF,
  author =       "J.-M. J{\'e}z{\'e}quel",
  title =        "An object-oriented framework for data parallelism",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "31:1--31:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351967",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 31",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p31-jezequel/",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data distribution; distribution systems; frameworks;
                 object-oriented design; parallel linear algebra
                 library; reuse; software components; supercomputing",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5); Mathematics of Computing ---
                 Numerical Analysis --- Numerical Linear Algebra
                 (G.1.3); Computer Systems Organization --- Processor
                 Architectures --- Parallel Architectures (C.1.4)",
}

@Article{Kannan:2000:PSF,
  author =       "Raman Kannan",
  title =        "{PAcceptor} and {SConnector} frameworks: combining
                 concurrency and communication",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "32:1--32:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351968",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 32",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p32-kannan/",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Concurrent
                 Programming (D.1.3)",
}

@Article{Buchner:2000:HFC,
  author =       "J{\"u}rgen Buchner",
  title =        "{HotDoc}: a framework for compound documents",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "33:1--33:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351969",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 33",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p33-buchner/",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "compound documents; frameworks; multimedia;
                 smalltalk",
  subject =      "Software --- Programming Techniques ---
                 Object-oriented Programming (D.1.5); Computing
                 Methodologies --- Document and Text Processing ---
                 Document Preparation (I.7.2); Software --- Programming
                 Languages --- Language Constructs and Features (D.3.3):
                 {\bf Frameworks}; Information Systems --- Information
                 Interfaces and Presentation --- Multimedia Information
                 Systems (H.5.1); Software --- Programming Languages ---
                 Language Classifications (D.3.2): {\bf Smalltalk}",
}

@Article{Demeyer:2000:CFD,
  author =       "Serge Demeyer and Koen {De Hondt} and Patrick
                 Steyaert",
  title =        "Consistent framework documentation with computed links
                 and framework contracts",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "34:1--34:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351971",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 34",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p34-demeyer/",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Information Systems --- Information Interfaces and
                 Presentation --- Hypertext/Hypermedia (H.5.4): {\bf
                 Theory}",
}

@Article{Whelan:2000:EIS,
  author =       "Peter T. Whelan",
  title =        "Experiences and issues with {SEMATECH}'s {CIM}
                 framework",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "35:1--35:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351972",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 35",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p35-whelan/",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer integrated manufacturing; framework;
                 manufacturing execution system; software component",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Computer Applications --- Computer-Aided Engineering
                 (J.6): {\bf Computer-aided manufacturing (CAM)}",
}

@Article{Harinath:2000:EOO,
  author =       "Raja Harinath and Jaideep Srivastava and Jim
                 Richardson and Mark Foresti",
  title =        "Experiences with an object oriented framework for
                 distributed control applications",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "36:1--36:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351973",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 36",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p36-harinath/",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Computer Applications --- Computers in Other Systems
                 (J.7): {\bf Command and control}; Software ---
                 Programming Techniques --- Object-oriented Programming
                 (D.1.5); Computer Applications --- Computers in Other
                 Systems (J.7): {\bf Process control}",
}

@Article{Al-Shaer:2000:AOO,
  author =       "Ehab Al-Shaer and Mohamed Fayed and Hussein
                 Abdel-Wahab",
  title =        "Adaptive object-oriented filtering framework for event
                 management applications",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "37:1--37:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351974",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 37",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p37-al-shaer/",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design patterns; filtering; frameworks; monitoring",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5); Computer Applications ---
                 Computers in Other Systems (J.7): {\bf Process
                 control}",
}

@Article{Luckas:2000:EFF,
  author =       "Volker Luckas and Ralf D{\"o}rner",
  title =        "Experience form the future --- using
                 object-orientation concepts for {$3$D} visualization
                 and validation of industrial scenarios",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "38:1--38:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351975",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p38-luckas/",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "ACM Computing Surveys",
  generalterms = "Design; Economics; Human Factors; Performance;
                 Reliability",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "3D visualization; animation element; automation;
                 object-orientation; simulation",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5); Computing Methodologies ---
                 Computer Graphics --- Three-Dimensional Graphics and
                 Realism (I.3.7)",
}

@Article{Schmidt:2000:DFH,
  author =       "Douglas C. Schmidt and James C. Hu",
  title =        "Developing flexible and high-performance {Web} servers
                 with frameworks and patterns",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "39:1--39:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351976",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 39",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p39-schmidt/",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "design patterns; distributed software systems;
                 object-oriented application frameworks; WWW",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Patterns};
                 Information Systems --- Information Storage and
                 Retrieval --- Systems and Software (H.3.4): {\bf World
                 Wide Web (WWW)}; Software --- Programming Techniques
                 --- Concurrent Programming (D.1.3)",
}

@Article{Ebner:2000:FMF,
  author =       "Ezra Ebner and Weiguang Shao and Wei-Tek Tsai",
  title =        "The five-module framework for {Internet} application
                 development",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "40:1--40:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351977",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 40",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p40-ebner/",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Software Engineering --- Software
                 Architectures (D.2.11); Information Systems ---
                 Information Systems Applications --- Communications
                 Applications (H.4.3)",
}

@Article{Constantinides:2000:DAO,
  author =       "Constantinos A. Constantinides and Atef Bader and
                 Tzilla H. Elrad and P. Netinant and Mohamed E. Fayad",
  title =        "Designing an aspect-oriented framework in an
                 object-oriented environment",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "1es",
  pages =        "41:1--41:??",
  month =        mar,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/351936.351978",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:12:24 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Article No. 41",
  URL =          "http://www.acm.org/pubs/citations/journals/surveys/2000-32-1/p41-constantinides/",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  subject =      "Software --- Programming Languages --- Language
                 Constructs and Features (D.3.3): {\bf Frameworks};
                 Software --- Programming Techniques --- Object-oriented
                 Programming (D.1.5); Software --- Programming
                 Techniques --- Concurrent Programming (D.1.3)",
}

@Article{Coello:2000:USG,
  author =       "Carlos A. Coello",
  title =        "An updated survey of {GA}-based multiobjective
                 optimization techniques",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "2",
  pages =        "109--143",
  month =        jun,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/358923.358929",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:14:26 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-2/p109-coello/p109-coello.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-2/p109-coello/",
  abstract =     "After using evolutionary techniques for
                 single-objective optimization during more than two
                 decades, the incorporation of more than one objective
                 in the fitness function has finally become a popular
                 area of research. As a consequence, many new
                 evolutionary-based approaches and variations of
                 existing techniques have recently been published in the
                 technical literature. The purpose of this paper is to
                 summarize and organize the information on these current
                 approaches, emphasizing the importance of analyzing the
                 operations research techniques in which most of them
                 are based, in an attempt to motivate researchers to
                 look into these mathematical programming approaches for
                 new ways of exploiting the search capabilities of
                 evolutionary algorithms. Furthermore, a summary of the
                 main algorithms behind these approaches is provided,
                 together with a brief criticism that includes their
                 advantages and disadvantages, degree of applicability,
                 and some known applications. Finally, further trends in
                 this area and some possible paths for further research
                 are also addressed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Algorithms",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "artificial intelligence; genetic algorithms;
                 multicriteria optimization; multiobjective
                 optimization; vector optimization",
  subject =      "Computing Methodologies --- Artificial Intelligence
                 --- Problem Solving, Control Methods, and Search
                 (I.2.8): {\bf Heuristic methods}",
}

@Article{Kobayashi:2000:IRW,
  author =       "Mei Kobayashi and Koichi Takeda",
  title =        "Information retrieval on the {Web}",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "2",
  pages =        "144--173",
  month =        jun,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/358923.358934",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:14:26 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-2/p144-kobayashi/p144-kobayashi.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-2/p144-kobayashi/",
  abstract =     "In this paper we review studies of the growth of the
                 Internet and technologies that are useful for
                 information search and retrieval on the Web. We present
                 data on the Internet from several different sources,
                 e.g., current as well as projected number of users,
                 hosts, and Web sites. Although numerical figures vary,
                 overall trends cited by the sources are consistent and
                 point to exponential growth in the past and in the
                 coming decade. Hence it is not surprising that about
                 85\% of Internet users surveyed claim using search
                 engines and search services to find specific
                 information. The same surveys show, however, that users
                 are not satisfied with the performance of the current
                 generation of search engines; the slow retrieval speed,
                 communication delays, and poor quality of retrieved
                 results (e.g., noise and broken links) are commonly
                 cited problems. We discuss the development of new
                 techniques targeted to resolve some of the problems
                 associated with Web-based information retrieval and
                 speculate on future trends.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Theory",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "clustering; indexing; information retrieval; Internet;
                 knowledge management; search engine; World Wide Web",
  subject =      "Mathematics of Computing --- Numerical Analysis ---
                 Numerical Linear Algebra (G.1.3): {\bf Eigenvalues and
                 eigenvectors (direct and iterative methods)};
                 Mathematics of Computing --- Numerical Analysis ---
                 Numerical Linear Algebra (G.1.3): {\bf Singular value
                 decomposition}; Mathematics of Computing --- Numerical
                 Analysis --- Numerical Linear Algebra (G.1.3): {\bf
                 Sparse, structured, and very large systems (direct and
                 iterative methods)}; Mathematics of Computing ---
                 Numerical Analysis --- Interpolation (G.1.1);
                 Information Systems --- Information Storage and
                 Retrieval --- Content Analysis and Indexing (H.3.1);
                 Information Systems --- Information Storage and
                 Retrieval --- Information Search and Retrieval (H.3.3):
                 {\bf Clustering}; Information Systems --- Information
                 Storage and Retrieval --- Information Search and
                 Retrieval (H.3.3): {\bf Retrieval models}; Information
                 Systems --- Information Storage and Retrieval ---
                 Information Search and Retrieval (H.3.3): {\bf Search
                 process}; Information Systems --- Miscellaneous (H.m)",
}

@Article{Vanderwiel:2000:DPM,
  author =       "Steven P. Vanderwiel and David J. Lilja",
  title =        "Data prefetch mechanisms",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "2",
  pages =        "174--199",
  month =        jun,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/358923.358939",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:14:26 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-2/p174-vanderwiel/p174-vanderwiel.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-2/p174-vanderwiel/",
  abstract =     "The expanding gap between microprocessor and DRAM
                 performance has necessitated the use of increasingly
                 aggressive techniques designed to reduce or hide the
                 latency of main memory access. Although large cache
                 hierarchies have proven to be effective in reducing
                 this latency for the most frequently used data, it is
                 still not uncommon for many programs to spend more than
                 half their run times stalled on memory requests. Data
                 prefetching has been proposed as a technique for hiding
                 the access latency of data referencing patterns that
                 defeat caching strategies. Rather than waiting for a
                 cache miss to initiate a memory fetch, data prefetching
                 anticipates such misses and issues a fetch to the
                 memory system in advance of the actual memory
                 reference. To be effective, prefetching must be
                 implemented in such a way that prefetches are timely,
                 useful, and introduce little overhead. Secondary
                 effects such as cache pollution and increased memory
                 bandwidth requirements must also be taken into
                 consideration. Despite these obstacles, prefetching has
                 the potential to significantly improve overall program
                 execution time by overlapping computation with memory
                 accesses. Prefetching strategies are diverse, and no
                 single strategy has yet been proposed that provides
                 optimal performance. The following survey examines
                 several alternative approaches, and discusses the
                 design tradeoffs involved when implementing a data
                 prefetch strategy.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Design; Performance",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "memory latency; prefetching",
  subject =      "Hardware --- Memory Structures --- Design Styles
                 (B.3.2): {\bf Cache memories}; Hardware --- Memory
                 Structures (B.3)",
}

@Article{Ashman:2000:EDA,
  author =       "Helen Ashman",
  title =        "Electronic document addressing: dealing with change",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "3",
  pages =        "201--212",
  month =        sep,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/367701.367702",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:14:44 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-3/p201-ashman/p201-ashman.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-3/p201-ashman/",
  abstract =     "The management of electronic document collections is
                 fundamentally different from the management of paper
                 documents. The ephemeral nature of some electronic
                 documents means that the document address (i.e.,
                 reference details of the document) can become incorrect
                 some time after coming into use, resulting in
                 references, such as index entries and hypertext links,
                 failing to correctly address the document they
                 describe. A classic case of invalidated references is
                 on the World Wide Web--links that point to a named
                 resource fail when the domain name, file name, or any
                 other aspect of the addressed resource is changed,
                 resulting in the well-known Error 404. Additionally,
                 there are other errors which arise from changes to
                 document collections. \par

                 This paper surveys the strategies used both in World
                 Wide Web software and other hypertext systems for
                 managing the integrity of references and hence the
                 integrity of links. Some strategies are {\em
                 preventative}, not permitting errors to occur; others
                 are {\em corrective}, discovering references errors and
                 sometimes attempting to correct them; while the last
                 strategy is {\em adaptive}, because references are
                 calculated on a just-in-time basis, according the
                 current state of the document collection.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Management; Reliability",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "404; link; link integrity",
  subject =      "Information Systems --- Information Interfaces and
                 Presentation --- Hypertext/Hypermedia (H.5.4)",
}

@Article{Kazi:2000:TOH,
  author =       "Iffat H. Kazi and Howard H. Chen and Berdenia Stanley
                 and David J. Lilja",
  title =        "Techniques for obtaining high performance in {Java}
                 programs",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "3",
  pages =        "213--240",
  month =        sep,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/367701.367714",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:14:44 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-3/p213-kazi/p213-kazi.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-3/p213-kazi/",
  abstract =     "This survey describes research directions in
                 techniques to improve the performance of programs
                 written in the Java programming language. The standard
                 technique for Java execution is interpretation, which
                 provides for extensive portability of programs. A Java
                 interpreter dynamically executes Java bytecodes, which
                 comprise the instruction set of the Java Virtual
                 Machine (JVM). Execution time performance of Java
                 programs can be improved through compilation, possibly
                 at the expense of portability. Various types of Java
                 compilers have been proposed, including Just-In-Time
                 (JIT) compilers that compile bytecode into native
                 processor instructions on the fly; direct compilers
                 that directly translate the Java source code into the
                 target processor's native language; and
                 bytecode-to-source translators that generate either
                 native code or an intermediate language, such as C,
                 from the bytecodes. Additional techniques, including
                 bytecode optimization, dynamic compilation, and
                 executing Java programs in parallel, attempt to improve
                 Java run-time performance while maintaining Java's
                 portability. Another alternative for executing Java
                 programs is a Java processor that implements the JVM
                 directly in hardware. In this survey, we discuss the
                 basis features, and the advantages and disadvantages,
                 of the various Java execution techniques. We also
                 discuss the various Java benchmarks that are being used
                 by the Java community for performance evaluation of the
                 different techniques. Finally, we conclude with a
                 comparison of the performance of the alternative Java
                 execution techniques based on reported results.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Languages; Performance",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "bytecode-to-source translators; direct compilers;
                 dynamic compilation; interpreters; Java; Java virtual
                 machine; just-in-time compilers",
  subject =      "General Literature --- Introductory and Survey (A.1);
                 Computer Systems Organization --- Performance of
                 Systems (C.4); Software --- Programming Languages
                 (D.3)",
}

@Article{Milojicic:2000:PM,
  author =       "Dejan S. Milo{\'\j}i{\v{c}}i{\'c} and Fred Douglis and
                 Yves Paindaveine and Richard Wheeler and Songnian
                 Zhou",
  title =        "Process migration",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "3",
  pages =        "241--299",
  month =        sep,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/367701.367728",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:14:44 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-3/p241-miloiic/p241-miloiic.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-3/p241-miloiic/",
  abstract =     "Process migration is the act of transferring a process
                 between two machines. It enables dynamic load
                 distribution, fault resilience, eased system
                 administration, and data access locality. Despite these
                 goals and ongoing research efforts, migration has not
                 achieved widespread use. With the increasing deployment
                 of distributed systems in general, and distributed
                 operating systems in particular, process migration is
                 again receiving more attention in both research and
                 product development. As high-performance facilities
                 shift from supercomputers to networks of workstations,
                 and with the ever-increasing role of the World Wide
                 Web, we expect migration to play a more important role
                 and eventually to be widely adopted. \par

                 This survey reviews the field of process migration by
                 summarizing the key concepts and giving an overview of
                 the most important implementations. Design and
                 implementation issues of process migration are analyzed
                 in general, and then revisited for each of the case
                 studies described: MOSIX, Sprite, Mach, and Load
                 Sharing Facility. The benefits and drawbacks of process
                 migration depend on the details of implementation and,
                 therefore, this paper focuses on practical matters.
                 This survey will help in understanding the potentials
                 of process migration and why it has not caught on.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Design; Experimentation",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "distributed operating systems; distributed systems;
                 load distribution; process migration",
  subject =      "Computer Systems Organization ---
                 Computer-Communication Networks --- Distributed Systems
                 (C.2.4): {\bf Network operating systems}; Software ---
                 Operating Systems --- Organization and Design (D.4.7):
                 {\bf Distributed systems}; Software --- Operating
                 Systems --- Performance (D.4.8): {\bf Measurements};
                 Software --- Operating Systems --- Storage Management
                 (D.4.2): {\bf Distributed memories}",
}

@Article{Rieffel:2000:IQC,
  author =       "Eleanor Rieffel and Wolfgang Polak",
  title =        "An introduction to quantum computing for
                 non-physicists",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "3",
  pages =        "300--335",
  month =        sep,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/367701.367709",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:14:44 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-3/p300-rieffel/p300-rieffel.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-3/p300-rieffel/",
  abstract =     "Richard Feynman's observation that certain quantum
                 mechanical effects cannot be simulated efficiently on a
                 computer led to speculation that computation in general
                 could be done more efficiently if it used these quantum
                 effects. This speculation proved justified when Peter
                 Shor described a polynomial time quantum algorithm for
                 factoring integers. \par

                 In quantum systems, the computational space increases
                 exponentially with the size of the system, which
                 enables exponential parallelism. This parallelism could
                 lead to exponentially faster quantum algorithms than
                 possible classically. The catch is that accessing the
                 results, which requires measurement, proves tricky and
                 requires new nontraditional programming techniques.
                 \par

                 The aim of this paper is to guide computer scientists
                 through the barriers that separate quantum computing
                 from conventional computing. We introduce basic
                 principles of quantum mechanics to explain where the
                 power of quantum computers comes from and why it is
                 difficult to harness. We describe quantum cryptography,
                 teleportation, and dense coding. Various approaches to
                 exploiting the power of quantum parallelism are
                 explained. We conclude with a discussion of quantum
                 error correction.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Algorithms; Security; Theory",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "complexity; parallelism; quantum computing",
  subject =      "General Literature --- Introductory and Survey (A.1);
                 Computer Applications --- Physical Sciences and
                 Engineering (J.2): {\bf Physics}",
}

@Article{Chesnevar:2000:LMA,
  author =       "Carlos Iv{\'a}n Ches{\~n}evar and Ana Gabriela
                 Maguitman and Ronald Prescott Loui",
  title =        "Logical models of argument",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "4",
  pages =        "337--383",
  month =        dec,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/371578.371581",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:15:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-4/p337-chesnevar/p337-chesnevar.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-4/p337-chesnevar/",
  abstract =     "Logical models of argument formalize commonsense
                 reasoning while taking process and computation
                 seriously. This survey discusses the main ideas that
                 characterize different logical models of argument. It
                 presents the formal features of a few features of a few
                 main approaches to the modeling of argumentation. We
                 trace the evolution of argumentation from the
                 mid-1980s, when argument systems emerged as an
                 alternative to nonmonotonic formalisms based on
                 classical logic, to the present, as argument in
                 embedded in different complex systems for real-world
                 applications, and allow more formal work to be done in
                 different areas, such as AI and Law, case-based
                 reasoning and negotiation among intelligent agents.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Theory",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "argumentation; argumentative systems; defeasible
                 argumentation; defeasible reasoning; reasoning",
  subject =      "Computing Methodologies --- Artificial Intelligence
                 --- Knowledge Representation Formalisms and Methods
                 (I.2.4)",
}

@Article{Hilbert:2000:EUI,
  author =       "David M. Hilbert and David F. Redmiles",
  title =        "Extracting usability information from user interface
                 events",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "4",
  pages =        "384--421",
  month =        dec,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/371578.371593",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:15:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-4/p384-hilbert/p384-hilbert.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-4/p384-hilbert/",
  abstract =     "Modern window-based user interface systems generate
                 user interface events as natural products of their
                 normal operation. Because such events can be
                 automatically captured and because they indicate user
                 behavior with respect to an application's user
                 interface, they have long been regarded as a
                 potentially fruitful source of information regarding
                 application usage and usability. However, because user
                 interface events are typically voluminous and rich in
                 detail, automated support is generally required to
                 extract information at a level of abstraction that is
                 useful to investigators interested in analyzing
                 application usage or evaluating usability. This survey
                 examines computer-aided techniques used by HCI
                 practitioners and researchers to extract
                 usability-related information from user interface
                 events. A framework is presented to help HCI
                 practitioners and researchers categorize and compare
                 the approaches that have been, or might fruitfully be,
                 applied to this problem. Because many of the techniques
                 in the research literature have not been evaluated in
                 practice, this survey provides a conceptual evaluation
                 to help identify some of the relative merits and
                 drawbacks of the various classes of approaches. Ideas
                 for future research in this area are also presented.
                 This survey addresses the following questions: How
                 might user interface events be used in evaluating
                 usability? How are user interface events related to
                 other forms of usability data? What are the key
                 challenges faced by investigators wishing to exploit
                 this data? What approaches have been brought to bear on
                 this problem and how do they compare to one another?
                 What are some of the important open research questions
                 in this area?",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Experimentation; Human Factors; Measurement",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "human-computer interaction; sequential data analysis;
                 usability testing; user interface event monitoring",
  subject =      "Information Systems --- Information Interfaces and
                 Presentation --- User Interfaces (H.5.2): {\bf
                 Evaluation/methodology}",
}

@Article{Kossmann:2000:SAD,
  author =       "Donald Kossmann",
  title =        "The state of the art in distributed query processing",
  journal =      j-COMP-SURV,
  volume =       "32",
  number =       "4",
  pages =        "422--469",
  month =        dec,
  year =         "2000",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/371578.371598",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:15:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2000-32-4/p422-kossmann/p422-kossmann.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2000-32-4/p422-kossmann/",
  abstract =     "Distributed data processing is becoming a reality.
                 Businesses want to do it for many reasons, and they
                 often must do it in order to stay competitive. While
                 much of the infrastructure for distributed data
                 processing is already there (e.g., modern network
                 technology), a number of issues make distributed data
                 processing still a complex undertaking: (1) distributed
                 systems can become very large, involving thousands of
                 heterogeneous sites including PCs and mainframe server
                 machines; (2) the state of a distributed system changes
                 rapidly because the load of sites varies over time and
                 new sites are added to the system; (3) legacy systems
                 need to be integrated --- such legacy systems usually
                 have not been designed for distributed data processing
                 and now need to interact with other (modern) systems in
                 a distributed environment. This paper presents the
                 state of the art of query processing for distributed
                 database and information systems. The paper presents
                 the ``textbook'' architecture for distributed query
                 processing and a series of techniques that are
                 particularly useful for distributed database systems.
                 These techniques include special join techniques,
                 techniques to exploit intraquery parallelism,
                 techniques to reduce communication costs, and
                 techniques to exploit caching and replication of data.
                 Furthermore, the paper discusses different kinds of
                 distributed systems such as client-server, middleware
                 (multitier), and heterogeneous database systems, and
                 shows how query processing works in these systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Algorithms; Performance",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "caching; client-server databases; database application
                 systems; dissemination-based information systems;
                 economic models for query processing; middleware;
                 multitier architectures; query execution; query
                 optimization; replication; wrappers",
  subject =      "Data --- Files (E.5); Information Systems --- Database
                 Management --- Systems (H.2.4): {\bf Distributed
                 databases}; Information Systems --- Database Management
                 --- Systems (H.2.4): {\bf Query processing};
                 Information Systems --- Database Management ---
                 Heterogeneous Databases (H.2.5): {\bf Data
                 translation**}",
}

@Article{Greiner:2001:ER,
  author =       "Russell Greiner and Christian Darken and N. Iwan
                 Santoso",
  title =        "Efficient reasoning",
  journal =      j-COMP-SURV,
  volume =       "33",
  number =       "1",
  pages =        "1--30",
  month =        mar,
  year =         "2001",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/375360.375363",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:15:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2001-33-1/p1-greiner/p1-greiner.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2001-33-1/p1-greiner/",
  abstract =     "Many tasks require ``reasoning''--i.e., deriving
                 conclusions from a corpus of explicitly stored
                 information--to solve their range of problems. An ideal
                 reasoning system would produce all-and-only the {\em
                 correct\/} answers to every possible query, produce
                 answers that are as {\em specific\/} as possible, be
                 {\em expressive\/} enough to permit any possible fact
                 to be stored and any possible query to be asked, and be
                 (time) {\em efficient}. Unfortunately, this is provably
                 impossible: as correct and precise systems become more
                 expressive, they can become increasingly inefficient,
                 or even undecidable. This survey first formalizes these
                 hardness results, in the context of both logic- and
                 probability-based reasoning, then overviews the
                 techniques now used to address, or at least side-step,
                 this dilemma.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Algorithms; Performance",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "efficiency trade-offs;
                 soundness/completeness/expressibility",
  subject =      "Computing Methodologies --- Artificial Intelligence
                 --- Deduction and Theorem Proving (I.2.3); Computing
                 Methodologies --- Artificial Intelligence --- Knowledge
                 Representation Formalisms and Methods (I.2.4)",
}

@Article{Navarro:2001:GTA,
  author =       "Gonzalo Navarro",
  title =        "A guided tour to approximate string matching",
  journal =      j-COMP-SURV,
  volume =       "33",
  number =       "1",
  pages =        "31--88",
  month =        mar,
  year =         "2001",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/375360.375365",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:15:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2001-33-1/p31-navarro/p31-navarro.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2001-33-1/p31-navarro/",
  abstract =     "We survey the current techniques to cope with the
                 problem of string matching that allows errors. This is
                 becoming a more and more relevant issue for many fast
                 growing areas such as information retrieval and
                 computational biology. We focus on online searching and
                 mostly on edit distance, explaining the problem and its
                 relevance, its statistical behavior, its history and
                 current developments, and the central ideas of the
                 algorithms and their complexities. We present a number
                 of experiments to compare the performance of the
                 different algorithms and show which are the best
                 choices. We conclude with some directions for future
                 work and open problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Algorithms",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "edit distance; Levenshtein distance; online string
                 matching; text searching allowing errors",
  subject =      "Theory of Computation --- Analysis of Algorithms and
                 Problem Complexity --- Nonnumerical Algorithms and
                 Problems (F.2.2): {\bf Computations on discrete
                 structures}; Information Systems --- Information
                 Storage and Retrieval --- Information Search and
                 Retrieval (H.3.3): {\bf Search process}",
}

@Article{Weihe:2001:SEP,
  author =       "Karsten Weihe",
  title =        "A software engineering perspective on algorithmics",
  journal =      j-COMP-SURV,
  volume =       "33",
  number =       "1",
  pages =        "89--134",
  month =        mar,
  year =         "2001",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/375360.375367",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:15:39 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/surveys/2001-33-1/p89-weihe/p89-weihe.pdf;
                 http://www.acm.org/pubs/citations/journals/surveys/2001-33-1/p89-weihe/",
  abstract =     "An {\em algorithm component\/} is an implementation of
                 an algorithm which is not intended to be a stand-alone
                 module, but to perform a specific task within a large
                 software package or even within several distinct
                 software packages. Therefore, the design of algorithm
                 components must also incorporate software-engineering
                 aspects. A key design goal is adaptability. This goal
                 is important for maintenance throughout a project,
                 prototypical development, and reuse in new, unforseen
                 contexts. From a theoretical viewpoint most algorithms
                 apply to a range of possible use scenarios. Ideally,
                 each algorithm is implemented by one algorithm
                 component, which is easily, safely, and efficiently
                 adaptable to all of these contexts. \par

                 Various techniques have been developed for the design
                 and implementation of algorithm components. However, a
                 common basis for systematic, detailed evaluations and
                 comparisons in view of the {\em real\/} practical needs
                 is still missing. Basically, this means a set of
                 concrete criteria, which specify what sort of
                 adaptability is {\em really\/} required in practice,
                 and which are well-justified by convincing,
                 representative use scenarios. \par

                 This paper is intended to be a first ``milestone'' on
                 the way towards such a system of criteria. We will
                 present a set of concrete goals, which are general and
                 problem-independent and might appear ubiquitously in
                 the algorithmic realm. These goals are illustrated,
                 motivated, and justified by an extensive requirements
                 analysis for a particular algorithm from a particular
                 algorithmic domain: Dijkstra's algorithm for shortest
                 paths in networks. \par

                 Clearly, the field of algorithmics might be too
                 versatile to allow a comprehensive, yet concise set of
                 precise, justified criteria. Even a domain as
                 restricted as graph and network algorithms includes
                 aspects that are not fully understood. The analysis
                 will include a discussion of the limits of the case
                 study and the scope of the goals. The case study was
                 chosen because it seems to be close to the
                 ``borderline'' between the aspects that are well
                 understood and the aspects that are not. Hence, this
                 example may well serve as an``acid test'' for
                 programming techniques in view of the state of the
                 art.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  generalterms = "Algorithms; Design; Languages",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "algorithm engineering",
  subject =      "Software --- Software Engineering --- Reusable
                 Software (D.2.13); Software --- Programming Languages
                 --- Language Constructs and Features (D.3.3);
                 Mathematics of Computing --- Discrete Mathematics ---
                 Graph Theory (G.2.2): {\bf Graph algorithms};
                 Mathematics of Computing --- Mathematical Software
                 (G.4)",
}

@Article{Degano:2001:EOS,
  author =       "Pierpaolo Degano and Corrado Priami",
  title =        "Enhanced operational semantics: a tool for describing
                 and analyzing concurrent systems",
  journal =      j-COMP-SURV,
  volume =       "33",
  number =       "2",
  pages =        "135--176",
  month =        jun,
  year =         "2001",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/384192.384194",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:16:06 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article surveys the definition and application of
                 an enhancement of structural operational semantics in
                 the field of concurrent systems, and also addresses
                 issues of distribution and mobility of code. The focus
                 is on how enriching the labels of transitions with
                 encodings of their deduction trees is sufficient to
                 derive qualitative and quantitative information on the
                 systems in hand simply by relabeling the transitions of
                 a unique concrete model.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "parametric models; process algebra",
}

@Article{Littlewood:2001:MSD,
  author =       "Bev Littlewood and Peter Popov and Lorenzo Strigini",
  title =        "Modeling software design diversity: a review",
  journal =      j-COMP-SURV,
  volume =       "33",
  number =       "2",
  pages =        "177--208",
  month =        jun,
  year =         "2001",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/384192.384195",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:16:06 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Design diversity has been used for many years now as a
                 means of achieving a degree of fault tolerance in
                 software-based systems. While there is clear evidence
                 that the approach can be expected to deliver some
                 increase in reliability compared to a single version,
                 there is no agreement about the extent of this. More
                 importantly, it remains difficult to evaluate exactly
                 how reliable a particular diverse fault-tolerant system
                 is. This difficulty arises because assumptions of
                 independence of failures between different versions
                 have been shown to be untenable: assessment of the
                 actual level of dependence present is therefore needed,
                 and this is difficult. In this tutorial, we survey the
                 modeling issues here, with an emphasis upon the impact
                 these have upon the problem of assessing the
                 reliability of fault-tolerant systems. The intended
                 audience is one of designers, assessors, and project
                 managers with only a basic knowledge of probabilities,
                 as well as reliability experts without detailed
                 knowledge of software, who seek an introduction to the
                 probabilistic issues in decisions about design
                 diversity.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "control systems; functional diversity; multiple
                 version programming; N -version software; protection
                 systems; safety; software fault tolerance",
}

@Article{Vitter:2001:EMA,
  author =       "Jeffrey Scott Vitter",
  title =        "External memory algorithms and data structures:
                 dealing with {\bf massive data}",
  journal =      j-COMP-SURV,
  volume =       "33",
  number =       "2",
  pages =        "209--271",
  month =        jun,
  year =         "2001",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/384192.384193",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:16:06 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Data sets in large applications are often too massive
                 to fit completely inside the computers internal memory.
                 The resulting input/output communication (or I/O)
                 between fast internal memory and slower external memory
                 (such as disks) can be a major performance bottleneck.
                 In this article we survey the state of the art in the
                 design and analysis of external memory (or EM)
                 algorithms and data structures, where the goal is to
                 exploit locality in order to reduce the I/O costs. We
                 consider a variety of EM paradigms for solving batched
                 and online problems efficiently in external memory. For
                 the batched problem of sorting and related problems
                 such as permuting and fast Fourier transform, the key
                 paradigms include distribution and merging. The
                 paradigm of disk striping offers an elegant way to use
                 multiple disks in parallel. For sorting, however, disk
                 striping can be nonoptimal with respect to I/O, so to
                 gain further improvements we discuss distribution and
                 merging techniques for using the disks independently.
                 We also consider useful techniques for batched EM
                 problems involving matrices (such as matrix
                 multiplication and transposition), geometric data (such
                 as finding intersections and constructing convex
                 hulls), and graphs (such as list ranking, connected
                 components, topological sorting, and shortest paths).
                 In the online domain, canonical EM applications include
                 dictionary lookup and range searching. The two
                 important classes of indexed data structures are based
                 upon extendible hashing and B-trees. The paradigms of
                 filtering and bootstrapping provide a convenient means
                 in online data structures to make effective use of the
                 data accessed from disk. We also reexamine some of the
                 above EM problems in slightly different settings, such
                 as when the data items are moving, when the data items
                 are variable-length (e.g., text strings), or when the
                 allocated amount of internal memory can change
                 dynamically. Programming tools and environments are
                 available for simplifying the EM programming task.
                 During the course of the survey, we report on some
                 experiments in the domain of spatial databases using
                 the TPIE system (transparent parallel I/O programming
                 environment). The newly developed EM algorithms and
                 data structures that incorporate the paradigms we
                 discuss are significantly faster than methods currently
                 used in practice.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "B-tree; batched; block; disk; dynamic; extendible
                 hashing; external memory; hierarchical memory; I/O;
                 multidimensional access methods; multilevel memory;
                 online; out-of-core; secondary storage; sorting",
}

@Article{Chavez:2001:SMS,
  author =       "Edgar Ch{\'a}vez and Gonzalo Navarro and Ricardo
                 Baeza-Yates and Jos{\'e} Luis Marroqu{\'\i}n",
  title =        "Searching in metric spaces",
  journal =      j-COMP-SURV,
  volume =       "33",
  number =       "3",
  pages =        "273--321",
  month =        sep,
  year =         "2001",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/502807.502808",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:16:31 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The problem of searching the elements of a set that
                 are close to a given query element under some
                 similarity criterion has a vast number of applications
                 in many branches of computer science, from pattern
                 recognition to textual and multimedia information
                 retrieval. We are interested in the rather general case
                 where the similarity criterion defines a metric space,
                 instead of the more restricted case of a vector space.
                 Many solutions have been proposed in different areas,
                 in many cases without cross-knowledge. Because of this,
                 the same ideas have been reconceived several times, and
                 very different presentations have been given for the
                 same approaches. We present some basic results that
                 explain the intrinsic difficulty of the search problem.
                 This includes a quantitative definition of the elusive
                 concept of 'intrinsic dimensionality.' We also present
                 a unified view of all the known proposals to organize
                 metric spaces, so as to be able to understand them
                 under a common framework. Most approaches turn out to
                 be variations on a few different concepts. We organize
                 those works in a taxonomy that allows us to devise new
                 algorithms from combinations of concepts not noticed
                 before because of the lack of communication between
                 different communities. We present experiments
                 validating our results and comparing the existing
                 approaches. We finish with recommendations for
                 practitioners and open questions for future
                 development.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Curse of dimensionality; nearest neighbors; similarity
                 searching; vector spaces",
}

@Article{Bohm:2001:SHD,
  author =       "Christian B{\"o}hm and Stefan Berchtold and Daniel A.
                 Keim",
  title =        "Searching in high-dimensional spaces: {Index}
                 structures for improving the performance of multimedia
                 databases",
  journal =      j-COMP-SURV,
  volume =       "33",
  number =       "3",
  pages =        "322--373",
  month =        sep,
  year =         "2001",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/502807.502809",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:16:31 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "During the last decade, multimedia databases have
                 become increasingly important in many application areas
                 such as medicine, CAD, geography, and molecular
                 biology. An important research issue in the field of
                 multimedia databases is the content-based retrieval of
                 similar multimedia objects such as images, text, and
                 videos. However, in contrast to searching data in a
                 relational database, a content-based retrieval requires
                 the search of similar objects as a basic functionality
                 of the database system. Most of the approaches
                 addressing similarity search use a so-called feature
                 transformation that transforms important properties of
                 the multimedia objects into high-dimensional points
                 (feature vectors). Thus, the similarity search is
                 transformed into a search of points in the feature
                 space that are close to a given query point in the
                 high-dimensional feature space. Query processing in
                 high-dimensional spaces has therefore been a very
                 active research area over the last few years. A number
                 of new index structures and algorithms have been
                 proposed. It has been shown that the new index
                 structures considerably improve the performance in
                 querying large multimedia databases. Based on recent
                 tutorials [Berchtold and Keim 1998], in this survey we
                 provide an overview of the current state of the art in
                 querying multimedia databases, describing the index
                 structures and algorithms for an efficient query
                 processing in high-dimensional spaces. We identify the
                 problems of processing queries in high-dimensional
                 space, and we provide an overview of the proposed
                 approaches to overcome these problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Index structures; indexing high-dimensional data;
                 multimedia databases; similarity search",
}

@Article{Dantsin:2001:CEP,
  author =       "Evgeny Dantsin and Thomas Eiter and Georg Gottlob and
                 Andrei Voronkov",
  title =        "Complexity and expressive power of logic programming",
  journal =      j-COMP-SURV,
  volume =       "33",
  number =       "3",
  pages =        "374--425",
  month =        sep,
  year =         "2001",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/502807.502810",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:16:31 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article surveys various complexity and
                 expressiveness results on different forms of logic
                 programming. The main focus is on decidable forms of
                 logic programming, in particular, propositional logic
                 programming and datalog, but we also mention general
                 logic programming with function symbols. Next to
                 classical results on plain logic programming (pure Horn
                 clause programs), more recent results on various
                 important extensions of logic programming are surveyed.
                 These include logic programming with different forms of
                 negation, disjunctive logic programming, logic
                 programming with equality, and constraint logic
                 programming.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Complexity; datalog; expressive power; logic
                 programming; nonmonotonic logic; query languages",
}

@Article{Chockler:2001:GCS,
  author =       "Gregory V. Chockler and Idit Keidar and Roman
                 Vitenberg",
  title =        "Group communication specifications: a comprehensive
                 study",
  journal =      j-COMP-SURV,
  volume =       "33",
  number =       "4",
  pages =        "427--469",
  month =        dec,
  year =         "2001",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/503112.503113",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:17:06 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "View-oriented group communication is an important and
                 widely used building block for many distributed
                 applications. Much current research has been dedicated
                 to specifying the semantics and services of
                 view-oriented group communication systems (GCSs).
                 However, the guarantees of different GCSs are
                 formulated using varying terminologies and modeling
                 techniques, and the specifications vary in their rigor.
                 This makes it difficult to analyze and compare the
                 different systems. This survey provides a comprehensive
                 set of clear and rigorous specifications, which may be
                 combined to represent the guarantees of most existing
                 GCSs. In the light of these specifications, over 30
                 published GCS specifications are surveyed. Thus, the
                 specifications serve as a unifying framework for the
                 classification, analysis, and comparison of group
                 communication systems. The survey also discusses over a
                 dozen different applications of group communication
                 systems, shedding light on the usefulness of the
                 presented specifications. This survey is aimed at both
                 system builders and theoretical researchers. The
                 specification framework presented in this article will
                 help builders of group communication systems understand
                 and specify their service semantics; the extensive
                 survey will allow them to compare their service to
                 others. Application builders will find a guide here to
                 the services provided by a large variety of GCSs, which
                 could help them choose the GCS appropriate for their
                 needs. The formal framework may provide a basis for
                 interesting theoretical work, for example, analyzing
                 relative strengths of different properties and the
                 costs of implementing them.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Group communication systems; partitionable group
                 membership; process group membership; specifications of
                 group communication systems; view synchrony; virtual
                 synchrony",
}

@Article{Ivory:2001:SAA,
  author =       "Melody Y. Ivory and Marti A. Hearst",
  title =        "The state of the art in automating usability
                 evaluation of user interfaces",
  journal =      j-COMP-SURV,
  volume =       "33",
  number =       "4",
  pages =        "470--516",
  month =        dec,
  year =         "2001",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/503112.503114",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:17:06 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Usability evaluation is an increasingly important part
                 of the user interface design process. However,
                 usability evaluation can be expensive in terms of time
                 and human resources, and automation is therefore a
                 promising way to augment existing approaches. This
                 article presents an extensive survey of usability
                 evaluation methods, organized according to a new
                 taxonomy that emphasizes the role of automation. The
                 survey analyzes existing techniques, identifies which
                 aspects of usability evaluation automation are likely
                 to be of use in future research, and suggests new ways
                 to expand existing approaches to better support
                 usability evaluation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Graphical user interfaces; taxonomy; usability
                 evaluation automation; Web interfaces",
}

@Article{Hartel:2001:FSJ,
  author =       "Pieter H. Hartel and Luc Moreau",
  title =        "Formalizing the safety of {Java}, the {Java Virtual
                 Machine}, and {Java} card",
  journal =      j-COMP-SURV,
  volume =       "33",
  number =       "4",
  pages =        "517--558",
  month =        dec,
  year =         "2001",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/503112.503115",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:17:06 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We review the existing literature on Java safety,
                 emphasizing formal approaches, and the impact of Java
                 safety on small footprint devices such as smartcards.
                 The conclusion is that although a lot of good work has
                 been done, a more concerted effort is needed to build a
                 coherent set of machine-readable formal models of the
                 whole of Java and its implementation. This is a
                 formidable task but we believe it is essential to build
                 trust in Java safety, and thence to achieve ITSEC level
                 6 or Common Criteria level 7 certification for Java
                 programs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Common criteria; programming",
}

@Article{Sebastiani:2002:MLA,
  author =       "Fabrizio Sebastiani",
  title =        "Machine learning in automated text categorization",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "1",
  pages =        "1--47",
  month =        mar,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/505282.505283",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:17:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The automated categorization (or classification) of
                 texts into predefined categories has witnessed a
                 booming interest in the last 10 years, due to the
                 increased availability of documents in digital form and
                 the ensuing need to organize them. In the research
                 community the dominant approach to this problem is
                 based on machine learning techniques: a general
                 inductive process automatically builds a classifier by
                 learning, from a set of preclassified documents, the
                 characteristics of the categories. The advantages of
                 this approach over the knowledge engineering approach
                 (consisting in the manual definition of a classifier by
                 domain experts) are a very good effectiveness,
                 considerable savings in terms of expert labor power,
                 and straightforward portability to different domains.
                 This survey discusses the main approaches to text
                 categorization that fall within the machine learning
                 paradigm. We will discuss in detail issues pertaining
                 to three different problems, namely, document
                 representation, classifier construction, and classifier
                 evaluation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Machine learning; text categorization; text
                 classification",
}

@Article{Meng:2002:BEE,
  author =       "Weiyi Meng and Clement Yu and King-Lup Liu",
  title =        "Building efficient and effective metasearch engines",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "1",
  pages =        "48--89",
  month =        mar,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/505282.505284",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:17:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Frequently a user's information needs are stored in
                 the databases of multiple search engines. It is
                 inconvenient and inefficient for an ordinary user to
                 invoke multiple search engines and identify useful
                 documents from the returned results. To support unified
                 access to multiple search engines, a metasearch engine
                 can be constructed. When a metasearch engine receives a
                 query from a user, it invokes the underlying search
                 engines to retrieve useful information for the user.
                 Metasearch engines have other benefits as a search tool
                 such as increasing the search coverage of the Web and
                 improving the scalability of the search. In this
                 article, we survey techniques that have been proposed
                 to tackle several underlying challenges for building a
                 good metasearch engine. Among the main challenges, the
                 database selection problem is to identify search
                 engines that are likely to return useful documents to a
                 given query. The document selection problem is to
                 determine what documents to retrieve from each
                 identified search engine. The result merging problem is
                 to combine the documents returned from multiple search
                 engines. We will also point out some problems that need
                 to be further researched.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Collection fusion; distributed collection; distributed
                 information retrieval; information resource discovery;
                 metasearch",
}

@Article{McTear:2002:SDT,
  author =       "Michael F. McTear",
  title =        "Spoken dialogue technology: enabling the
                 conversational user interface",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "1",
  pages =        "90--169",
  month =        mar,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/505282.505285",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:17:34 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Spoken dialogue systems allow users to interact with
                 computer-based applications such as databases and
                 expert systems by using natural spoken language. The
                 origins of spoken dialogue systems can be traced back
                 to Artificial Intelligence research in the 1950s
                 concerned with developing conversational interfaces.
                 However, it is only within the last decade or so, with
                 major advances in speech technology, that large-scale
                 working systems have been developed and, in some cases,
                 introduced into commercial environments. As a result
                 many major telecommunications and software companies
                 have become aware of the potential for spoken dialogue
                 technology to provide solutions in newly developing
                 areas such as computer-telephony integration. Voice
                 portals, which provide a speech-based interface between
                 a telephone user and Web-based services, are the most
                 recent application of spoken dialogue technology. This
                 article describes the main components of the
                 technology---speech recognition, language
                 understanding, dialogue management, communication with
                 an external source such as a database, language
                 generation, speech synthesis---and shows how these
                 component technologies can be integrated into a spoken
                 dialogue system. The article describes in detail the
                 methods that have been adopted in some well-known
                 dialogue systems, explores different system
                 architectures, considers issues of specification,
                 design, and evaluation, reviews some currently
                 available dialogue development toolkits, and outlines
                 prospects for future development.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Dialogue management; human computer interaction;
                 language generation; language understanding; speech
                 recognition; speech synthesis",
}

@Article{Compton:2002:RCS,
  author =       "Katherine Compton and Scott Hauck",
  title =        "Reconfigurable computing: a survey of systems and
                 software",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "2",
  pages =        "171--210",
  month =        jun,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/508352.508353",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:17:56 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Due to its potential to greatly accelerate a wide
                 variety of applications, reconfigurable computing has
                 become a subject of a great deal of research. Its key
                 feature is the ability to perform computations in
                 hardware to increase performance, while retaining much
                 of the flexibility of a software solution. In this
                 survey, we explore the hardware aspects of
                 reconfigurable computing machines, from single chip
                 architectures to multi-chip systems, including internal
                 structures and external coupling. We also focus on the
                 software that targets these machines, such as
                 compilation tools that map high-level algorithms
                 directly to the reconfigurable substrate. Finally, we
                 consider the issues involved in run-time reconfigurable
                 systems, which reuse the configurable hardware during
                 program execution.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Automatic design; field-programmable; FPGA; manual
                 design; reconfigurable architectures; reconfigurable
                 computing; reconfigurable systems",
}

@Article{Petitjean:2002:SMR,
  author =       "Sylvain Petitjean",
  title =        "A survey of methods for recovering quadrics in
                 triangle meshes",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "2",
  pages =        "211--262",
  month =        jun,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/508352.508354",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:17:56 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In a variety of practical situations such as reverse
                 engineering of boundary representation from depth maps
                 of scanned objects, range data analysis, model-based
                 recognition and algebraic surface design, there is a
                 need to recover the shape of visible surfaces of a
                 dense 3D point set. In particular, it is desirable to
                 identify and fit simple surfaces of known type wherever
                 these are in reasonable agreement with the data. We are
                 interested in the class of quadric surfaces, that is,
                 algebraic surfaces of degree 2, instances of which are
                 the sphere, the cylinder and the cone. A comprehensive
                 survey of the recent work in each subtask pertaining to
                 the extraction of quadric surfaces from triangulations
                 is presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Data fitting; geometry enhancement; local geometry
                 estimation; mesh fairing; shape recovery",
}

@Article{Cardellini:2002:SAL,
  author =       "Valeria Cardellini and Emiliano Casalicchio and
                 Michele Colajanni and Philip S. Yu",
  title =        "The state of the art in locally distributed
                 {Web}-server systems",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "2",
  pages =        "263--311",
  month =        jun,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/508352.508355",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:17:56 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The overall increase in traffic on the World Wide Web
                 is augmenting user-perceived response times from
                 popular Web sites, especially in conjunction with
                 special events. System platforms that do not replicate
                 information content cannot provide the needed
                 scalability to handle large traffic volumes and to
                 match rapid and dramatic changes in the number of
                 clients. The need to improve the performance of
                 Web-based services has produced a variety of novel
                 content delivery architectures. This article will focus
                 on Web system architectures that consist of multiple
                 server nodes distributed on a local area, with one or
                 more mechanisms to spread client requests among the
                 nodes. After years of continual proposals of new system
                 solutions, routing mechanisms, and policies (the first
                 dated back to 1994 when the NCSA Web site had to face
                 the first million of requests per day), many problems
                 concerning multiple server architectures for Web sites
                 have been solved. Other issues remain to be addressed,
                 especially at the network application layer, but the
                 main techniques and methodologies for building scalable
                 Web content delivery architectures placed in a single
                 location are settled now. This article classifies and
                 describes main mechanisms to split the traffic load
                 among the server nodes, discussing both the alternative
                 architectures and the load sharing policies. To this
                 purpose, it focuses on architectures, internal routing
                 mechanisms, and dispatching request algorithms for
                 designing and implementing scalable Web-server systems
                 under the control of one content provider. It
                 identifies also some of the open research issues
                 associated with the use of distributed systems for
                 highly accessed Web sites.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Client/server; cluster-based architectures;
                 dispatching algorithms; distributed systems; load
                 balancing; routing mechanisms; World Wide Web",
}

@Article{Diaz:2002:SGL,
  author =       "Josep D{\'\i}az and Jordi Petit and Maria Serna",
  title =        "A survey of graph layout problems",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "3",
  pages =        "313--356",
  month =        sep,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/568522.568523",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:18:14 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Graph layout problems are a particular class of
                 combinatorial optimization problems whose goal is to
                 find a linear layout of an input graph in such way that
                 a certain objective cost is optimized. This survey
                 considers their motivation, complexity, approximation
                 properties, upper and lower bounds, heuristics and
                 probabilistic analysis on random graphs. The result is
                 a complete view of the current state of the art with
                 respect to layout problems from an algorithmic point of
                 view.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Approximation algorithms; complexity; embedding;
                 heuristics; layout; parameterized complexity; random
                 graphs",
}

@Article{Elaarag:2002:ITP,
  author =       "Hala Elaarag",
  title =        "Improving {TCP} performance over mobile networks",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "3",
  pages =        "357--374",
  month =        sep,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/568522.568524",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:18:14 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Transmission Control Protocol (TCP) is the most
                 commonly used transport protocol on the Internet. All
                 indications assure that mobile computers and their
                 wireless communication links will be an integral part
                 of the future internetworks. In this paper, we present
                 how regular TCP is well tuned to react to packet loss
                 in wired networks. We then define mobility and the
                 problems associated with it. We discuss why regular TCP
                 is not suitable for mobile hosts and their wireless
                 links by providing simulation results that demonstrate
                 the effect of the high bit error rates of the wireless
                 link on TCP performance. We discuss and illustrate the
                 problems caused by the mobility of hosts using a graph
                 tracing packets between fixed and mobile hosts. We then
                 present a survey of the research done to improve the
                 performance of TCP over mobile wireless networks. We
                 classify the proposed solutions into three categories:
                 link layer, end-to-end and split. We discuss the
                 intuition behind each solution and present example
                 protocols of each category. We discuss the protocols
                 functionality, their strengths and weaknesses. We also
                 provide a comparison of the different approaches in the
                 same category and on the category level. We conclude
                 this survey with a recommendation of the features that
                 need to be satisfied in a standard mobile TCP
                 protocol.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "base station; comparison of TCP implementations;
                 end-to-end; I-TCP; link layer; M-TCP; mobile host;
                 mobile TCP; mobile wireless networks; mobility; MTCP;
                 New-Reno; Reno; SACK; snoop; split TCP; standard TCP;
                 TCP performance; WAP; wired networks; wireless TCP;
                 WTCP",
}

@Article{Elnozahy:2002:SRR,
  author =       "E. N. (Mootaz) Elnozahy and Lorenzo Alvisi and Yi-Min
                 Wang and David B. Johnson",
  title =        "A survey of rollback-recovery protocols in
                 message-passing systems",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "3",
  pages =        "375--408",
  month =        sep,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/568522.568525",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:18:14 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This survey covers rollback-recovery techniques that
                 do not require special language constructs. In the
                 first part of the survey we classify rollback-recovery
                 protocols into checkpoint-based and log-based.
                 Checkpoint-based protocols rely solely on checkpointing
                 for system state restoration. Checkpointing can be
                 coordinated, uncoordinated, or communication-induced.
                 Log-based protocols combine checkpointing with logging
                 of nondeterministic events, encoded in tuples called
                 determinants. Depending on how determinants are logged,
                 log-based protocols can be pessimistic, optimistic, or
                 causal. Throughout the survey, we highlight the
                 research issues that are at the core of
                 rollback-recovery and present the solutions that
                 currently address them. We also compare the performance
                 of different rollback-recovery protocols with respect
                 to a series of desirable properties and discuss the
                 issues that arise in the practical implementations of
                 these protocols.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "message logging; rollback-recovery",
}

@Article{Leontiev:2002:TSO,
  author =       "Yuri Leontiev and M. Tamer {\"O}zsu and Duane
                 Szafron",
  title =        "On type systems for object-oriented database
                 programming languages",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "4",
  pages =        "409--449",
  month =        dec,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/592642.592643",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:18:33 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The concept of an object-oriented database programming
                 language (OODBPL) is appealing because it has the
                 potential of combining the advantages of object
                 orientation and database programming to yield a
                 powerful and universal programming language design. A
                 uniform and consistent combination of object
                 orientation and database programming, however, is not
                 straightforward. Since one of the main components of an
                 object-oriented programming language is its type
                 system, one of the first problems that arises during an
                 OODBPL design is related to the development of a
                 uniform, consistent, and theoretically sound type
                 system that is sufficiently expressive to satisfy the
                 combined needs of object orientation and database
                 programming. The purpose of this article is to answer
                 two questions: 'What are the requirements that a modern
                 type system for an object-oriented database programming
                 language should satisfy?' and 'Are there any type
                 systems developed to-date that satisfy these
                 requirements?'. In order to answer the first question,
                 we compile the set of requirements that an OODBPL type
                 system should satisfy. We then use this set of
                 requirements to evaluate more than 30 existing type
                 systems. The result of this extensive analysis shows
                 that while each of the requirements is satisfied by at
                 least one type system, no type system satisfies all of
                 them. It also enables identification of the mechanisms
                 that lie behind the strengths and weaknesses of the
                 current type systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "object-oriented database programming language; OODB;
                 OODBPL; type checking; typing",
}

@Article{Denys:2002:SCO,
  author =       "G. Denys and F. Piessens and F. Matthijs",
  title =        "A survey of customizability in operating systems
                 research",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "4",
  pages =        "450--468",
  month =        dec,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/592642.592644",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:18:33 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "An important goal of an operating system is to make
                 computing and communication resources available in a
                 fair and efficient way to the applications that will
                 run on top of it. To achieve this result, the operating
                 system implements a number of policies for allocating
                 resources to, and sharing resources among applications,
                 and it implements safety mechanisms to guard against
                 misbehaving applications. However, for most of these
                 allocation and sharing tasks, no single optimal policy
                 exists. Different applications may prefer different
                 operating system policies to achieve their goals in the
                 best possible way. A customizable or adaptable
                 operating system is an operating system that allows for
                 flexible modification of important system policies.
                 Over the past decade, a wide range of approaches for
                 achieving customizability has been explored in the
                 operating systems research community. In this survey,
                 an overview of these approaches, structured around a
                 taxonomy, is presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Customizability; microkernels; operating systems;
                 software protection mechanisms",
}

@Article{Dhyani:2002:SWM,
  author =       "Devanshu Dhyani and Wee Keong Ng and Sourav S.
                 Bhowmick",
  title =        "A survey of {Web} metrics",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "4",
  pages =        "469--503",
  month =        dec,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/592642.592645",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:18:33 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The unabated growth and increasing significance of the
                 World Wide Web has resulted in a flurry of research
                 activity to improve its capacity for serving
                 information more effectively. But at the heart of these
                 efforts lie implicit assumptions about 'quality' and
                 'usefulness' of Web resources and services. This
                 observation points towards measurements and models that
                 quantify various attributes of Web sites. The science
                 of measuring all aspects of information, especially its
                 storage and retrieval or informetrics has interested
                 information scientists for decades before the existence
                 of the Web. Is Web informetrics any different, or is it
                 just an application of classical informetrics to a new
                 medium? In this article, we examine this issue by
                 classifying and discussing a wide ranging set of Web
                 metrics. We present the origins, measurement functions,
                 formulations and comparisons of well-known Web metrics
                 for quantifying Web graph properties, Web page
                 significance, Web page similarity, search and
                 retrieval, usage characterization and information
                 theoretic properties. We also discuss how these metrics
                 can be applied for improving Web information access and
                 use.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Information theoretic; PageRank; quality metrics; Web
                 graph; Web metrics; Web page similarity",
}

@Article{Rothe:2002:SFC,
  author =       "J{\"o}rg Rothe",
  title =        "Some facets of complexity theory and cryptography: a
                 five-lecture tutorial",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "4",
  pages =        "504--549",
  month =        dec,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/592642.592646",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:18:33 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In this tutorial, selected topics of cryptology and of
                 computational complexity theory are presented. We give
                 a brief overview of the history and the foundations of
                 classical cryptography, and then move on to modern
                 public-key cryptography. Particular attention is paid
                 to cryptographic protocols and the problem of
                 constructing key components of protocols such as
                 one-way functions. A function is one-way if it is easy
                 to compute, but hard to invert. We discuss the notion
                 of one-way functions both in a cryptographic and in a
                 complexity-theoretic setting. We also consider
                 interactive proof systems and present some interesting
                 zero-knowledge protocols. In a zero-knowledge protocol,
                 one party can convince the other party of knowing some
                 secret information without disclosing any bit of this
                 information. Motivated by these protocols, we survey
                 some complexity-theoretic results on interactive proof
                 systems and related complexity classes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Complexity theory; interactive proof systems; one-way
                 functions; public-key cryptography; zero-knowledge
                 protocols",
}

@Article{Agarwal:2002:AIM,
  author =       "Pankaj K. Agarwal and Leonidas J. Guibas and Herbert
                 Edelsbrunner and Jeff Erickson and Michael Isard and
                 Sariel Har-Peled and John Hershberger and Christian
                 Jensen and Lydia Kavraki and Patrice Koehl and Ming Lin
                 and Dinesh Manocha and Dimitris Metaxas and Brian
                 Mirtich and David Mount and S. Muthukrishnan and Dinesh
                 Pai and Elisha Sacks and Jack Snoeyink and Subhash Suri
                 and Ouri Wolefson",
  title =        "Algorithmic issues in modeling motion",
  journal =      j-COMP-SURV,
  volume =       "34",
  number =       "4",
  pages =        "550--572",
  month =        dec,
  year =         "2002",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/592642.592647",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:18:33 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article is a survey of research areas in which
                 motion plays a pivotal role. The aim of the article is
                 to review current approaches to modeling motion
                 together with related data structures and algorithms,
                 and to summarize the challenges that lie ahead in
                 producing a more unified theory of motion
                 representation that would be useful across several
                 disciplines.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Computational geometry; computer vision; mobile
                 networks; modeling; molecular biology; motion modeling;
                 physical simulation; robotics; spatio-temporal
                 databases",
}

@Article{Dedrick:2003:ITE,
  author =       "Jason Dedrick and Vijay Gurbaxani and Kenneth L.
                 Kraemer",
  title =        "Information technology and economic performance: a
                 critical review of the empirical evidence",
  journal =      j-COMP-SURV,
  volume =       "35",
  number =       "1",
  pages =        "1--28",
  month =        mar,
  year =         "2003",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/641865.641866",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:18:52 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "For many years, there has been considerable debate
                 about whether the IT revolution was paying off in
                 higher productivity. Studies in the 1980s found no
                 connection between IT investment and productivity in
                 the U.S. economy, a situation referred to as the
                 productivity paradox. Since then, a decade of studies
                 at the firm and country level has consistently shown
                 that the impact of IT investment on labor productivity
                 and economic growth is significant and positive. This
                 article critically reviews the published research, more
                 than 50 articles, on computers and productivity. It
                 develops a general framework for classifying the
                 research, which facilitates identifying what we know,
                 how well we know it, and what we do not know. The
                 framework enables us to systematically organize,
                 synthesize, and evaluate the empirical evidence and to
                 identify both limitations in existing research and data
                 and substantive areas for future research. The review
                 concludes that the productivity paradox as first
                 formulated has been effectively refuted. At both the
                 firm and the country level, greater investment in IT is
                 associated with greater productivity growth. At the
                 firm level, the review further concludes that the wide
                 range of performance of IT investments among different
                 organizations can be explained by complementary
                 investments in organizational capital such as
                 decentralized decision-making systems, job training,
                 and business process redesign. IT is not simply a tool
                 for automating existing processes, but is more
                 importantly an enabler of organizational changes that
                 can lead to additional productivity gains. In mid-2000,
                 IT capital investment began to fall sharply due to
                 slowing economic growth, the collapse of many
                 Internet-related firms, and reductions in IT spending
                 by other firms facing fewer competitive pressures from
                 Internet firms. This reduction in IT investment has had
                 devastating effects on the IT-producing sector, and may
                 lead to slower economic and productivity growth in the
                 U.S. economy. While the turmoil in the technology
                 sector has been unsettling to investors and executives
                 alike, this review shows that it should not overshadow
                 the fundamental changes that have occurred as a result
                 of firms' investments in IT. Notwithstanding the demise
                 of many Internet-related companies, the returns to IT
                 investment are real, and innovative companies continue
                 to lead the way.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "country; economic performance; firm; industry;
                 Information technology; management practices;
                 productivity",
}

@Article{Ungerer:2003:SPE,
  author =       "Theo Ungerer and Borut Robi{\v{c}} and Jurij
                 {\v{S}}ilc",
  title =        "A survey of processors with explicit multithreading",
  journal =      j-COMP-SURV,
  volume =       "35",
  number =       "1",
  pages =        "29--63",
  month =        mar,
  year =         "2003",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/641865.641867",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:18:52 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Hardware multithreading is becoming a generally
                 applied technique in the next generation of
                 microprocessors. Several multithreaded processors are
                 announced by industry or already into production in the
                 areas of high-performance microprocessors, media, and
                 network processors. A multithreaded processor is able
                 to pursue two or more threads of control in parallel
                 within the processor pipeline. The contexts of two or
                 more threads of control are often stored in separate
                 on-chip register sets. Unused instruction slots, which
                 arise from latencies during the pipelined execution of
                 single-threaded programs by a contemporary
                 microprocessor, are filled by instructions of other
                 threads within a multithreaded processor. The execution
                 units are multiplexed between the thread contexts that
                 are loaded in the register sets. Underutilization of a
                 superscalar processor due to missing instruction-level
                 parallelism can be overcome by simultaneous
                 multithreading, where a processor can issue multiple
                 instructions from multiple threads each cycle.
                 Simultaneous multithreaded processors combine the
                 multithreading technique with a wide-issue superscalar
                 processor to utilize a larger part of the issue
                 bandwidth by issuing instructions from different
                 threads simultaneously. Explicit multithreaded
                 processors are multithreaded processors that apply
                 processes or operating system threads in their hardware
                 thread slots. These processors optimize the throughput
                 of multiprogramming workloads rather than single-thread
                 performance. We distinguish these processors from
                 implicit multithreaded processors that utilize
                 thread-level speculation by speculatively executing
                 compiler- or machine-generated threads of control that
                 are part of a single sequential program. This survey
                 paper explains and classifies the explicit
                 multithreading techniques in research and in commercial
                 microprocessors.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Blocked multithreading; interleaved multithreading;
                 simultaneous multithreading",
}

@Article{Scott:2003:VPA,
  author =       "William R. Scott and Gerhard Roth and
                 Jean-Fran{\c{c}}ois Rivest",
  title =        "View planning for automated three-dimensional object
                 reconstruction and inspection",
  journal =      j-COMP-SURV,
  volume =       "35",
  number =       "1",
  pages =        "64--96",
  month =        mar,
  year =         "2003",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/641865.641868",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:18:52 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Laser scanning range sensors are widely used for
                 high-precision, high-density three-dimensional (3D)
                 reconstruction and inspection of the surface of
                 physical objects. The process typically involves
                 planning a set of views, physically altering the
                 relative object-sensor pose, taking scans, registering
                 the acquired geometric data in a common coordinate
                 frame of reference, and finally integrating range
                 images into a nonredundant model. Efficiencies could be
                 achieved by automating or semiautomating this process.
                 While challenges remain, there are adequate solutions
                 to semiautomate the scan-register-integrate tasks. On
                 the other hand, view planning remains an open
                 problem---that is, the task of finding a suitably small
                 set of sensor poses and configurations for specified
                 reconstruction or inspection goals. This paper surveys
                 and compares view planning techniques for automated 3D
                 object reconstruction and inspection by means of
                 active, triangulation-based range sensors.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "object inspection; object reconstruction; range
                 images; View planning",
}

@Article{Aycock:2003:BHJ,
  author =       "John Aycock",
  title =        "A brief history of just-in-time",
  journal =      j-COMP-SURV,
  volume =       "35",
  number =       "2",
  pages =        "97--113",
  month =        jun,
  year =         "2003",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/857076.857077",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:04 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Software systems have been using 'just-in-time'
                 compilation (JIT) techniques since the 1960s. Broadly,
                 JIT compilation includes any translation performed
                 dynamically, after a program has started execution. We
                 examine the motivation behind JIT compilation and
                 constraints imposed on JIT compilation systems, and
                 present a classification scheme for such systems. This
                 classification emerges as we survey forty years of JIT
                 work, from 1960--2000.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "dynamic compilation; Just-in-time compilation",
}

@Article{Eugster:2003:MFP,
  author =       "Patrick Th. Eugster and Pascal A. Felber and Rachid
                 Guerraoui and Anne-Marie Kermarrec",
  title =        "The many faces of publish\slash subscribe",
  journal =      j-COMP-SURV,
  volume =       "35",
  number =       "2",
  pages =        "114--131",
  month =        jun,
  year =         "2003",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/857076.857078",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:04 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Well adapted to the loosely coupled nature of
                 distributed interaction in large-scale applications,
                 the publish/subscribe communication paradigm has
                 recently received increasing attention. With systems
                 based on the publish/subscribe interaction scheme,
                 subscribers register their interest in an event, or a
                 pattern of events, and are subsequently asynchronously
                 notified of events generated by publishers. Many
                 variants of the paradigm have recently been proposed,
                 each variant being specifically adapted to some given
                 application or network model. This paper factors out
                 the common denominator underlying these variants: full
                 decoupling of the communicating entities in time,
                 space, and synchronization. We use these three
                 decoupling dimensions to better identify commonalities
                 and divergences with traditional interaction paradigms.
                 The many variations on the theme of publish/subscribe
                 are classified and synthesized. In particular, their
                 respective benefits and shortcomings are discussed both
                 in terms of interfaces and implementations.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Distribution; interaction; publish/subscribe",
}

@Article{Robinson:2003:RIM,
  author =       "William N. Robinson and Suzanne D. Pawlowski and
                 Vecheslav Volkov",
  title =        "Requirements interaction management",
  journal =      j-COMP-SURV,
  volume =       "35",
  number =       "2",
  pages =        "132--190",
  month =        jun,
  year =         "2003",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/857076.857079",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:04 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Requirements interaction management (RIM) is the set
                 of activities directed toward the discovery,
                 management, and disposition of critical relationships
                 among sets of requirements, which has become a critical
                 area of requirements engineering. This survey looks at
                 the evolution of supporting concepts and their related
                 literature, presents an issues-based framework for
                 reviewing processes and products, and applies the
                 framework in a review of RIM state-of-the-art. Finally,
                 it presents seven research projects that exemplify this
                 emerging discipline.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "analysis and design; composite system; deficiency
                 driven design; dependency analysis; distributed
                 intentionality; interaction analysis; KAOS; KATE; Oz;
                 Requirements engineering; software cost reduction
                 (SCR); system architecture; system specification;
                 Telos; viewpoints; WinWin",
}

@Article{Purao:2003:PMO,
  author =       "Sandeep Purao and Vijay Vaishnavi",
  title =        "Product metrics for object-oriented systems",
  journal =      j-COMP-SURV,
  volume =       "35",
  number =       "2",
  pages =        "191--221",
  month =        jun,
  year =         "2003",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/857076.857090",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:04 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We survey metrics proposed for object-oriented
                 systems, focusing on product metrics. The survey is
                 intended for the purposes of understanding,
                 classifying, and analyzing ongoing research in
                 object-oriented metrics. The survey applies fundamental
                 measurement theory to artifacts created by development
                 activities. We develop a mathematical formalism that
                 captures this perspective clearly, giving appropriate
                 attention to the peculiarities of the object-oriented
                 system development process. Consistent representation
                 of the available metrics, following this mathematical
                 formalism, shows that current research in this area
                 contains varying coverage of different products and
                 their properties at different development stages. The
                 consistent representation also facilitates several
                 analyses including aggregation across metrics, usage
                 across metrics, equivalent formulation of metrics by
                 multiple researchers, and exploitation of traditional
                 metrics for object-oriented metrics. We also trace the
                 chronological development of research in this area, and
                 uncover gaps that suggest opportunities for future
                 research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "measurement theory; object-oriented metrics;
                 object-oriented product metrics; object-oriented
                 systems; Software metrics",
}

@Article{Beszdes:2003:SCS,
  author =       "{\'A}rp{\'a}d Besz{\'e}des and Rudolf Ferenc and Tibor
                 Gyim{\'o}thy and Andr{\'e} Dolenc and Konsta Karsisto",
  title =        "Survey of code-size reduction methods",
  journal =      j-COMP-SURV,
  volume =       "35",
  number =       "3",
  pages =        "223--267",
  month =        sep,
  year =         "2003",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/937503.937504",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:22 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Program code compression is an emerging research
                 activity that is having an impact in several production
                 areas such as networking and embedded systems. This is
                 because the reduced-sized code can have a positive
                 impact on network traffic and embedded system costs
                 such as memory requirements and power consumption.
                 Although code-size reduction is a relatively new
                 research area, numerous publications already exist on
                 it. The methods published usually have different
                 motivations and a variety of application contexts. They
                 may use different principles and their publications
                 often use diverse notations. To our knowledge, there
                 are no publications that present a good overview of
                 this broad range of methods and give a useful
                 assessment. This article surveys twelve methods and
                 several related works appearing in some 50 papers
                 published up to now. We provide extensive assessment
                 criteria for evaluating the methods and offer a basis
                 for comparison. We conclude that it is fairly hard to
                 make any fair comparisons of the methods or draw
                 conclusions about their applicability.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "code compaction; code compression; method assessment;
                 method evaluation",
}

@Article{Blum:2003:MCO,
  author =       "Christian Blum and Andrea Roli",
  title =        "Metaheuristics in combinatorial optimization:
                 {Overview} and conceptual comparison",
  journal =      j-COMP-SURV,
  volume =       "35",
  number =       "3",
  pages =        "268--308",
  month =        sep,
  year =         "2003",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/937503.937505",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:22 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The field of metaheuristics for the application to
                 combinatorial optimization problems is a rapidly
                 growing field of research. This is due to the
                 importance of combinatorial optimization problems for
                 the scientific as well as the industrial world. We give
                 a survey of the nowadays most important metaheuristics
                 from a conceptual point of view. We outline the
                 different components and concepts that are used in the
                 different metaheuristics in order to analyze their
                 similarities and differences. Two very important
                 concepts in metaheuristics are intensification and
                 diversification. These are the two forces that largely
                 determine the behavior of a metaheuristic. They are in
                 some way contrary but also complementary to each other.
                 We introduce a framework, that we call the I\&D frame,
                 in order to put different intensification and
                 diversification components into relation with each
                 other. Outlining the advantages and disadvantages of
                 different metaheuristic approaches we conclude by
                 pointing out the importance of hybridization of
                 metaheuristics as well as the integration of
                 metaheuristics and other methods for optimization.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "combinatorial optimization; diversification;
                 intensification; Metaheuristics",
}

@Article{Rafaeli:2003:SKM,
  author =       "Sandro Rafaeli and David Hutchison",
  title =        "A survey of key management for secure group
                 communication",
  journal =      j-COMP-SURV,
  volume =       "35",
  number =       "3",
  pages =        "309--329",
  month =        sep,
  year =         "2003",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/937503.937506",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:22 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Group communication can benefit from IP multicast to
                 achieve scalable exchange of messages. However, there
                 is a challenge of effectively controlling access to the
                 transmitted data. IP multicast by itself does not
                 provide any mechanisms for preventing nongroup members
                 to have access to the group communication. Although
                 encryption can be used to protect messages exchanged
                 among group members, distributing the cryptographic
                 keys becomes an issue. Researchers have proposed
                 several different approaches to group key management.
                 These approaches can be divided into three main
                 classes: centralized group key management protocols,
                 decentralized architectures and distributed key
                 management protocols. The three classes are described
                 here and an insight given to their features and goals.
                 The area of group key management is then surveyed and
                 proposed solutions are classified according to those
                 characteristics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Group Key Distribution; Multicast Security",
}

@Article{Westermann:2003:AXD,
  author =       "Utz Westermann and Wolfgang Klas",
  title =        "An analysis of {XML} database solutions for the
                 management of {MPEG-7} media descriptions",
  journal =      j-COMP-SURV,
  volume =       "35",
  number =       "4",
  pages =        "331--373",
  month =        dec,
  year =         "2003",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/954339.954340",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:32 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "MPEG-7 constitutes a promising standard for the
                 description of multimedia content. It can be expected
                 that a lot of applications based on MPEG-7 media
                 descriptions will be set up in the near future.
                 Therefore, means for the adequate management of large
                 amounts of MPEG-7-compliant media descriptions are
                 certainly desirable. Essentially, MPEG-7 media
                 descriptions are XML documents following media
                 description schemes defined with a variant of XML
                 Schema. Thus, it is reasonable to investigate current
                 database solutions for XML documents regarding their
                 suitability for the management of these descriptions.
                 In this paper, we motivate and present critical
                 requirements for the management of MPEG-7 media
                 descriptions and the resulting consequences for XML
                 database solutions. Along these requirements, we
                 discuss current state-of-the-art database solutions for
                 XML documents. The analysis and comparison unveil the
                 limitations of current database solutions with respect
                 to the management of MPEG-7 media descriptions and
                 point the way to the need for a new generation of XML
                 database solutions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "MPEG-7; multimedia databases; XML database systems",
}

@Article{Podlipnig:2003:SWC,
  author =       "Stefan Podlipnig and Laszlo B{\"o}sz{\"o}rmenyi",
  title =        "A survey of {Web} cache replacement strategies",
  journal =      j-COMP-SURV,
  volume =       "35",
  number =       "4",
  pages =        "374--398",
  month =        dec,
  year =         "2003",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/954339.954341",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:32 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Web caching is an important technique to scale the
                 Internet. One important performance factor of Web
                 caches is the replacement strategy. Due to specific
                 characteristics of the World Wide Web, there exist a
                 huge number of proposals for cache replacement. This
                 article proposes a classification for these proposals
                 that subsumes prior classifications. Using this
                 classification, different proposals and their
                 advantages and disadvantages are described.
                 Furthermore, the article discusses the importance of
                 cache replacement strategies in modern proxy caches and
                 outlines potential future research topics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "replacement strategies; Web caching",
}

@Article{Zhao:2003:FRL,
  author =       "W. Zhao and R. Chellappa and P. J. Phillips and A.
                 Rosenfeld",
  title =        "Face recognition: a literature survey",
  journal =      j-COMP-SURV,
  volume =       "35",
  number =       "4",
  pages =        "399--458",
  month =        dec,
  year =         "2003",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/954339.954342",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:32 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "As one of the most successful applications of image
                 analysis and understanding, face recognition has
                 recently received significant attention, especially
                 during the past several years. At least two reasons
                 account for this trend: the first is the wide range of
                 commercial and law enforcement applications, and the
                 second is the availability of feasible technologies
                 after 30 years of research. Even though current machine
                 recognition systems have reached a certain level of
                 maturity, their success is limited by the conditions
                 imposed by many real applications. For example,
                 recognition of face images acquired in an outdoor
                 environment with changes in illumination and/or pose
                 remains a largely unsolved problem. In other words,
                 current systems are still far away from the capability
                 of the human perception system. This paper provides an
                 up-to-date critical survey of still- and video-based
                 face recognition research. There are two underlying
                 motivations for us to write this survey paper: the
                 first is to provide an up-to-date review of the
                 existing literature, and the second is to offer some
                 insights into the studies of machine recognition of
                 faces. To provide a comprehensive survey, we not only
                 categorize existing recognition techniques but also
                 present detailed descriptions of representative methods
                 within each category. In addition, relevant topics such
                 as psychophysical studies, system evaluation, and
                 issues of illumination and pose variation are
                 covered.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Face recognition; person identification",
}

@Article{Johnston:2004:ADP,
  author =       "Wesley M. Johnston and J. R. Paul Hanna and Richard J.
                 Millar",
  title =        "Advances in dataflow programming languages",
  journal =      j-COMP-SURV,
  volume =       "36",
  number =       "1",
  pages =        "1--34",
  month =        mar,
  year =         "2004",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1013208.1013209",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Many developments have taken place within dataflow
                 programming languages in the past decade. In
                 particular, there has been a great deal of activity and
                 advancement in the field of dataflow visual programming
                 languages. The motivation for this article is to review
                 the content of these recent developments and how they
                 came about. It is supported by an initial review of
                 dataflow programming in the 1970s and 1980s that led to
                 current topics of research. It then discusses how
                 dataflow programming evolved toward a hybrid von
                 Neumann dataflow formulation, and adopted a more
                 coarse-grained approach. Recent trends toward dataflow
                 visual programming languages are then discussed with
                 reference to key graphical dataflow languages and their
                 development environments. Finally, the article details
                 four key open topics in dataflow programming
                 languages.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "co-ordination languages; component software; data flow
                 visual programming; Dataflow; graphical programming;
                 multithreading; software engineering",
}

@Article{Kherfi:2004:IRW,
  author =       "M. L. Kherfi and D. Ziou and A. Bernardi",
  title =        "Image Retrieval from the {World Wide Web}: {Issues},
                 Techniques, and Systems",
  journal =      j-COMP-SURV,
  volume =       "36",
  number =       "1",
  pages =        "35--67",
  month =        mar,
  year =         "2004",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1013208.1013210",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "With the explosive growth of the World Wide Web, the
                 public is gaining access to massive amounts of
                 information. However, locating needed and relevant
                 information remains a difficult task, whether the
                 information is textual or visual. Text search engines
                 have existed for some years now and have achieved a
                 certain degree of success. However, despite the large
                 number of images available on the Web, image search
                 engines are still rare. In this article, we show that
                 in order to allow people to profit from all this visual
                 information, there is a need to develop tools that help
                 them to locate the needed images with good precision in
                 a reasonable time, and that such tools are useful for
                 many applications and purposes. The article surveys the
                 main characteristics of the existing systems most often
                 cited in the literature, such as ImageRover, WebSeek,
                 Diogenes, and Atlas WISE. It then examines the various
                 issues related to the design and implementation of a
                 Web image search engine, such as data gathering and
                 digestion, indexing, query specification, retrieval and
                 similarity, Web coverage, and performance evaluation. A
                 general discussion is given for each of these issues,
                 with examples of the ways they are addressed by
                 existing engines, and 130 related references are given.
                 Some concluding remarks and directions for future
                 research are also presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "crawling; feature extraction and selection;
                 Image-retrieval; indexing; relevance feedback; search;
                 similarity; World Wide Web",
}

@Article{Harris:2004:LDL,
  author =       "Mitchell A. Harris and Edward M. Reingold",
  title =        "Line drawing, leap years, and {Euclid}",
  journal =      j-COMP-SURV,
  volume =       "36",
  number =       "1",
  pages =        "68--80",
  month =        mar,
  year =         "2004",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1013208.1013211",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:47 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Bresenham's algorithm minimizes error in drawing lines
                 on integer grid points; leap year calculations,
                 surprisingly, are a generalization. We compare the two
                 calculations, explicate the pattern, and discuss the
                 connection of the leap year\slash line pattern with
                 integer division and Euclid's algorithm for computing
                 the greatest common divisor.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Bresenham's algorithm; calendar algorithms; continued
                 fractions; Euclid's algorithm; greatest common divisor;
                 leap years; line drawing; scan-line conversion",
}

@Article{Kirbas:2004:RVE,
  author =       "Cemil Kirbas and Francis Quek",
  title =        "A review of vessel extraction techniques and
                 algorithms",
  journal =      j-COMP-SURV,
  volume =       "36",
  number =       "2",
  pages =        "81--121",
  month =        jun,
  year =         "2004",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1031120.1031121",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:57 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Vessel segmentation algorithms are the critical
                 components of circulatory blood vessel analysis
                 systems. We present a survey of vessel extraction
                 techniques and algorithms. We put the various vessel
                 extraction approaches and techniques in perspective by
                 means of a classification of the existing research.
                 While we have mainly targeted the extraction of blood
                 vessels, neurosvascular structure in particular, we
                 have also reviewed some of the segmentation methods for
                 the tubular objects that show similar characteristics
                 to vessels. We have divided vessel segmentation
                 algorithms and techniques into six main categories: (1)
                 pattern recognition techniques, (2) model-based
                 approaches, (3) tracking-based approaches, (4)
                 artificial intelligence-based approaches, (5) neural
                 network-based approaches, and (6) tube-like object
                 detection approaches. Some of these categories are
                 further divided into subcategories. We have also
                 created tables to compare the papers in each category
                 against such criteria as dimensionality, input type,
                 preprocessing, user interaction, and result type.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Magnetic resonance angiography; medical imaging;
                 neurovascular; vessel extraction; X-ray angiography",
}

@Article{Cohen:2004:BIC,
  author =       "Jacques Cohen",
  title =        "Bioinformatics --- an introduction for computer
                 scientists",
  journal =      j-COMP-SURV,
  volume =       "36",
  number =       "2",
  pages =        "122--158",
  month =        jun,
  year =         "2004",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1031120.1031122",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:57 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The article aims to introduce computer scientists to
                 the new field of bioinformatics. This area has arisen
                 from the needs of biologists to utilize and help
                 interpret the vast amounts of data that are constantly
                 being gathered in genomic research---and its more
                 recent counterparts, proteomics and functional
                 genomics. The ultimate goal of bioinformatics is to
                 develop in silicon models that will complement in vitro
                 and in vivo biological experiments. The article
                 provides a bird's eye view of the basic concepts in
                 molecular cell biology, outlines the nature of the
                 existing data, and describes the kind of computer
                 algorithms and techniques that are necessary to
                 understand cell behavior. The underlying motivation for
                 many of the bioinformatics approaches is the evolution
                 of organisms and the complexity of working with
                 incomplete and noisy data. The topics covered include:
                 descriptions of the current software especially
                 developed for biologists, computer and mathematical
                 cell models, and areas of computer science that play an
                 important role in bioinformatics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "alignments; cell simulation and modeling; computer;
                 DNA; dynamic programming; hidden-Markov-models;
                 microarray; Molecular cell biology; parsing biological
                 sequences; phylogenetic trees; RNA and protein
                 structure",
}

@Article{Samet:2004:OBI,
  author =       "Hanan Samet",
  title =        "Object-based and image-based object representations",
  journal =      j-COMP-SURV,
  volume =       "36",
  number =       "2",
  pages =        "159--217",
  month =        jun,
  year =         "2004",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1031120.1031123",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:19:57 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "An overview is presented of object-based and
                 image-based representations of objects by their
                 interiors. The representations are distinguished by the
                 manner in which they can be used to answer two
                 fundamental queries in database applications: (1)
                 Feature query: given an object, determine its
                 constituent cells (i.e., their locations in space). (2)
                 Location query: given a cell (i.e., a location in
                 space), determine the identity of the object (or
                 objects) of which it is a member as well as the
                 remaining constituent cells of the object (or objects).
                 Regardless of the representation that is used, the
                 generation of responses to the feature and location
                 queries is facilitated by building an index (i.e., the
                 result of a sort) either on the objects or on their
                 locations in space, and implementing it using an access
                 structure that correlates the objects with the
                 locations. Assuming the presence of an access
                 structure, implicit (i.e., image-based) representations
                 are described that are good for finding the objects
                 associated with a particular location or cell (i.e.,
                 the location query), while requiring that all cells be
                 examined when determining the locations associated with
                 a particular object (i.e., the feature query). In
                 contrast, explicit (i.e., object-based) representations
                 are good for the feature query, while requiring that
                 all objects be examined when trying to respond to the
                 location query. The goal is to be able to answer both
                 types of queries with one representation and without
                 possibly having to examine every cell. Representations
                 are presented that achieve this goal by imposing
                 containment hierarchies on either space (i.e., the
                 cells in the space in which the objects are found), or
                 objects. In the former case, space is aggregated into
                 successively larger-sized chunks (i.e., blocks), while
                 in the latter, objects are aggregated into successively
                 larger groups (in terms of the number of objects that
                 they contain). The former is applicable to image-based
                 interior-based representations of which the space
                 pyramid is an example. The latter is applicable to
                 object-based interior-based representations of which
                 the R-tree is an example. The actual mechanics of many
                 of these representations are demonstrated in the VASCO
                 JAVA applets found at
                 \path=http://www.cs.umd.edu/~hjs/quadtree/index.html=.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Access methods; feature query; geographic information
                 systems (GIS); image space; location query; object
                 space; octrees; pyramids; quadtrees; R-trees;
                 space-filling curves; spatial databases",
}

@Article{Pleisch:2004:AFT,
  author =       "Stefan Pleisch and Andr{\'e} Schiper",
  title =        "Approaches to fault-tolerant and transactional mobile
                 agent execution---an algorithmic view",
  journal =      j-COMP-SURV,
  volume =       "36",
  number =       "3",
  pages =        "219--262",
  month =        sep,
  year =         "2004",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1035570.1035571",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Over the past years, mobile agent technology has
                 attracted considerable attention, and a significant
                 body of literature has been published. To further
                 develop mobile agent technology, reliability mechanisms
                 such as fault tolerance and transaction support are
                 required. This article aims at structuring the field of
                 fault-tolerant and transactional mobile agent execution
                 and thus at guiding the reader to understand the basic
                 strengths and weaknesses of existing approaches. It
                 starts with a discussion on providing fault tolerance
                 in a system in which processes simply fail. For this
                 purpose, we first identify two basic requirements for
                 fault-tolerant mobile agent execution: (1) non-blocking
                 (i.e., a single failure does not prevent progress of
                 the mobile agent execution) and (2) exactly-once (i.e.,
                 multiple executions of the agent are prevented). This
                 leads us to introduce the notion of a {\em local
                 transaction\/} as the basic building block for
                 fault-tolerant mobile agent execution and to classify
                 existing approaches according to when and by whom the
                 local transactions are committed. In a second part, we
                 show that transactional mobile agent execution
                 additionally ensures execution atomicity and present a
                 survey of existing approaches. In the last part of the
                 survey, we extend the notion of fault tolerance to
                 arbitrary Byzantine failures and security-related
                 issues of the mobile agent execution.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "ACID; agreement problem; asynchronous system;
                 Byzantine failures; commit; crash failures; fault
                 tolerance; malicious places; mobile agents;
                 replication; security; transaction",
}

@Article{Formica:2004:IPC,
  author =       "Anna Formica and Michele Missikoff",
  title =        "Inheritance processing and conflicts in structural
                 generalization hierarchies",
  journal =      j-COMP-SURV,
  volume =       "36",
  number =       "3",
  pages =        "263--290",
  month =        sep,
  year =         "2004",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1035570.1035572",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Generalization hierarchies; inheritance; structural
                 conceptual modeling; subclassing; subsumption;
                 subtyping",
}

@Article{Sivasubramanian:2004:RWH,
  author =       "Swaminathan Sivasubramanian and Michal Szymaniak and
                 Guillaume Pierre and Maarten van Steen",
  title =        "Replication for {Web} hosting systems",
  journal =      j-COMP-SURV,
  volume =       "36",
  number =       "3",
  pages =        "291--334",
  month =        sep,
  year =         "2004",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1035570.1035573",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Replication is a well-known technique to improve the
                 accessibility of Web sites. It generally offers reduced
                 client latencies and increases a site's availability.
                 However, applying replication techniques is not
                 trivial, and various Content Delivery Networks (CDNs)
                 have been created to facilitate replication for digital
                 content providers. The success of these CDNs has
                 triggered further research efforts into developing
                 advanced {\em Web replica hosting systems}. These are
                 systems that host the documents of a website and manage
                 replication automatically. To identify the key issues
                 in designing a wide-area replica hosting system, we
                 present an architectural framework. The framework
                 assists in characterizing different systems in a
                 systematic manner. We categorize different research
                 efforts and review their relative merits and demerits.
                 As an important side-effect, this review and
                 characterization shows that there a number of
                 interesting research questions that have not received
                 much attention yet, but which deserve exploration by
                 the research community.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "content delivery networks; Web replication",
}

@Article{Androutsellis-Theotokis:2004:SPP,
  author =       "Stephanos Androutsellis-Theotokis and Diomidis
                 Spinellis",
  title =        "A survey of peer-to-peer content distribution
                 technologies",
  journal =      j-COMP-SURV,
  volume =       "36",
  number =       "4",
  pages =        "335--371",
  month =        dec,
  year =         "2004",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1041680.1041681",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Distributed computer architectures labeled
                 'peer-to-peer' are designed for the sharing of computer
                 resources (content, storage, CPU cycles) by direct
                 exchange, rather than requiring the intermediation or
                 support of a centralized server or authority.
                 Peer-to-peer architectures are characterized by their
                 ability to adapt to failures and accommodate transient
                 populations of nodes while maintaining acceptable
                 connectivity and performance. Content distribution is
                 an important peer-to-peer application on the Internet
                 that has received considerable research attention.
                 Content distribution applications typically allow
                 personal computers to function in a coordinated manner
                 as a distributed storage medium by contributing,
                 searching, and obtaining digital content. In this
                 survey, we propose a framework for analyzing
                 peer-to-peer content distribution technologies. Our
                 approach focuses on nonfunctional characteristics such
                 as security, scalability, performance, fairness, and
                 resource management potential, and examines the way in
                 which these characteristics are reflected in---and
                 affected by---the architectural design decisions
                 adopted by current peer-to-peer systems. We study
                 current peer-to-peer systems and infrastructure
                 technologies in terms of their distributed object
                 location and routing mechanisms, their approach to
                 content replication, caching and migration, their
                 support for encryption, access control, authentication
                 and identity, anonymity, deniability, accountability
                 and reputation, and their use of resource trading and
                 management schemes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Content distribution; DHT; DOLR; grid computing; p2p;
                 peer-to-peer",
}

@Article{Defago:2004:TOB,
  author =       "Xavier D{\'e}fago and Andr{\'e} Schiper and P{\'e}ter
                 Urb{\'a}n",
  title =        "Total order broadcast and multicast algorithms:
                 {Taxonomy} and survey",
  journal =      j-COMP-SURV,
  volume =       "36",
  number =       "4",
  pages =        "372--421",
  month =        dec,
  year =         "2004",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1041680.1041682",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Total order broadcast and multicast (also called
                 atomic broadcast/multicast) present an important
                 problem in distributed systems, especially with respect
                 to fault-tolerance. In short, the primitive ensures
                 that messages sent to a set of processes are, in turn,
                 delivered by all those processes in the same total
                 order.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "agreement problems; atomic broadcast; atomic
                 multicast; classification; distributed algorithms;
                 Distributed systems; fault-tolerance; global ordering;
                 group communication; message passing; survey; taxonomy;
                 total ordering",
}

@Article{Bar-Yehuda:2004:LRU,
  author =       "Reuven Bar-Yehuda and Keren Bendel and Ari Freund and
                 Dror Rawitz",
  title =        "Local ratio: a unified framework for approximation
                 algorithms. {In Memoriam}: {Shimon Even} 1935--2004",
  journal =      j-COMP-SURV,
  volume =       "36",
  number =       "4",
  pages =        "422--463",
  month =        dec,
  year =         "2004",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1041680.1041683",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:19 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The local ratio technique is a methodology for the
                 design and analysis of algorithms for a broad range of
                 optimization problems. The technique is remarkably
                 simple and elegant, and yet can be applied to several
                 classical and fundamental problems (including covering
                 problems, packing problems, and scheduling problems).
                 The local ratio technique uses elementary math and
                 requires combinatorial insight into the structure and
                 properties of the problem at hand. Typically, when
                 using the technique, one has to invent a weight
                 function for a problem instance under which every
                 'reasonable' solution is 'good.' The local ratio
                 technique is closely related to the primal-dual schema,
                 though it is not based on weak LP duality (which is the
                 basis of the primal-dual approach) since it is not
                 based on linear programming. In this survey we,
                 introduce the local ratio technique and demonstrate its
                 use in the design and analysis of algorithms for
                 various problems. We trace the evolution path of the
                 technique since its inception in the 1980's,
                 culminating with the most recent development, namely,
                 fractional local ratio, which can be viewed as a new LP
                 rounding technique.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Approximation algorithms; fractional local ratio;
                 local ratio technique",
}

@Article{Bose:2005:LRS,
  author =       "Rajendra Bose and James Frew",
  title =        "Lineage retrieval for scientific data processing: a
                 survey",
  journal =      j-COMP-SURV,
  volume =       "37",
  number =       "1",
  pages =        "1--28",
  month =        mar,
  year =         "2005",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1057977.1057978",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:31 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Scientific research relies as much on the
                 dissemination and exchange of data sets as on the
                 publication of conclusions. Accurately tracking the
                 lineage (origin and subsequent processing history) of
                 scientific data sets is thus imperative for the
                 complete documentation of scientific work. Researchers
                 are effectively prevented from determining, preserving,
                 or providing the lineage of the computational data
                 products they use and create, however, because of the
                 lack of a definitive model for lineage retrieval and a
                 poor fit between current data management tools and
                 scientific software. Based on a comprehensive survey of
                 lineage research and previous prototypes, we present a
                 metamodel to help identify and assess the basic
                 components of systems that provide lineage retrieval
                 for scientific data products.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "audit; Data lineage; data provenance; scientific data;
                 scientific workflow",
}

@Article{Tolone:2005:ACC,
  author =       "William Tolone and Gail-Joon Ahn and Tanusree Pai and
                 Seng-Phil Hong",
  title =        "Access control in collaborative systems",
  journal =      j-COMP-SURV,
  volume =       "37",
  number =       "1",
  pages =        "29--41",
  month =        mar,
  year =         "2005",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1057977.1057979",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:31 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Balancing the competing goals of collaboration and
                 security is a difficult, multidimensional problem.
                 Collaborative systems often focus on building useful
                 connections among people, tools, and information while
                 security seeks to ensure the availability,
                 confidentiality, and integrity of these same elements.
                 In this article, we focus on one important dimension of
                 this problem---access control. The article examines
                 existing access control models as applied to
                 collaboration, highlighting not only the benefits, but
                 also the weaknesses of these models.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Access control; collaboration; security models",
}

@Article{Saito:2005:OR,
  author =       "Yasushi Saito and Marc Shapiro",
  title =        "Optimistic replication",
  journal =      j-COMP-SURV,
  volume =       "37",
  number =       "1",
  pages =        "42--81",
  month =        mar,
  year =         "2005",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1057977.1057980",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:31 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Data replication is a key technology in distributed
                 systems that enables higher availability and
                 performance. This article surveys optimistic
                 replication algorithms. They allow replica contents to
                 diverge in the short term to support concurrent work
                 practices and tolerate failures in low-quality
                 communication links. The importance of such techniques
                 is increasing as collaboration through wide-area and
                 mobile networks becomes popular. Optimistic replication
                 deploys algorithms not seen in traditional
                 ``pessimistic'' systems. Instead of synchronous replica
                 coordination, an optimistic algorithm propagates
                 changes in the background, discovers conflicts after
                 they happen, and reaches agreement on the final
                 contents incrementally. We explore the solution space
                 for optimistic replication algorithms. This article
                 identifies key challenges facing optimistic replication
                 systems---ordering operations, detecting and resolving
                 conflicts, propagating changes efficiently, and
                 bounding replica divergence---and provides a
                 comprehensive survey of techniques developed for
                 addressing these challenges.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "disconnected operation; distributed systems; large
                 scale systems; optimistic techniques; Replication",
}

@Article{Kelleher:2005:LBP,
  author =       "Caitlin Kelleher and Randy Pausch",
  title =        "Lowering the barriers to programming: a taxonomy of
                 programming environments and languages for novice
                 programmers",
  journal =      j-COMP-SURV,
  volume =       "37",
  number =       "2",
  pages =        "83--137",
  month =        jun,
  year =         "2005",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1089733.1089734",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:41 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Since the early 1960's, researchers have built a
                 number of programming languages and environments with
                 the intention of making programming accessible to a
                 larger number of people. This article presents a
                 taxonomy of languages and environments designed to make
                 programming more accessible to novice programmers of
                 all ages. The systems are organized by their primary
                 goal, either to teach programming or to use programming
                 to empower their users, and then, by each system's
                 authors' approach, to making learning to program easier
                 for novice programmers. The article explains all
                 categories in the taxonomy, provides a brief
                 description of the systems in each category, and
                 suggests some avenues for future work in novice
                 programming environments and languages.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer Science education; Human-computer
                 interaction; learning; literacy; problem solving",
}

@Article{Gal:2005:ADS,
  author =       "Eran Gal and Sivan Toledo",
  title =        "Algorithms and data structures for flash memories",
  journal =      j-COMP-SURV,
  volume =       "37",
  number =       "2",
  pages =        "138--163",
  month =        jun,
  year =         "2005",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1089733.1089735",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:41 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Flash memory is a type of electrically-erasable
                 programmable read-only memory (EEPROM). Because flash
                 memories are nonvolatile and relatively dense, they are
                 now used to store files and other persistent objects in
                 handheld computers, mobile phones, digital cameras,
                 portable music players, and many other computer systems
                 in which magnetic disks are inappropriate. Flash, like
                 earlier EEPROM devices, suffers from two limitations.
                 First, bits can only be cleared by erasing a large
                 block of memory. Second, each block can only sustain a
                 limited number of erasures, after which it can no
                 longer reliably store data. Due to these limitations,
                 sophisticated data structures and algorithms are
                 required to effectively use flash memories. These
                 algorithms and data structures support efficient
                 not-in-place updates of data, reduce the number of
                 erasures, and level the wear of the blocks in the
                 device. This survey presents these algorithms and data
                 structures, many of which have only been described in
                 patents until now.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "EEPROM memory; Flash memory; wear leveling",
}

@Article{Santi:2005:TCW,
  author =       "Paolo Santi",
  title =        "Topology control in wireless ad hoc and sensor
                 networks",
  journal =      j-COMP-SURV,
  volume =       "37",
  number =       "2",
  pages =        "164--194",
  month =        jun,
  year =         "2005",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1089733.1089736",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:41 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Topology Control (TC) is one of the most important
                 techniques used in wireless ad hoc and sensor networks
                 to reduce energy consumption (which is essential to
                 extend the network operational time) and radio
                 interference (with a positive effect on the network
                 traffic carrying capacity). The goal of this technique
                 is to control the topology of the graph representing
                 the communication links between network nodes with the
                 purpose of maintaining some global graph property
                 (e.g., connectivity), while reducing energy consumption
                 and/or interference that are strictly related to the
                 nodes' transmitting range. In this article, we state
                 several problems related to topology control in
                 wireless ad hoc and sensor networks, and we survey
                 state-of-the-art solutions which have been proposed to
                 tackle them. We also outline several directions for
                 further research which we hope will motivate
                 researchers to undertake additional studies in this
                 field.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Connectivity; energy consumption; sensor networks;
                 topology control; wireless ad hoc networks",
}

@Article{Venkatachalam:2005:PRT,
  author =       "Vasanth Venkatachalam and Michael Franz",
  title =        "Power reduction techniques for microprocessor
                 systems",
  journal =      j-COMP-SURV,
  volume =       "37",
  number =       "3",
  pages =        "195--237",
  month =        sep,
  year =         "2005",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1108956.1108957",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:51 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Power consumption is a major factor that limits the
                 performance of computers. We survey the ``state of the
                 art'' in techniques that reduce the total power
                 consumed by a microprocessor system over time. These
                 techniques are applied at various levels ranging from
                 circuits to architectures, architectures to system
                 software, and system software to applications. They
                 also include holistic approaches that will become more
                 important over the next decade. We conclude that power
                 management is a multifaceted discipline that is
                 continually expanding with new techniques being
                 developed at every level. These techniques may
                 eventually allow computers to break through the ``power
                 wall'' and achieve unprecedented levels of performance,
                 versatility, and reliability. Yet it remains too early
                 to tell which techniques will ultimately solve the
                 power problem.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Energy dissipation; power reduction",
}

@Article{Taylor:2005:STP,
  author =       "David E. Taylor",
  title =        "Survey and taxonomy of packet classification
                 techniques",
  journal =      j-COMP-SURV,
  volume =       "37",
  number =       "3",
  pages =        "238--275",
  month =        sep,
  year =         "2005",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1108956.1108958",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:51 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Packet classification is an enabling function for a
                 variety of Internet applications including quality of
                 service, security, monitoring, and multimedia
                 communications. In order to classify a packet as
                 belonging to a particular flow or set of flows, network
                 nodes must perform a search over a set of filters using
                 multiple fields of the packet as the search key. In
                 general, there have been two major threads of research
                 addressing packet classification, algorithmic and
                 architectural. A few pioneering groups of researchers
                 posed the problem, provided complexity bounds, and
                 offered a collection of algorithmic solutions.
                 Subsequently, the design space has been vigorously
                 explored by many offering new algorithms and
                 improvements on existing algorithms. Given the
                 inability of early algorithms to meet performance
                 constraints imposed by high speed links, researchers in
                 industry and academia devised architectural solutions
                 to the problem. This thread of research produced the
                 most widely-used packet classification device
                 technology, Ternary Content Addressable Memory (TCAM).
                 New architectural research combines intelligent
                 algorithms and novel architectures to eliminate many of
                 the unfavorable characteristics of current TCAMs. We
                 observe that the community appears to be converging on
                 a combined algorithmic and architectural approach to
                 the problem. Using a taxonomy based on the high-level
                 approach to the problem and a minimal set of running
                 examples, we provide a survey of the seminal and recent
                 solutions to the problem. It is our hope to foster a
                 deeper understanding of the various packet
                 classification techniques while providing a useful
                 framework for discerning relationships and
                 distinctions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "flow identification; Packet classification",
}

@Article{Eichelberg:2005:SAE,
  author =       "Marco Eichelberg and Thomas Aden and J{\"o}rg
                 Riesmeier and Asuman Dogac and Gokce B. Laleci",
  title =        "A survey and analysis of {Electronic Healthcare
                 Record} standards",
  journal =      j-COMP-SURV,
  volume =       "37",
  number =       "4",
  pages =        "277--315",
  month =        dec,
  year =         "2005",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1118890.1118891",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:58 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Medical information systems today store clinical
                 information about patients in all kinds of proprietary
                 formats. To address the resulting interoperability
                 problems, several Electronic Healthcare Record
                 standards that structure the clinical content for the
                 purpose of exchange are currently under development. In
                 this article, we present a survey of the most relevant
                 Electronic Healthcare Record standards, examine the
                 level of interoperability they provide, and assess
                 their functionality in terms of content structure,
                 access services, multimedia support, and security. We
                 further investigate the complementarity of the
                 standards and assess their market relevance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "eHealth; Electronic Healthcare Record standards;
                 interoperability",
}

@Article{Mernik:2005:WHD,
  author =       "Marjan Mernik and Jan Heering and Anthony M. Sloane",
  title =        "When and how to develop domain-specific languages",
  journal =      j-COMP-SURV,
  volume =       "37",
  number =       "4",
  pages =        "316--344",
  month =        dec,
  year =         "2005",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1118890.1118892",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:58 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Domain-specific languages (DSLs) are languages
                 tailored to a specific application domain. They offer
                 substantial gains in expressiveness and ease of use
                 compared with general-purpose programming languages in
                 their domain of application. DSL development is hard,
                 requiring both domain knowledge and language
                 development expertise. Few people have both. Not
                 surprisingly, the decision to develop a DSL is often
                 postponed indefinitely, if considered at all, and most
                 DSLs never get beyond the application library stage.
                 Although many articles have been written on the
                 development of particular DSLs, there is very limited
                 literature on DSL development methodologies and many
                 questions remain regarding when and how to develop a
                 DSL. To aid the DSL developer, we identify patterns in
                 the decision, analysis, design, and implementation
                 phases of DSL development. Our patterns improve and
                 extend earlier work on DSL design patterns. We also
                 discuss domain analysis tools and language development
                 systems that may help to speed up DSL development.
                 Finally, we present a number of open problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "application language; domain analysis; Domain-specific
                 language; language development system",
}

%%% ====================================================================
%%% NB: Volume 38 numbers each article from page 1. ACM journals are
%%% switching to a new format where page numbers contain an article
%%% number prefix, with page ranges of the form ai:p1--ai:pj.
%%% ====================================================================
@Article{Bustos:2005:FBS,
  author =       "Benjamin Bustos and Daniel A. Keim and Dietmar Saupe
                 and Tobias Schreck and Dejan V. Vrani{\'c}",
  title =        "Feature-based similarity search in {$3$D} object
                 databases",
  journal =      j-COMP-SURV,
  volume =       "37",
  number =       "4",
  pages =        "345--387",
  month =        dec,
  year =         "2005",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1118890.1118893",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:20:58 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The development of effective content-based multimedia
                 search systems is an important research issue due to
                 the growing amount of digital audio-visual information.
                 In the case of images and video, the growth of digital
                 data has been observed since the introduction of 2D
                 capture devices. A similar development is expected for
                 3D data as acquisition and dissemination technology of
                 3D models is constantly improving. 3D objects are
                 becoming an important type of multimedia data with many
                 promising application possibilities. Defining the
                 aspects that constitute the similarity among 3D objects
                 and designing algorithms that implement such similarity
                 definitions is a difficult problem. Over the last few
                 years, a strong interest in methods for 3D similarity
                 search has arisen, and a growing number of competing
                 algorithms for content-based retrieval of 3D objects
                 have been proposed. We survey feature-based methods for
                 3D retrieval, and we propose a taxonomy for these
                 methods. We also present experimental results,
                 comparing the effectiveness of some of the surveyed
                 methods.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "3D model retrieval; content-based similarity search",
}

@Article{Bjerregaard:2006:SRP,
  author =       "Tobias Bjerregaard and Shankar Mahadevan",
  title =        "A survey of research and practices of
                 {Network-on-Chip}",
  journal =      j-COMP-SURV,
  volume =       "38",
  number =       "1",
  pages =        "1:1--1:51",
  month =        mar,
  year =         "2006",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1132952.1132953",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The scaling of microchip technologies has enabled
                 large scale systems-on-chip (SoC). Network-on-chip
                 (NoC) research addresses global communication in SoC,
                 involving (i) a move from computation-centric to
                 communication-centric design and (ii) the
                 implementation of scalable communication structures.
                 This survey presents a perspective on existing NoC
                 research. We define the following abstractions: system,
                 network adapter, network, and link to explain and
                 structure the fundamental concepts. First, research
                 relating to the actual network design is reviewed. Then
                 system level design and modeling are discussed. We also
                 evaluate performance analysis techniques. The research
                 shows that NoC constitutes a unification of current
                 trends of intrachip communication rather than an
                 explicit new alternative.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Chip-area networks; communication abstractions;
                 communication-centric design; GALS; GSI design;
                 interconnects; network-on-chip; NoC; OCP; on-chip
                 communication; SoC; sockets; system-on-chip; ULSI
                 design",
}

@Article{Chakrabarti:2006:GML,
  author =       "Deepayan Chakrabarti and Christos Faloutsos",
  title =        "Graph mining: {Laws}, generators, and algorithms",
  journal =      j-COMP-SURV,
  volume =       "38",
  number =       "1",
  pages =        "2:1--2:69",
  month =        mar,
  year =         "2006",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1132952.1132953",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Venugopal:2006:TDG,
  author =       "Srikumar Venugopal and Rajkumar Buyya and Kotagiri
                 Ramamohanarao",
  title =        "A taxonomy of {Data Grids} for distributed data
                 sharing, management, and processing",
  journal =      j-COMP-SURV,
  volume =       "38",
  number =       "1",
  pages =        "3:1--3:53",
  month =        mar,
  year =         "2006",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1132952.1132955",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Data Grids have been adopted as the next generation
                 platform by many scientific communities that need to
                 share, access, transport, process, and manage large
                 data collections distributed worldwide. They combine
                 high-end computing technologies with high-performance
                 networking and wide-area storage management techniques.
                 In this article, we discuss the key concepts behind
                 Data Grids and compare them with other data sharing and
                 distribution paradigms such as content delivery
                 networks, peer-to-peer networks, and distributed
                 databases. We then provide comprehensive taxonomies
                 that cover various aspects of architecture, data
                 transportation, data replication and resource
                 allocation, and scheduling. Finally, we map the
                 proposed taxonomy to various Data Grid systems not only
                 to validate the taxonomy but also to identify areas for
                 future exploration.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "data-intensive applications; Grid computing; replica
                 management; virtual organizations",
}

@Article{Turmo:2006:AIE,
  author =       "Jordi Turmo and Alicia Ageno and Neus Catal{\`a}",
  title =        "Adaptive information extraction",
  journal =      j-COMP-SURV,
  volume =       "38",
  number =       "2",
  pages =        "4:1--4:47",
  month =        mar,
  year =         "2006",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1132956.1132957",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:09 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The growing availability of online textual sources and
                 the potential number of applications of knowledge
                 acquisition from textual data has lead to an increase
                 in Information Extraction (IE) research. Some examples
                 of these applications are the generation of data bases
                 from documents, as well as the acquisition of knowledge
                 useful for emerging technologies like question
                 answering, information integration, and others related
                 to text mining. However, one of the main drawbacks of
                 the application of IE refers to its intrinsic domain
                 dependence. For the sake of reducing the high cost of
                 manually adapting IE applications to new domains,
                 experiments with different Machine Learning (ML)
                 techniques have been carried out by the research
                 community. This survey describes and compares the main
                 approaches to IE and the different ML techniques used
                 to achieve Adaptive IE technology.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Information extraction; machine learning",
}

@Article{Ceglar:2006:AM,
  author =       "Aaron Ceglar and John F. Roddick",
  title =        "Association mining",
  journal =      j-COMP-SURV,
  volume =       "38",
  number =       "2",
  pages =        "5:1--5:42",
  month =        mar,
  year =         "2006",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1132956.1132958",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:09 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The task of finding correlations between items in a
                 dataset, association mining, has received considerable
                 attention over the last decade. This article presents a
                 survey of association mining fundamentals, detailing
                 the evolution of association mining algorithms from the
                 seminal to the state-of-the-art. This survey focuses on
                 the fundamental principles of association mining, that
                 is, itemset identification, rule generation, and their
                 generic optimizations.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "association mining; Data mining",
}

@Article{Zobel:2006:IFT,
  author =       "Justin Zobel and Alistair Moffat",
  title =        "Inverted files for text search engines",
  journal =      j-COMP-SURV,
  volume =       "38",
  number =       "2",
  pages =        "6:1--6:56",
  month =        mar,
  year =         "2006",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1132956.1132959",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:09 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The technology underlying text search engines has
                 advanced dramatically in the past decade. The
                 development of a family of new index representations
                 has led to a wide range of innovations in index
                 storage, index construction, and query evaluation.
                 While some of these developments have been consolidated
                 in textbooks, many specific techniques are not widely
                 known or the textbook descriptions are out of date. In
                 this tutorial, we introduce the key techniques in the
                 area, describing both a core implementation and how the
                 core can be enhanced through a range of extensions. We
                 conclude with a comprehensive bibliography of text
                 indexing literature.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "document database; information retrieval; Inverted
                 file indexing; text retrieval; Web search engine",
}

@Article{Ma:2006:HSR,
  author =       "Jing Ma and Jeffrey V. Nickerson",
  title =        "Hands-on, simulated, and remote laboratories: a
                 comparative literature review",
  journal =      j-COMP-SURV,
  volume =       "38",
  number =       "3",
  pages =        "7:1--7:24",
  month =        sep,
  year =         "2006",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1132960.1132961",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Laboratory-based courses play a critical role in
                 scientific education. Automation is changing the nature
                 of these laboratories, and there is a long-running
                 debate about the value of hands-on versus simulated
                 laboratories. In addition, the introduction of remote
                 laboratories adds a third category to the debate.
                 Through a review of the literature related to these
                 labs in education, the authors draw several conclusions
                 about the state of current research. The debate over
                 different technologies is confounded by the use of
                 different educational objectives as criteria for
                 judging the laboratories: Hands-on advocates emphasize
                 design skills, while remote lab advocates focus on
                 conceptual understanding. We observe that the
                 boundaries among the three labs are blurred in the
                 sense that most laboratories are mediated by computers,
                 and that the psychology of presence may be as important
                 as technology. We also discuss areas for future
                 research.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "experimentation; human-computer interaction; presence;
                 Remote laboratories; simulation; teleoperation; thought
                 experiments",
}

@Article{Miller:2006:STL,
  author =       "Alice Miller and Alastair Donaldson and Muffy Calder",
  title =        "Symmetry in temporal logic model checking",
  journal =      j-COMP-SURV,
  volume =       "38",
  number =       "3",
  pages =        "8:1--8:36",
  month =        sep,
  year =         "2006",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1132960.1132962",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Temporal logic model checking involves checking the
                 state-space of a model of a system to determine whether
                 errors can occur in the system. Often this involves
                 checking symmetrically equivalent areas of the
                 state-space. The use of symmetry reduction to increase
                 the efficiency of model checking has inspired a wealth
                 of activity in the area of model checking research. We
                 provide a survey of the associated literature.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Model checking; quotient graph; symmetry",
}

@Article{Geng:2006:IMD,
  author =       "Liqiang Geng and Howard J. Hamilton",
  title =        "Interestingness measures for data mining: a survey",
  journal =      j-COMP-SURV,
  volume =       "38",
  number =       "3",
  pages =        "9:1--9:32",
  month =        sep,
  year =         "2006",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1132960.1132963",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Interestingness measures play an important role in
                 data mining, regardless of the kind of patterns being
                 mined. These measures are intended for selecting and
                 ranking patterns according to their potential interest
                 to the user. Good measures also allow the time and
                 space costs of the mining process to be reduced. This
                 survey reviews the interestingness measures for rules
                 and summaries, classifies them from several
                 perspectives, compares their properties, identifies
                 their roles in the data mining process, gives
                 strategies for selecting appropriate measures for
                 applications, and identifies opportunities for future
                 research in this area.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "association rules; classification rules; interest
                 measures; interestingness measures; Knowledge
                 discovery; summaries",
}

@Article{Graefe:2006:ISD,
  author =       "Goetz Graefe",
  title =        "Implementing sorting in database systems",
  journal =      j-COMP-SURV,
  volume =       "38",
  number =       "3",
  pages =        "10:1--10:37",
  month =        sep,
  year =         "2006",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1132960.1132964",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Most commercial database systems do (or should)
                 exploit many sorting techniques that are publicly
                 known, but not readily available in the research
                 literature. These techniques improve both sort
                 performance on modern computer systems and the ability
                 to adapt gracefully to resource fluctuations in
                 multiuser operations. This survey collects many of
                 these techniques for easy reference by students,
                 researchers, and product developers. It covers
                 in-memory sorting, disk-based external sorting, and
                 considerations that apply specifically to sorting in
                 database systems.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "asynchronous read-ahead; compression; dynamic memory
                 resource allocation; forecasting; graceful degradation;
                 index operations; key conditioning; Key normalization;
                 nested iteration",
}

@Article{Frost:2006:RNL,
  author =       "Richard A. Frost",
  title =        "Realization of natural language interfaces using lazy
                 functional programming",
  journal =      j-COMP-SURV,
  volume =       "38",
  number =       "4",
  pages =        "11:1--11:54",
  month =        dec,
  year =         "2006",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1177352.1177353",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The construction of natural language interfaces to
                 computers continues to be a major challenge. The need
                 for such interfaces is growing now that speech
                 recognition technology is becoming more readily
                 available, and people cannot speak those
                 computer-oriented formal languages that are frequently
                 used to interact with computer applications. Much of
                 the research related to the design and implementation
                 of natural language interfaces has involved the use of
                 high-level declarative programming languages. This is
                 to be expected as the task is extremely difficult,
                 involving syntactic and semantic analysis of
                 potentially ambiguous input. The use of LISP and Prolog
                 in this area is well documented. However, research
                 involving the relatively new lazy functional
                 programming paradigm is less well known. This paper
                 provides a comprehensive survey of that research.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computational linguistics; higher-order functions;
                 lazy functional programming; Montague grammar;
                 Natural-language interfaces",
}

@Article{Bordeaux:2006:PSC,
  author =       "Lucas Bordeaux and Youssef Hamadi and Lintao Zhang",
  title =        "Propositional Satisfiability and Constraint
                 Programming: a comparative survey",
  journal =      j-COMP-SURV,
  volume =       "38",
  number =       "4",
  pages =        "12:1--12:54",
  month =        dec,
  year =         "2006",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1177352.1177354",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Propositional Satisfiability (SAT) and Constraint
                 Programming (CP) have developed as two relatively
                 independent threads of research cross-fertilizing
                 occasionally. These two approaches to problem solving
                 have a lot in common as evidenced by similar ideas
                 underlying the branch and prune algorithms that are
                 most successful at solving both kinds of problems. They
                 also exhibit differences in the way they are used to
                 state and solve problems since SAT's approach is, in
                 general, a black-box approach, while CP aims at being
                 tunable and programmable. This survey overviews the two
                 areas in a comparative way, emphasizing the
                 similarities and differences between the two and the
                 points where we feel that one technology can benefit
                 from ideas or experience acquired from the other.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "constraint satisfaction; SAT; Search",
}

@Article{Yilmaz:2006:OTS,
  author =       "Alper Yilmaz and Omar Javed and Mubarak Shah",
  title =        "Object tracking: a survey",
  journal =      j-COMP-SURV,
  volume =       "38",
  number =       "4",
  pages =        "13:1--13:45",
  month =        dec,
  year =         "2006",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1177352.1177355",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:10 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The goal of this article is to review the
                 state-of-the-art tracking methods, classify them into
                 different categories, and identify new trends. Object
                 tracking, in general, is a challenging problem.
                 Difficulties in tracking objects can arise due to
                 abrupt object motion, changing appearance patterns of
                 both the object and the scene, nonrigid object
                 structures, object-to-object and object-to-scene
                 occlusions, and camera motion. Tracking is usually
                 performed in the context of higher-level applications
                 that require the location and/or shape of the object in
                 every frame. Typically, assumptions are made to
                 constrain the tracking problem in the context of a
                 particular application. In this survey, we categorize
                 the tracking methods on the basis of the object and
                 motion representations used, provide detailed
                 descriptions of representative methods in each
                 category, and examine their pros and cons. Moreover, we
                 discuss the important issues related to tracking
                 including the use of appropriate image features,
                 selection of motion models, and detection of objects.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Appearance models; contour evolution; feature
                 selection; object detection; object representation;
                 point tracking; shape tracking",
}

@Article{VanDerMerwe:2007:SPP,
  author =       "Johann {Van Der Merwe} and Dawoud Dawoud and Stephen
                 McDonald",
  title =        "A survey on peer-to-peer key management for mobile ad
                 hoc networks",
  journal =      j-COMP-SURV,
  volume =       "39",
  number =       "1",
  pages =        "1:1--1:45",
  month =        apr,
  year =         "2007",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1216370.1216371",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:11 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The article reviews the most popular peer-to-peer key
                 management protocols for mobile ad hoc networks
                 (MANETs). The protocols are subdivided into groups
                 based on their design strategy or main characteristic.
                 The article discusses and provides comments on the
                 strategy of each group separately. The discussions give
                 insight into open research problems in the area of
                 pairwise key management.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Mobile ad hoc networks; pairwise key management;
                 peer-to-peer key management; security",
}

@Article{Navarro:2007:CFT,
  author =       "Gonzalo Navarro and Veli M{\"a}kinen",
  title =        "Compressed full-text indexes",
  journal =      j-COMP-SURV,
  volume =       "39",
  number =       "1",
  pages =        "2:1--2:61",
  month =        apr,
  year =         "2007",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1216370.1216372",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:11 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Full-text indexes provide fast substring search over
                 large text collections. A serious problem of these
                 indexes has traditionally been their space consumption.
                 A recent trend is to develop indexes that exploit the
                 compressibility of the text, so that their size is a
                 function of the compressed text length. This concept
                 has evolved into self-indexes, which in addition
                 contain enough information to reproduce any text
                 portion, so they replace the text. The exciting
                 possibility of an index that takes space close to that
                 of the compressed text, replaces it, and in addition
                 provides fast search over it, has triggered a wealth of
                 activity and produced surprising results in a very
                 short time, which radically changed the status of this
                 area in less than 5 years. The most successful indexes
                 nowadays are able to obtain almost optimal space and
                 search time simultaneously.\par

                 In this article we present the main concepts underlying
                 (compressed) self-indexes. We explain the relationship
                 between text entropy and regularities that show up in
                 index structures and permit compressing them. Then we
                 cover the most relevant self-indexes, focusing on how
                 they exploit text compressibility to achieve compact
                 structures that can efficiently solve various search
                 problems. Our aim is to give the background to
                 understand and follow the developments in this area.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "entropy; text compression; Text indexing",
}

@Article{Peng:2007:SNB,
  author =       "Tao Peng and Christopher Leckie and Kotagiri
                 Ramamohanarao",
  title =        "Survey of network-based defense mechanisms countering
                 the {DoS} and {DDoS} problems",
  journal =      j-COMP-SURV,
  volume =       "39",
  number =       "1",
  pages =        "3:1--3:42",
  month =        apr,
  year =         "2007",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1216370.1216373",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:11 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article presents a survey of denial of service
                 attacks and the methods that have been proposed for
                 defense against these attacks. In this survey, we
                 analyze the design decisions in the Internet that have
                 created the potential for denial of service attacks. We
                 review the state-of-art mechanisms for defending
                 against denial of service attacks, compare the
                 strengths and weaknesses of each proposal, and discuss
                 potential countermeasures against each defense
                 mechanism. We conclude by highlighting opportunities
                 for an integrated solution to solve the problem of
                 distributed denial of service attacks.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "bandwidth attack; Botnet; DDoS; DNS reflector attack;
                 DoS; Internet security; IP spoofing; IP traceback; IRC;
                 resource management; SYN flood; VoIP security",
}

@Article{Puglisi:2007:TSA,
  author =       "Simon J. Puglisi and W. F. Smyth and Andrew H.
                 Turpin",
  title =        "A taxonomy of suffix array construction algorithms",
  journal =      j-COMP-SURV,
  volume =       "39",
  number =       "2",
  pages =        "4:1--4:31",
  month =        jul,
  year =         "2007",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1242471.1242472",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In 1990, Manber and Myers proposed suffix arrays as a
                 space-saving alternative to suffix trees and described
                 the first algorithms for suffix array construction and
                 use. Since that time, and especially in the last few
                 years, suffix array construction algorithms have
                 proliferated in bewildering abundance. This survey
                 paper attempts to provide simple high-level
                 descriptions of these numerous algorithms that
                 highlight both their distinctive features and their
                 commonalities, while avoiding as much as possible the
                 complexities of implementation details. New hybrid
                 algorithms are also described. We provide comparisons
                 of the algorithms' worst-case time complexity and use
                 of additional space, together with results of recent
                 experimental test runs on many of their
                 implementations.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Burrows--Wheeler transform; Suffix array; suffix
                 sorting; suffix tree",
}

@Article{Zheng:2007:SRI,
  author =       "Dong Zheng and Yan Liu and Jiying Zhao and
                 Abdulmotaleb El Saddik",
  title =        "A survey of {RST} invariant image watermarking
                 algorithms",
  journal =      j-COMP-SURV,
  volume =       "39",
  number =       "2",
  pages =        "5:1--5:91",
  month =        jul,
  year =         "2007",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1242471.1242473",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In this article, we review the algorithms for
                 rotation, scaling and translation (RST) invariant image
                 watermarking. There are mainly two categories of RST
                 invariant image watermarking algorithms. One is to
                 rectify the RST transformed image before conducting
                 watermark detection. Another is to embed and detect
                 watermark in an RST invariant or semi-invariant domain.
                 In order to help readers understand, we first introduce
                 the fundamental theories and techniques used in the
                 existing RST invariant image watermarking algorithms.
                 Then, we discuss in detail the work principles,
                 embedding process, and detection process of the typical
                 RST invariant image watermarking algorithms. Finally,
                 we analyze and evaluate these typical algorithms
                 through implementation, and point out their advantages
                 and disadvantages.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Digital image watermarking; feature points;
                 Fourier-Mellin transform; ILPM; LPM; moments; Radon
                 transform; RST invariant; template matching",
}

@Article{Bruss:2007:QCS,
  author =       "Dagmar Bruss and G{\'a}bor Erd{\'e}lyi and Tim Meyer
                 and Tobias Riege and J{\"o}rg Rothe",
  title =        "Quantum cryptography: a survey",
  journal =      j-COMP-SURV,
  volume =       "39",
  number =       "2",
  pages =        "6:1--6:27",
  month =        jul,
  year =         "2007",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1242471.1242474",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:12 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We survey some results in quantum cryptography. After
                 a brief introduction to classical cryptography, we
                 provide the quantum-mechanical background needed to
                 present some fundamental protocols from quantum
                 cryptography. In particular, we review quantum key
                 distribution via the BB84 protocol and its security
                 proof, as well as the related quantum bit commitment
                 protocol and its proof of insecurity.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Quantum bit commitment; quantum cryptography; quantum
                 key distribution",
}

@Article{Uludag:2007:ATA,
  author =       "Suleyman Uludag and King-Shan Lui and Klara Nahrstedt
                 and Gregory Brewster",
  title =        "Analysis of {Topology Aggregation} techniques for
                 {QoS} routing",
  journal =      j-COMP-SURV,
  volume =       "39",
  number =       "3",
  pages =        "7:1--7:31",
  month =        sep,
  year =         "2007",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1267070.1267071",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We study and compare topology aggregation techniques
                 used in QoS routing. Topology Aggregation (TA) is
                 defined as a set of techniques that abstract or
                 summarize the state information about the network
                 topology to be exchanged, processed, and maintained by
                 network nodes for routing purposes. Due to scalability,
                 aggregation techniques have been an integral part of
                 some routing protocols. However, TA has not been
                 studied extensively except in a rather limited context.
                 With the continuing growth of the Internet, scalability
                 issues of QoS routing have been gaining importance.
                 Therefore, we survey the current TA techniques, provide
                 methodology to classify, evaluate, and compare their
                 complexities and efficiencies.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "bandwidth; delay; hierarchical networks; inaccuracy;
                 networks; path selection; QoS routing; routing;
                 topology; Topology aggregation",
}

@Article{Truran:2007:AAT,
  author =       "Mark Truran and James Goulding and Helen Ashman",
  title =        "Autonomous authoring tools for hypertext",
  journal =      j-COMP-SURV,
  volume =       "39",
  number =       "3",
  pages =        "8:1--8:30",
  month =        sep,
  year =         "2007",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1267070.1267072",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Autonomous authoring tools are routinely used to
                 expedite the translation of large document collections
                 into functioning hypertexts. They are also used to add
                 hyperlinks to pre-existing hypertext structures. In
                 this survey we describe a taxonomy of autonomous
                 hypertext authoring tools. The classification of any
                 given system is determined by the type and nature of
                 the document analysis it performs.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Authoring tools; automatic hypertext generation
                 systems; link generation",
}

@Article{Nakamura:2007:IFW,
  author =       "Eduardo F. Nakamura and Antonio A. F. Loureiro and
                 Alejandro C. Frery",
  title =        "Information fusion for wireless sensor networks:
                 {Methods}, models, and classifications",
  journal =      j-COMP-SURV,
  volume =       "39",
  number =       "3",
  pages =        "9:1--9:55",
  month =        sep,
  year =         "2007",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1267070.1267073",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:13 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Wireless sensor networks produce a large amount of
                 data that needs to be processed, delivered, and
                 assessed according to the application objectives. The
                 way these data are manipulated by the sensor nodes is a
                 fundamental issue. Information fusion arises as a
                 response to process data gathered by sensor nodes and
                 benefits from their processing capability. By
                 exploiting the synergy among the available data,
                 information fusion techniques can reduce the amount of
                 data traffic, filter noisy measurements, and make
                 predictions and inferences about a monitored entity. In
                 this work, we survey the current state-of-the-art of
                 information fusion by presenting the known methods,
                 algorithms, architectures, and models of information
                 fusion, and discuss their applicability in the context
                 of wireless sensor networks.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "architectures and models; data aggregation; data
                 fusion; Information fusion; wireless sensor networks",
}

@Article{Katifori:2007:OVM,
  author =       "Akrivi Katifori and Constantin Halatsis and George
                 Lepouras and Costas Vassilakis and Eugenia
                 Giannopoulou",
  title =        "Ontology visualization methods --- a survey",
  journal =      j-COMP-SURV,
  volume =       "39",
  number =       "4",
  pages =        "10:1--10:43",
  month =        nov,
  year =         "2007",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1287620.1287621",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:14 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Ontologies, as sets of concepts and their
                 interrelations in a specific domain, have proven to be
                 a useful tool in the areas of digital libraries, the
                 Semantic Web, and personalized information management.
                 As a result, there is a growing need for effective
                 ontology visualization for design, management and
                 browsing. There exist several ontology visualization
                 methods and also a number of techniques used in other
                 contexts that could be adapted for ontology
                 representation. The purpose of this article is to
                 present these techniques and categorize their
                 characteristics and features in order to assist method
                 selection and promote future research in the area of
                 ontology visualization.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "human-computer interaction; Ontology; visualization
                 method",
}

@Article{Thomas:2007:GRN,
  author =       "David B. Thomas and Wayne Luk and Philip H. W. Leong
                 and John D. Villasenor",
  title =        "{Gaussian} random number generators",
  journal =      j-COMP-SURV,
  volume =       "39",
  number =       "4",
  pages =        "11:1--11:38",
  month =        nov,
  year =         "2007",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1287620.1287622",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:14 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Rapid generation of high quality Gaussian random
                 numbers is a key capability for simulations across a
                 wide range of disciplines. Advances in computing have
                 brought the power to conduct simulations with very
                 large numbers of random numbers and with it, the
                 challenge of meeting increasingly stringent
                 requirements on the quality of Gaussian random number
                 generators (GRNG). This article describes the
                 algorithms underlying various GRNGs, compares their
                 computational requirements, and examines the quality of
                 the random numbers with emphasis on the behaviour in
                 the tail region of the Gaussian probability density
                 function.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Ahrens--Dieter; Box--Muller; Central-Limit;
                 CLT-Stretched; Gaussian; GRAND; Hastings; Kinderman;
                 Leva; Marsaglia--Bray; Mersenne Twister;
                 Mixture-of-Triangles; Monty Python; normal; polar;
                 PPND16; PPND7; random number; Random numbers;
                 simulation; Wallace; ziggurat",
}

@Article{Morfonios:2007:RID,
  author =       "Konstantinos Morfonios and Stratis Konakas and Yannis
                 Ioannidis and Nikolaos Kotsis",
  title =        "{ROLAP} implementations of the data cube",
  journal =      j-COMP-SURV,
  volume =       "39",
  number =       "4",
  pages =        "12:1--12:53",
  month =        nov,
  year =         "2007",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1287620.1287623",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:14 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Implementation of the data cube is an important and
                 scientifically interesting issue in On-Line Analytical
                 Processing (OLAP) and has been the subject of a
                 plethora of related publications. Naive implementation
                 methods that compute each node separately and store the
                 result are impractical, since they have exponential
                 time and space complexity with respect to the cube
                 dimensionality. To overcome this drawback, a wide range
                 of methods that provide efficient cube implementation
                 (with respect to both computation and storage) have
                 been proposed, which make use of relational,
                 multidimensional, or graph-based data structures.
                 Furthermore, there are several other methods that
                 compute and store approximate descriptions of data
                 cubes, sacrificing accuracy for condensation. In this
                 article, we focus on Relational-OLAP (ROLAP), following
                 the majority of the efforts so far. We review existing
                 ROLAP methods that implement the data cube and identify
                 six orthogonal parameters/dimensions that characterize
                 them. We place the existing techniques at the
                 appropriate points within the problem space defined by
                 these parameters and identify several clusters that the
                 techniques form with various interesting properties. A
                 careful study of these properties leads to the
                 identification of particularly effective values for the
                 space parameters and indicates the potential for
                 devising new algorithms with better overall
                 performance.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Data cube; data warehouse; OLAP",
}

@Article{Angles:2008:SGD,
  author =       "Renzo Angles and Claudio Gutierrez",
  title =        "Survey of graph database models",
  journal =      j-COMP-SURV,
  volume =       "40",
  number =       "1",
  pages =        "1:1--1:39",
  month =        feb,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1322432.1322433",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:15 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Graph database models can be defined as those in which
                 data structures for the schema and instances are
                 modeled as graphs or generalizations of them, and data
                 manipulation is expressed by graph-oriented operations
                 and type constructors. These models took off in the
                 eighties and early nineties alongside object-oriented
                 models. Their influence gradually died out with the
                 emergence of other database models, in particular
                 geographical, spatial, semistructured, and XML.
                 Recently, the need to manage information with
                 graph-like nature has reestablished the relevance of
                 this area. The main objective of this survey is to
                 present the work that has been conducted in the area of
                 graph database modeling, concentrating on data
                 structures, query languages, and integrity
                 constraints.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "database models; Database systems; graph database
                 models; graph databases; graph integrity constraints;
                 graph query languages",
}

@Article{Fabbri:2008:EDT,
  author =       "Ricardo Fabbri and Luciano Da F. Costa and Julio C.
                 Torelli and Odemir M. Bruno",
  title =        "{$2$D} {Euclidean} distance transform algorithms: a
                 comparative survey",
  journal =      j-COMP-SURV,
  volume =       "40",
  number =       "1",
  pages =        "2:1--2:44",
  month =        feb,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1322432.1322434",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:15 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The distance transform (DT) is a general operator
                 forming the basis of many methods in computer vision
                 and geometry, with great potential for practical
                 applications. However, all the optimal algorithms for
                 the computation of the exact Euclidean DT (EDT) were
                 proposed only since the 1990s. In this work,
                 state-of-the-art sequential 2D EDT algorithms are
                 reviewed and compared, in an effort to reach more solid
                 conclusions regarding their differences in speed and
                 their exactness. Six of the best algorithms were fully
                 implemented and compared in practice.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computational geometry; Dijkstra's algorithm; Distance
                 transform; exact Euclidean distance map; performance
                 evaluation; shape analysis",
}

@Article{Ramsin:2008:PCR,
  author =       "Raman Ramsin and Richard F. Paige",
  title =        "Process-centered review of object oriented software
                 development methodologies",
  journal =      j-COMP-SURV,
  volume =       "40",
  number =       "1",
  pages =        "3:1--3:89",
  month =        feb,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1322432.1322435",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:15 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We provide a detailed review of existing
                 object-oriented software development methodologies,
                 focusing on their development processes. The review
                 aims at laying bare their core philosophies, processes,
                 and internal activities. This is done by using a
                 process-centered template for summarizing the
                 methodologies, highlighting the activities prescribed
                 in the methodology while describing the modeling
                 languages used (mainly diagrams and tables) as
                 secondary to the activities. The descriptions produced
                 using this template aim not to offer a critique on the
                 methodologies and processes, but instead provide an
                 abstract and structured description in a way that
                 facilitates their elaborate analysis for the purposes
                 of improving understanding, and making it easier to
                 tailor, select, and evaluate the processes.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "agile methods; integrated methodologies; methodology
                 engineering; Object-oriented methodologies; seminal
                 methodologies",
}

@Article{Vosloo:2008:SCW,
  author =       "Iwan Vosloo and Derrick G. Kourie",
  title =        "Server-centric {Web} frameworks: an overview",
  journal =      j-COMP-SURV,
  volume =       "40",
  number =       "2",
  pages =        "4:1--4:33",
  month =        apr,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1348246.1348247",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Most contemporary Web frameworks may be classified as
                 server-centric. An overview of such Web frameworks is
                 presented. It is based on information gleaned from
                 surveying 80 server-centric Web frameworks, as well as
                 from popular related specifications. Requirements
                 typically expected of a server-centric Web framework
                 are discussed. Two Web framework taxonomies are
                 proposed, reflecting two orthogonal ways of
                 characterizing a framework: the way in which the markup
                 language content of a browser-destined document is
                 specified in the framework (presentation concerns); and
                 the framework's facilities for the user to control the
                 flow of events between browser and server (control
                 concerns).",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Architecture; specification techniques; user
                 interfaces; Web frameworks",
}

@Article{Datta:2008:IRI,
  author =       "Ritendra Datta and Dhiraj Joshi and Jia Li and James
                 Z. Wang",
  title =        "Image retrieval: {Ideas}, influences, and trends of
                 the new age",
  journal =      j-COMP-SURV,
  volume =       "40",
  number =       "2",
  pages =        "5:1--5:60",
  month =        apr,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1348246.1348248",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We have witnessed great interest and a wealth of
                 promise in content-based image retrieval as an emerging
                 technology. While the last decade laid foundation to
                 such promise, it also paved the way for a large number
                 of new techniques and systems, got many new people
                 involved, and triggered stronger association of weakly
                 related fields. In this article, we survey almost 300
                 key theoretical and empirical contributions in the
                 current decade related to image retrieval and automatic
                 image annotation, and in the process discuss the
                 spawning of related subfields. We also discuss
                 significant challenges involved in the adaptation of
                 existing image retrieval techniques to build systems
                 that can be useful in the real world. In retrospect of
                 what has been achieved so far, we also conjecture what
                 the future may hold for image retrieval research.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "annotation; Content-based image retrieval; learning;
                 modeling; tagging",
}

@Article{DeFlorio:2008:SLS,
  author =       "Vincenzo {De Florio} and Chris Blondia",
  title =        "A survey of linguistic structures for
                 application-level fault tolerance",
  journal =      j-COMP-SURV,
  volume =       "40",
  number =       "2",
  pages =        "6:1--6:37",
  month =        apr,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1348246.1348249",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 10:21:16 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Structures for the expression of fault-tolerance
                 provisions in application software comprise the central
                 topic of this article. Structuring techniques answer
                 questions as to how to incorporate fault tolerance in
                 the application layer of a computer program and how to
                 manage the fault-tolerant code. As such, they provide
                 the means to control complexity, the latter being a
                 relevant factor for the introduction of design faults.
                 This fact and the ever-increasing complexity of today's
                 distributed software justify the need for simple,
                 coherent, and effective structures for the expression
                 of fault-tolerance in the application software. In this
                 text we first define a ``base'' of structural
                 attributes with which application-level fault-tolerance
                 structures can be qualitatively assessed and compared
                 with each other and with respect to the aforementioned
                 needs. This result is then used to provide an
                 elaborated survey of the state-of-the-art of
                 application-level fault-tolerance structures.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Language support for software-implemented fault
                 tolerance; reconfiguration and error recovery;
                 separation of design concerns; software fault
                 tolerance",
}

@Article{Huebscher:2008:SAC,
  author =       "Markus C. Huebscher and Julie A. McCann",
  title =        "A survey of autonomic computing --- degrees, models,
                 and applications",
  journal =      j-COMP-SURV,
  volume =       "40",
  number =       "3",
  pages =        "7:1--7:28",
  month =        aug,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1380584.1380585",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Aug 12 12:48:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Autonomic Computing is a concept that brings together
                 many fields of computing with the purpose of creating
                 computing systems that self-manage. In its early days
                 it was criticised as being a ``hype topic'' or a
                 rebadging of some Multi Agent Systems work. In this
                 survey, we hope to show that this was not indeed `hype'
                 and that, though it draws on much work already carried
                 out by the Computer Science and Control communities,
                 its innovation is strong and lies in its robust
                 application to the specific self-management of
                 computing systems. To this end, we first provide an
                 introduction to the motivation and concepts of
                 autonomic computing and describe some research that has
                 been seen as seminal in influencing a large proportion
                 of early work. Taking the components of an established
                 reference model in turn, we discuss the works that have
                 provided significant contributions to that area. We
                 then look at larger scaled systems that compose
                 autonomic systems illustrating the hierarchical nature
                 of their architectures. Autonomicity is not a well
                 defined subject and as such different systems adhere to
                 different degrees of Autonomicity, therefore we
                 cross-slice the body of work in terms of these degrees.
                 From this we list the key applications of autonomic
                 computing and discuss the research work that is missing
                 and what we believe the community should be
                 considering.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "autonomic computing; self-adaptive; self-healing
                 systems",
}

@Article{Lopez:2008:SMT,
  author =       "Adam Lopez",
  title =        "Statistical machine translation",
  journal =      j-COMP-SURV,
  volume =       "40",
  number =       "3",
  pages =        "8:1--8:49",
  month =        aug,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1380584.1380586",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Aug 12 12:48:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Statistical machine translation (SMT) treats the
                 translation of natural language as a machine learning
                 problem. By examining many samples of human-produced
                 translation, SMT algorithms automatically learn how to
                 translate. SMT has made tremendous strides in less than
                 two decades, and new ideas are constantly introduced.
                 This survey presents a tutorial overview of the state
                 of the art. We describe the context of the current
                 research and then move to a formal problem description
                 and an overview of the main subproblems: translation
                 modeling, parameter estimation, and decoding. Along the
                 way, we present a taxonomy of some different approaches
                 within these areas. We conclude with an overview of
                 evaluation and a discussion of future directions.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "machine translation; natural language processing",
}

@Article{Chapin:2008:ATM,
  author =       "Peter C. Chapin and Christian Skalka and X. Sean
                 Wang",
  title =        "Authorization in trust management: {Features} and
                 foundations",
  journal =      j-COMP-SURV,
  volume =       "40",
  number =       "3",
  pages =        "9:1--9:48",
  month =        aug,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1380584.1380587",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Aug 12 12:48:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Trust management systems are frameworks for
                 authorization in modern distributed systems, allowing
                 remotely accessible resources to be protected by
                 providers. By allowing providers to specify policy, and
                 access requesters to possess certain access rights,
                 trust management automates the process of determining
                 whether access should be allowed on the basis of
                 policy, rights, and an authorization semantics. In this
                 paper we survey modern state-of-the-art in trust
                 management authorization, focusing on features of
                 policy and rights languages that provide the necessary
                 expressiveness for modern practice. We characterize
                 systems in light of a generic structure that takes into
                 account components of practical implementations. We
                 emphasize systems that have a formal foundation, since
                 security properties of them can be rigorously
                 guaranteed. Underlying formalisms are reviewed to
                 provide necessary background.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "distributed authorization; trust management systems",
}

@Article{Miltchev:2008:DAC,
  author =       "Stefan Miltchev and Jonathan M. Smith and Vassilis
                 Prevelakis and Angelos Keromytis and Sotiris
                 Ioannidis",
  title =        "Decentralized access control in distributed file
                 systems",
  journal =      j-COMP-SURV,
  volume =       "40",
  number =       "3",
  pages =        "10:1--10:30",
  month =        aug,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1380584.1380588",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Aug 12 12:48:08 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The Internet enables global sharing of data across
                 organizational boundaries. Distributed file systems
                 facilitate data sharing in the form of remote file
                 access. However, traditional access control mechanisms
                 used in distributed file systems are intended for
                 machines under common administrative control, and rely
                 on maintaining a centralized database of user
                 identities. They fail to scale to a large user base
                 distributed across multiple organizations. We provide a
                 survey of decentralized access control mechanisms in
                 distributed file systems intended for large scale, in
                 both administrative domains and users. We identify
                 essential properties of such access control mechanisms.
                 We analyze both popular production and experimental
                 distributed file systems in the context of our
                 survey.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "authentication; authorization; certificates;
                 credentials; decentralized access control; networked
                 file systems; trust management",
}

@Article{Ilyas:2008:STQ,
  author =       "Ihab F. Ilyas and George Beskales and Mohamed A.
                 Soliman",
  title =        "A survey of top-$k$ query processing techniques in
                 relational database systems",
  journal =      j-COMP-SURV,
  volume =       "40",
  number =       "4",
  pages =        "11:1--11:58",
  month =        oct,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1391729.1391730",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 10 12:49:18 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Efficient processing of top-$k$ queries is a crucial
                 requirement in many interactive environments that
                 involve massive amounts of data. In particular,
                 efficient top-$k$ processing in domains such as the
                 Web, multimedia search, and distributed systems has
                 shown a great impact on performance. In this survey, we
                 describe and classify top-$k$ processing techniques in
                 relational databases. We discuss different design
                 dimensions in the current techniques including query
                 models, data access methods, implementation levels,
                 data and query certainty, and supported scoring
                 functions. We show the implications of each dimension
                 on the design of the underlying techniques. We also
                 discuss top-$k$ queries in XML domain, and show their
                 connections to relational approaches.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "rank aggregation; rank-aware processing; top-k;
                 voting",
}

@Article{Biasotti:2008:DSG,
  author =       "S. Biasotti and L. {De Floriani} and B. Falcidieno and
                 P. Frosini and D. Giorgi and C. Landi and L. Papaleo
                 and M. Spagnuolo",
  title =        "Describing shapes by geometrical-topological
                 properties of real functions",
  journal =      j-COMP-SURV,
  volume =       "40",
  number =       "4",
  pages =        "12:1--12:87",
  month =        oct,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1391729.1391731",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 10 12:49:18 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Differential topology, and specifically Morse theory,
                 provide a suitable setting for formalizing and solving
                 several problems related to shape analysis. The
                 fundamental idea behind Morse theory is that of
                 combining the topological exploration of a shape with
                 quantitative measurement of geometrical properties
                 provided by a real function defined on the shape. The
                 added value of approaches based on Morse theory is in
                 the possibility of adopting different functions as
                 shape descriptors according to the properties and
                 invariants that one wishes to analyze. In this sense,
                 Morse theory allows one to construct a {\em general
                 framework\/} for shape characterization, parametrized
                 with respect to the mapping function used, and possibly
                 the space associated with the shape. The mapping
                 function plays the role of a {\em lens\/} through which
                 we look at the properties of the shape, and different
                 functions provide different insights.\par

                 In the last decade, an increasing number of methods
                 that are rooted in Morse theory and make use of
                 properties of real-valued functions for describing
                 shapes have been proposed in the literature. The
                 methods proposed range from approaches which use the
                 configuration of contours for encoding topographic
                 surfaces to more recent work on size theory and
                 persistent homology. All these have been developed over
                 the years with a specific target domain and it is not
                 trivial to systematize this work and understand the
                 links, similarities, and differences among the
                 different methods. Moreover, different terms have been
                 used to denote the same mathematical constructs, which
                 often overwhelm the understanding of the underlying
                 common framework.\par

                 The aim of this survey is to provide a clear vision of
                 what has been developed so far, focusing on methods
                 that make use of theoretical frameworks that are
                 developed for {\em classes\/} of real functions rather
                 than for a single function, even if they are applied in
                 a restricted manner. The term {\em
                 geometrical-topological\/} used in the title is meant
                 to underline that both levels of information content
                 are relevant for the applications of shape
                 descriptions: geometrical, or metrical, properties and
                 attributes are crucial for characterizing specific
                 instances of features, while topological properties are
                 necessary to abstract and classify shapes according to
                 invariant aspects of their geometry. The approaches
                 surveyed will be discussed in detail, with respect to
                 theory, computation, and application. Several
                 properties of the shape descriptors will be analyzed
                 and compared. We believe this is a crucial step to
                 exploit fully the potential of such approaches in many
                 applications, as well as to identify important areas of
                 future research.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computational topology; contour tree; Morse complexes;
                 Morse theory; persistent homology; Reeb graph; shape
                 analysis; size theory",
}

@Article{Bleiholder:2008:DF,
  author =       "Jens Bleiholder and Felix Naumann",
  title =        "Data fusion",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "1",
  pages =        "1:1--1:41",
  month =        dec,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1456650.1456651",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jan 12 16:47:51 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The development of the Internet in recent years has
                 made it possible and useful to access many different
                 information systems anywhere in the world to obtain
                 information. While there is much research on the
                 integration of heterogeneous information systems, most
                 commercial systems stop short of the actual integration
                 of available data. Data fusion is the process of fusing
                 multiple records representing the same real-world
                 object into a single, consistent, and clean
                 representation.\par

                 This article places data fusion into the greater
                 context of data integration, precisely defines the
                 goals of data fusion, namely, complete, concise, and
                 consistent data, and highlights the challenges of data
                 fusion, namely, uncertain and conflicting data values.
                 We give an overview and classification of different
                 ways of fusing data and present several techniques
                 based on standard and advanced operators of the
                 relational algebra and SQL. Finally, the article
                 features a comprehensive survey of data integration
                 systems from academia and industry, showing if and how
                 data fusion is performed in each.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Data cleansing; data conflicts; data consolidation;
                 data integration; data merging; data quality",
}

@Article{Cockburn:2008:ROZ,
  author =       "Andy Cockburn and Amy Karlson and Benjamin B.
                 Bederson",
  title =        "A review of overview+detail, zooming, and
                 focus+context interfaces",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "1",
  pages =        "2:1--2:31",
  month =        dec,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1456650.1456652",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jan 12 16:47:51 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "There are many interface schemes that allow users to
                 work at, and move between, focused and contextual views
                 of a dataset. We review and categorize these schemes
                 according to the interface mechanisms used to separate
                 and blend views. The four approaches are
                 overview+detail, which uses a spatial separation
                 between focused and contextual views; zooming, which
                 uses a temporal separation; focus+context, which
                 minimizes the seam between views by displaying the
                 focus within the context; and cue-based techniques
                 which selectively highlight or suppress items within
                 the information space. Critical features of these
                 categories, and empirical evidence of their success,
                 are discussed. The aim is to provide a succinct summary
                 of the state-of-the-art, to illuminate both successful
                 and unsuccessful interface strategies, and to identify
                 potentially fruitful areas for further work.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "fisheye views; focus+context; Information display;
                 information visualization; overview+detail; review
                 paper; zoomable user interfaces",
}

@Article{Benedikt:2008:XL,
  author =       "Michael Benedikt and Christoph Koch",
  title =        "{XPath} leashed",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "1",
  pages =        "3:1--3:54",
  month =        dec,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1456650.1456653",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jan 12 16:47:51 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This survey gives an overview of formal results on the
                 XML query language XPath. We identify several important
                 fragments of XPath, focusing on subsets of XPath 1.0.
                 We then give results on the expressiveness of XPath and
                 its fragments compared to other formalisms for querying
                 trees, algorithms, and complexity bounds for evaluation
                 of XPath queries, as well as static analysis of XPath
                 queries.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "XML; XPath",
}

@Article{Borie:2008:SPR,
  author =       "Richard B. Borie and R. Gary Parker and Craig A.
                 Tovey",
  title =        "Solving problems on recursively constructed graphs",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "1",
  pages =        "4:1--4:51",
  month =        dec,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1456650.1456654",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jan 12 16:47:51 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Fast algorithms can be created for many graph problems
                 when instances are confined to classes of graphs that
                 are recursively constructed. This article first
                 describes some basic conceptual notions regarding the
                 design of such fast algorithms, and then the coverage
                 proceeds through several recursive graph classes.
                 Specific classes include trees, series-parallel graphs,
                 {\em k\/} -terminal graphs, treewidth- {\em k\/}
                 graphs, {\em k\/} -trees, partial {\em k\/} -trees,
                 {\em k\/} -jackknife graphs, pathwidth- {\em k\/}
                 graphs, bandwidth- {\em k\/} graphs, cutwidth- {\em
                 k\/} graphs, branchwidth- {\em k\/} graphs, Halin
                 graphs, cographs, cliquewidth- {\em k\/} graphs, {\em
                 k\/} -NLC graphs, {\em k\/} -HB graphs, and rankwidth-
                 {\em k\/} graphs. The definition of each class is
                 provided. Typical algorithms are applied to solve
                 problems on instances of most classes. Relationships
                 between the classes are also discussed.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Bandwidth; branchwidth; cliquewidth; cograph;
                 cutwidth; dynamic programming; Halin graph; pathwidth;
                 rankwidth; series parallel; tree; treewidth",
}

@Article{Onieva:2008:MNS,
  author =       "Jose A. Onieva and Jianying Zhou and Javier Lopez",
  title =        "Multiparty nonrepudiation: a survey",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "1",
  pages =        "5:1--5:43",
  month =        dec,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1456650.1456655",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jan 12 16:47:51 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Nonrepudiation is a security service that plays an
                 important role in many Internet applications.
                 Traditional two-party nonrepudiation has been studied
                 intensively in the literature. This survey focuses on
                 multiparty scenarios and provides a comprehensive
                 overview. It starts with a brief introduction of
                 fundamental issues on nonrepudiation, including the
                 types of nonrepudiation service and cryptographic
                 evidence, the roles of trusted third-party,
                 nonrepudiation phases and requirements, and the status
                 of standardization. Then it describes the general
                 multiparty nonrepudiation problem, and analyzes
                 state-of-the-art mechanisms. After this, it presents in
                 more detail the 1-N multiparty nonrepudiation solutions
                 for distribution of different messages to multiple
                 recipients. Finally, it discusses advanced solutions
                 for two typical multiparty nonrepudiation applications,
                 namely, multiparty certified email and multiparty
                 contract signing.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Multiparty applications; multiparty protocols;
                 nonrepudiation",
}

@Article{Smith-Miles:2008:CDP,
  author =       "Kate A. Smith-Miles",
  title =        "Cross-disciplinary perspectives on meta-learning for
                 algorithm selection",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "1",
  pages =        "6:1--6:25",
  month =        dec,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1456650.1456656",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jan 12 16:47:51 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The algorithm selection problem [Rice 1976] seeks to
                 answer the question: {\em Which algorithm is likely to
                 perform best for my problem?\/} Recognizing the problem
                 as a learning task in the early 1990's, the machine
                 learning community has developed the field of
                 meta-learning, focused on learning about learning
                 algorithm performance on classification problems. But
                 there has been only limited generalization of these
                 ideas beyond classification, and many related attempts
                 have been made in other disciplines (such as AI and
                 operations research) to tackle the algorithm selection
                 problem in different ways, introducing different
                 terminology, and overlooking the similarities of
                 approaches. In this sense, there is much to be gained
                 from a greater awareness of developments in
                 meta-learning, and how these ideas can be generalized
                 to learn about the behaviors of other (nonlearning)
                 algorithms. In this article we present a unified
                 framework for considering the algorithm selection
                 problem as a learning problem, and use this framework
                 to tie together the crossdisciplinary developments in
                 tackling the algorithm selection problem. We discuss
                 the generalization of meta-learning concepts to
                 algorithms focused on tasks including sorting,
                 forecasting, constraint satisfaction, and optimization,
                 and the extension of these ideas to bioinformatics,
                 cryptography, and other fields.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Algorithm selection; classification; combinatorial
                 optimization; constraint satisfaction; dataset
                 characterization; empirical hardness; forecasting;
                 landscape analysis; meta-learning; model selection;
                 sorting",
}

@Article{Abidi:2008:SAM,
  author =       "Besma R. Abidi and Nash R. Aragam and Yi Yao and Mongi
                 A. Abidi",
  title =        "Survey and analysis of multimodal sensor planning and
                 integration for wide area surveillance",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "1",
  pages =        "7:1--7:36",
  month =        dec,
  year =         "2008",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1456650.1456657",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jan 12 16:47:51 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Although sensor planning in computer vision has been a
                 subject of research for over two decades, a vast
                 majority of the research seems to concentrate on two
                 particular applications in a rather limited context of
                 laboratory and industrial workbenches, namely 3D object
                 reconstruction and robotic arm manipulation. Recently,
                 increasing interest is engaged in research to come up
                 with solutions that provide wide-area autonomous
                 surveillance systems for object characterization and
                 situation awareness, which involves portable, wireless,
                 and/or Internet connected radar, digital video, and/or
                 infrared sensors. The prominent research problems
                 associated with multisensor integration for wide-area
                 surveillance are modality selection, sensor planning,
                 data fusion, and data exchange (communication) among
                 multiple sensors. Thus, the requirements and
                 constraints to be addressed include far-field view,
                 wide coverage, high resolution, cooperative sensors,
                 adaptive sensing modalities, dynamic objects, and
                 uncontrolled environments. This article summarizes a
                 new survey and analysis conducted in light of these
                 challenging requirements and constraints. It involves
                 techniques and strategies from work done in the areas
                 of sensor fusion, sensor networks, smart sensing,
                 Geographic Information Systems (GIS), photogrammetry,
                 and other intelligent systems where finding optimal
                 solutions to the placement and deployment of multimodal
                 sensors covering a wide area is important. While
                 techniques covered in this survey are applicable to
                 many wide-area environments such as traffic monitoring,
                 airport terminal surveillance, parking lot
                 surveillance, etc., our examples will be drawn mainly
                 from such applications as harbor security and
                 long-range face recognition.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "cooperative sensing; multimodal sensing; persistent
                 surveillance; Sensor planning; threat object
                 recognition; ubiquitous surveillance; wireless sensor
                 network",
}

@Article{Brown:2009:CIC,
  author =       "Nathan Brown",
  title =        "Chemoinformatics --- an introduction for computer
                 scientists",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "2",
  pages =        "8:1--8:38",
  month =        feb,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1459352.1459353",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 20 13:36:29 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Chemoinformatics is an interface science aimed
                 primarily at discovering novel chemical entities that
                 will ultimately result in the development of novel
                 treatments for unmet medical needs, although these same
                 methods are also applied in other fields that
                 ultimately design new molecules. The field combines
                 expertise from, among others, chemistry, biology,
                 physics, biochemistry, statistics, mathematics, and
                 computer science. In this general review of
                 chemoinformatics the emphasis is placed on describing
                 the general methods that are routinely applied in
                 molecular discovery and in a context that provides for
                 an easily accessible article for computer scientists as
                 well as scientists from other numerate disciplines.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Chemoinformatics; chemometrics; docking; drug
                 discovery; molecular modeling; QSAR",
}

@Article{Hierons:2009:UFS,
  author =       "Robert M. Hierons and Kirill Bogdanov and Jonathan P.
                 Bowen and Rance Cleaveland and John Derrick and Jeremy
                 Dick and Marian Gheorghe and Mark Harman and Kalpesh
                 Kapoor and Paul Krause and Gerald L{\"u}ttgen and
                 Anthony J. H. Simons and Sergiy Vilkomir and Martin R.
                 Woodward and Hussein Zedan",
  title =        "Using formal specifications to support testing",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "2",
  pages =        "9:1--9:76",
  month =        feb,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1459352.1459354",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 20 13:36:29 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Formal methods and testing are two important
                 approaches that assist in the development of
                 high-quality software. While traditionally these
                 approaches have been seen as rivals, in recent years a
                 new consensus has developed in which they are seen as
                 complementary. This article reviews the state of the
                 art regarding ways in which the presence of a formal
                 specification can be used to assist testing.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "formal methods; Software testing",
}

@Article{Navigli:2009:WSD,
  author =       "Roberto Navigli",
  title =        "Word sense disambiguation: a survey",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "2",
  pages =        "10:1--10:69",
  month =        feb,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1459352.1459355",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 20 13:36:29 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Word sense disambiguation (WSD) is the ability to
                 identify the meaning of words in context in a
                 computational manner. WSD is considered an AI-complete
                 problem, that is, a task whose solution is at least as
                 hard as the most difficult problems in artificial
                 intelligence. We introduce the reader to the
                 motivations for solving the ambiguity of words and
                 provide a description of the task. We overview
                 supervised, unsupervised, and knowledge-based
                 approaches. The assessment of WSD systems is discussed
                 in the context of the Senseval/Semeval campaigns,
                 aiming at the objective evaluation of systems
                 participating in several different disambiguation
                 tasks. Finally, applications, open problems, and future
                 directions are discussed.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "lexical ambiguity; lexical semantics; semantic
                 annotation; sense annotation; Word sense
                 disambiguation; word sense discrimination; WSD",
}

@Article{Iriberri:2009:LCP,
  author =       "Alicia Iriberri and Gondy Leroy",
  title =        "A life-cycle perspective on online community success",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "2",
  pages =        "11:1--11:29",
  month =        feb,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1459352.1459356",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 20 13:36:29 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Using the information systems lifecycle as a unifying
                 framework, we review online communities research and
                 propose a sequence for incorporating success conditions
                 during initiation and development to increase their
                 chances of becoming a successful community, one in
                 which members participate actively and develop lasting
                 relationships. Online communities evolve following
                 distinctive lifecycle stages and recommendations for
                 success are more or less relevant depending on the
                 developmental stage of the online community. In
                 addition, the goal of the online community under study
                 determines the components to include in the development
                 of a successful online community. Online community
                 builders and researchers will benefit from this review
                 of the conditions that help online communities
                 succeed.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "lifecycle; literature review; Online communities;
                 success factors",
}

@Article{Qi:2009:WPC,
  author =       "Xiaoguang Qi and Brian D. Davison",
  title =        "{Web} page classification: Features and algorithms",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "2",
  pages =        "12:1--12:31",
  month =        feb,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1459352.1459357",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 20 13:36:29 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Classification of Web page content is essential to
                 many tasks in Web information retrieval such as
                 maintaining Web directories and focused crawling. The
                 uncontrolled nature of Web content presents additional
                 challenges to Web page classification as compared to
                 traditional text classification, but the interconnected
                 nature of hypertext also provides features that can
                 assist the process.\par

                 As we review work in Web page classification, we note
                 the importance of these Web-specific features and
                 algorithms, describe state-of-the-art practices, and
                 track the underlying assumptions behind the use of
                 information from neighboring pages.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Categorization; Web mining",
}

@Article{Furia:2009:CTL,
  author =       "Carlo A. Furia and Matteo Pradella and Matteo Rossi",
  title =        "Comments on temporal logics for real-time system
                 specification",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "2",
  pages =        "13:1--13:5",
  month =        feb,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1459352.1459358",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 20 13:36:29 MST 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The article ``Temporal Logics for Real-Time System
                 Specification'' surveys some of the relevant literature
                 dealing with the use of temporal logics for the
                 specification of real-time systems. Unfortunately, it
                 introduces some imprecisions that might create some
                 confusion in the reader. While a certain degree of
                 informality is certainly useful when addressing a broad
                 audience, imprecisions can negatively impact the
                 legibility of the exposition. We clarify some of its
                 remarks on a few topics, in an effort to contribute to
                 the usefulness of the survey for the reader.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Temporal logic",
}

@Article{Sockut:2009:ORD,
  author =       "Gary H. Sockut and Balakrishna R. Iyer",
  title =        "Online reorganization of databases",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "3",
  pages =        "14:1--14:136",
  month =        jul,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1541880.1541881",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Aug 11 18:48:26 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In practice, any database management system sometimes
                 needs reorganization, that is, a change in some aspect
                 of the logical and/or physical arrangement of a
                 database. In traditional practice, many types of
                 reorganization have required denying access to a
                 database (taking the database offline) during
                 reorganization. Taking a database offline can be
                 unacceptable for a highly available (24-hour) database,
                 for example, a database serving electronic commerce or
                 armed forces, or for a very large database. A solution
                 is to reorganize online (concurrently with usage of the
                 database, incrementally during users' activities, or
                 interpretively). This article is a tutorial and survey
                 on requirements, issues, and strategies for online
                 reorganization. It analyzes the issues and then
                 presents the strategies, which use the issues. The
                 issues, most of which involve design trade-offs,
                 include use of partitions, the locus of control for the
                 process that reorganizes (a background process or
                 users' activities), reorganization by copying to newly
                 allocated storage (as opposed to reorganizing in
                 place), use of differential files, references to data
                 that has moved, performance, and activation of
                 reorganization. The article surveys online strategies
                 in three categories of reorganization. The first
                 category, maintenance, involves restoring the physical
                 arrangement of data instances without changing the
                 database definition. This category includes restoration
                 of clustering, reorganization of an index, rebalancing
                 of parallel or distributed data, garbage collection for
                 persistent storage, and cleaning (reclamation of space)
                 in a log-structured file system. The second category
                 involves changing the physical database definition;
                 topics include construction of indexes, conversion
                 between B$^+$ -trees and linear hash files, and
                 redefinition (e.g., splitting) of partitions. The third
                 category involves changing the logical database
                 definition. Some examples are changing a column's data
                 type, changing the inheritance hierarchy of object
                 classes, and changing a relationship from one-to-many
                 to many-to-many. The survey encompasses both research
                 and commercial implementations, and this article points
                 out several open research topics. As highly available
                 or very large databases continue to become more common
                 and more important in the world economy, the importance
                 of online reorganization is likely to continue
                 growing.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Clustering; concurrent reorganization; indexes;
                 log-structured file systems; maintenance; online
                 reorganization; redefinition; reorganization;
                 restructuring; schema evolution; very large databases",
}

@Article{Chandola:2009:ADS,
  author =       "Varun Chandola and Arindam Banerjee and Vipin Kumar",
  title =        "Anomaly detection: a survey",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "3",
  pages =        "15:1--15:58",
  month =        jul,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1541880.1541882",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Aug 11 18:48:26 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Anomaly detection is an important problem that has
                 been researched within diverse research areas and
                 application domains. Many anomaly detection techniques
                 have been specifically developed for certain
                 application domains, while others are more generic.
                 This survey tries to provide a structured and
                 comprehensive overview of the research on anomaly
                 detection. We have grouped existing techniques into
                 different categories based on the underlying approach
                 adopted by each technique. For each category we have
                 identified key assumptions, which are used by the
                 techniques to differentiate between normal and
                 anomalous behavior. When applying a given technique to
                 a particular domain, these assumptions can be used as
                 guidelines to assess the effectiveness of the technique
                 in that domain. For each category, we provide a basic
                 anomaly detection technique, and then show how the
                 different existing techniques in that category are
                 variants of the basic technique. This template provides
                 an easier and more succinct understanding of the
                 techniques belonging to each category. Further, for
                 each category, we identify the advantages and
                 disadvantages of the techniques in that category. We
                 also provide a discussion on the computational
                 complexity of the techniques since it is an important
                 issue in real application domains. We hope that this
                 survey will provide a better understanding of the
                 different directions in which research has been done on
                 this topic, and how techniques developed in one area
                 can be applied in domains for which they were not
                 intended to begin with.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Anomaly detection; outlier detection",
}

@Article{Batini:2009:MDQ,
  author =       "Carlo Batini and Cinzia Cappiello and Chiara
                 Francalanci and Andrea Maurino",
  title =        "Methodologies for data quality assessment and
                 improvement",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "3",
  pages =        "16:1--16:52",
  month =        jul,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1541880.1541883",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Aug 11 18:48:26 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The literature provides a wide range of techniques to
                 assess and improve the quality of data. Due to the
                 diversity and complexity of these techniques, research
                 has recently focused on defining methodologies that
                 help the selection, customization, and application of
                 data quality assessment and improvement techniques. The
                 goal of this article is to provide a systematic and
                 comparative description of such methodologies.
                 Methodologies are compared along several dimensions,
                 including the methodological phases and steps, the
                 strategies and techniques, the data quality dimensions,
                 the types of data, and, finally, the types of
                 information systems addressed by each methodology. The
                 article concludes with a summary description of each
                 methodology.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Data quality; data quality assessment; data quality
                 improvement; data quality measurement; information
                 system; methodology; quality dimension",
}

@Article{Carpineto:2009:SWC,
  author =       "Claudio Carpineto and Stanislaw Osi{\'n}ski and
                 Giovanni Romano and Dawid Weiss",
  title =        "A survey of {Web} clustering engines",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "3",
  pages =        "17:1--17:38",
  month =        jul,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1541880.1541884",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Aug 11 18:48:26 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Web clustering engines organize search results by
                 topic, thus offering a complementary view to the
                 flat-ranked list returned by conventional search
                 engines. In this survey, we discuss the issues that
                 must be addressed in the development of a Web
                 clustering engine, including acquisition and
                 preprocessing of search results, their clustering and
                 visualization. Search results clustering, the core of
                 the system, has specific requirements that cannot be
                 addressed by classical clustering algorithms. We
                 emphasize the role played by the quality of the cluster
                 labels as opposed to optimizing only the clustering
                 structure. We highlight the main characteristics of a
                 number of existing Web clustering engines and also
                 discuss how to evaluate their retrieval performance.
                 Some directions for future research are finally
                 presented.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Information retrieval; meta search engines; search
                 results clustering; text clustering; user interfaces",
}

@Article{Hoare:2009:PSI,
  author =       "C. A. R. Hoare and Jayadev Misra",
  title =        "Preface to special issue on software verification",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "4",
  pages =        "18:1--18:3",
  month =        oct,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1592434.1592435",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 7 08:29:52 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Woodcock:2009:FMP,
  author =       "Jim Woodcock and Peter Gorm Larsen and Juan Bicarregui
                 and John Fitzgerald",
  title =        "Formal methods: {Practice} and experience",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "4",
  pages =        "19:1--19:36",
  month =        oct,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1592434.1592436",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 7 08:29:52 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Formal methods use mathematical models for analysis
                 and verification at any part of the program life-cycle.
                 We describe the state of the art in the industrial use
                 of formal methods, concentrating on their increasing
                 use at the earlier stages of specification and design.
                 We do this by reporting on a new survey of industrial
                 use, comparing the situation in 2009 with the most
                 significant surveys carried out over the last 20 years.
                 We describe some of the highlights of our survey by
                 presenting a series of industrial projects, and we draw
                 some observations from these surveys and records of
                 experience. Based on this, we discuss the issues
                 surrounding the industrial adoption of formal methods.
                 Finally, we look to the future and describe the
                 development of a Verified Software Repository, part of
                 the worldwide Verified Software Initiative. We
                 introduce the initial projects being used to populate
                 the repository, and describe the challenges they
                 address.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Experimental software engineering; formal methods
                 surveys; grand challenges; verified software
                 initiative; verified software repository",
}

@Article{Shankar:2009:ADV,
  author =       "Natarajan Shankar",
  title =        "Automated deduction for verification",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "4",
  pages =        "20:1--20:56",
  month =        oct,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1592434.1592437",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 7 08:29:52 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Automated deduction uses computation to perform
                 symbolic logical reasoning. It has been a core
                 technology for program verification from the very
                 beginning. Satisfiability solvers for propositional and
                 first-order logic significantly automate the task of
                 deductive program verification. We introduce some of
                 the basic deduction techniques used in software and
                 hardware verification and outline the theoretical and
                 engineering issues in building deductive verification
                 tools. Beyond verification, deduction techniques can
                 also be used to support a variety of applications
                 including planning, program optimization, and program
                 synthesis.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jhala:2009:SMC,
  author =       "Ranjit Jhala and Rupak Majumdar",
  title =        "Software model checking",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "4",
  pages =        "21:1--21:54",
  month =        oct,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1592434.1592438",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 7 08:29:52 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We survey recent progress in software model
                 checking.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "abstraction; counterexample-guided refinement;
                 enumerative and symbolic model checking; liveness;
                 safety; Software model checking",
}

@Article{Hoare:2009:VSI,
  author =       "C. A. R. Hoare and Jayadev Misra and Gary T. Leavens
                 and Natarajan Shankar",
  title =        "The verified software initiative: a manifesto",
  journal =      j-COMP-SURV,
  volume =       "41",
  number =       "4",
  pages =        "22:1--22:8",
  month =        oct,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1592434.1592439",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 7 08:29:52 MDT 2009",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hoffman:2009:SAD,
  author =       "Kevin Hoffman and David Zage and Cristina
                 Nita-Rotaru",
  title =        "A survey of attack and defense techniques for
                 reputation systems",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "1",
  pages =        "1:1--1:31",
  month =        dec,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1592451.1592452",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 15 11:55:39 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chen:2009:RLC,
  author =       "Hubie Chen",
  title =        "A rendezvous of logic, complexity, and algebra",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "1",
  pages =        "2:1--2:32",
  month =        dec,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1592451.1592453",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 15 11:55:39 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "An emerging area of research studies the complexity of
                 constraint satisfaction problems under restricted
                 constraint languages. This article gives a
                 self-contained, contemporary presentation of Schaefer's
                 theorem on Boolean constraint satisfaction, the
                 inaugural result of this area, as well as analogs of
                 this theorem for quantified formulas. Our exposition
                 makes use of and may serve as an introduction to
                 logical and algebraic tools that have recently come
                 into focus.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Constraint satisfaction; polymorphisms; propositional
                 logic; quantified formulas; Schaefer's theorem",
}

@Article{Kirke:2009:SCS,
  author =       "Alexis Kirke and Eduardo Reck Miranda",
  title =        "A survey of computer systems for expressive music
                 performance",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "1",
  pages =        "3:1--3:41",
  month =        dec,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1592451.1592454",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 15 11:55:39 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We present a survey of research into automated and
                 semiautomated computer systems for expressive
                 performance of music. We will examine the motivation
                 for such systems and then examine the majority of the
                 systems developed over the last 25 years. To highlight
                 some of the possible future directions for new
                 research, the review uses primary terms of reference
                 based on four elements: testing status, expressive
                 representation, polyphonic ability, and performance
                 creativity.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "computer music; generative performance; machine
                 learning; Music performance",
}

@Article{Muir:2009:IGE,
  author =       "James A. Muir and Paul C. {Van Oorschot}",
  title =        "{Internet} geolocation: {Evasion} and counterevasion",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "1",
  pages =        "4:1--4:23",
  month =        dec,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1592451.1592455",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 15 11:55:39 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Internet geolocation technology aims to determine the
                 physical (geographic) location of Internet users and
                 devices. It is currently proposed or in use for a wide
                 variety of purposes, including targeted marketing,
                 restricting digital content sales to authorized
                 jurisdictions, and security applications such as
                 reducing credit card fraud. This raises questions about
                 the veracity of claims of accurate and reliable
                 geolocation. We provide a survey of Internet
                 geolocation technologies with an emphasis on
                 adversarial contexts; that is, we consider how this
                 technology performs against a knowledgeable adversary
                 whose goal is to evade geolocation. We do so by
                 examining first the limitations of existing techniques,
                 and then, from this base, determining how best to evade
                 existing geolocation techniques. We also consider two
                 further geolocation techniques which may be of use even
                 against adversarial targets: (1) the extraction of
                 client IP addresses using functionality introduced in
                 the 1.5 Java API, and (2) the collection of round-trip
                 times using HTTP refreshes. These techniques illustrate
                 that the seemingly straightforward technique of evading
                 geolocation by relaying traffic through a proxy server
                 (or network of proxy servers) is not as straightforward
                 as many end-users might expect. We give a demonstration
                 of this for users of the popular Tor anonymizing
                 network.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "adversarial environment; anonymizing network; evasion;
                 Internet geolocation; Tor",
}

@Article{Edman:2009:AES,
  author =       "Matthew Edman and B{\"u}lent Yener",
  title =        "On anonymity in an electronic society: a survey of
                 anonymous communication systems",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "1",
  pages =        "5:1--5:35",
  month =        dec,
  year =         "2009",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1592451.1592456",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 15 11:55:39 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The past two decades have seen a growing interest in
                 methods for anonymous communication on the Internet,
                 both from the academic community and the general
                 public. Several system designs have been proposed in
                 the literature, of which a number have been implemented
                 and are used by diverse groups, such as journalists,
                 human rights workers, the military, and ordinary
                 citizens, to protect their identities on the
                 Internet.\par

                 In this work, we survey the previous research done to
                 design, develop, and deploy systems for enabling
                 private and anonymous communication on the Internet. We
                 identify and describe the major concepts and
                 technologies in the field, including mixes and mix
                 networks, onion routing, and Dining Cryptographers
                 networks. We will also review powerful traffic analysis
                 attacks that have motivated improvements and variations
                 on many of these anonymity protocols made since their
                 introduction. Finally, we will summarize some of the
                 major open problems in anonymous communication research
                 and discuss possible directions for future work in the
                 field.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Anonymity; anonymous communication; DC-nets; mix
                 networks; mixes; onion routing; privacy; traffic
                 analysis",
}

@Article{Furia:2010:MTC,
  author =       "Carlo A. Furia and Dino Mandrioli and Angelo Morzenti
                 and Matteo Rossi",
  title =        "Modeling time in computing: a taxonomy and a
                 comparative survey",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "2",
  pages =        "6:1--6:59",
  month =        feb,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1667062.1667063",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 15 11:56:03 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The increasing relevance of areas such as real-time
                 and embedded systems, pervasive computing, hybrid
                 systems control, and biological and social systems
                 modeling is bringing a growing attention to the
                 temporal aspects of computing, not only in the computer
                 science domain, but also in more traditional fields of
                 engineering.\par

                 This article surveys various approaches to the formal
                 modeling and analysis of the temporal features of
                 computer-based systems, with a level of detail that is
                 also suitable for nonspecialists. In doing so, it
                 provides a unifying framework, rather than just a
                 comprehensive list of formalisms.\par

                 The article first lays out some key dimensions along
                 which the various formalisms can be evaluated and
                 compared. Then, a significant sample of formalisms for
                 time modeling in computing are presented and discussed
                 according to these dimensions. The adopted perspective
                 is, to some extent, historical, going from
                 ``traditional'' models and formalisms to more modern
                 ones.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "dynamic systems; Temporal aspects of computing; time
                 modeling",
}

@Article{Haslhofer:2010:STA,
  author =       "Bernhard Haslhofer and Wolfgang Klas",
  title =        "A survey of techniques for achieving metadata
                 interoperability",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "2",
  pages =        "7:1--7:37",
  month =        feb,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1667062.1667064",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 15 11:56:03 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Achieving uniform access to media objects in
                 heterogeneous media repositories requires dealing with
                 the problem of metadata interoperability. Currently
                 there exist many interoperability techniques, with
                 quite varying potential for resolving the structural
                 and semantic heterogeneities that can exist between
                 metadata stored in distinct repositories. Besides
                 giving a general overview of the field of metadata
                 interoperability, we provide a categorization of
                 existing interoperability techniques, describe their
                 characteristics, and compare their quality by analyzing
                 their potential for resolving various types of
                 heterogeneities. Based on our work, domain experts and
                 technicians get an overview and categorization of
                 existing metadata interoperability techniques and can
                 select the appropriate approach for their specific
                 metadata integration scenarios. Our analysis explicitly
                 shows that metadata mapping is the appropriate
                 technique in integration scenarios where an agreement
                 on a certain metadata standard is not possible.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "interoperability; mapping; Metadata standards",
}

@Article{Yu:2010:SMS,
  author =       "Zhiwen Yu and Yuichi Nakamura",
  title =        "Smart meeting systems: a survey of state-of-the-art
                 and open issues",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "2",
  pages =        "8:1--8:20",
  month =        feb,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1667062.1667065",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 15 11:56:03 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Smart meeting systems, which record meetings and
                 analyze the generated audio--visual content for future
                 viewing, have been a topic of great interest in recent
                 years. A successful smart meeting system relies on
                 various technologies, ranging from devices and
                 algorithms to architecture. This article presents a
                 condensed survey of existing research and technologies,
                 including smart meeting system architecture, meeting
                 capture, meeting recognition, semantic processing, and
                 evaluation methods. It aims at providing an overview of
                 underlying technologies to help understand the key
                 design issues of such systems. This article also
                 describes various open issues as possible ways to
                 extend the capabilities of current smart meeting
                 systems.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "evaluation; meeting capture; meeting recognition;
                 semantic processing; Smart meeting system",
}

@Article{Abella:2010:EM,
  author =       "Jaume Abella and Xavier Vera",
  title =        "Electromigration for microarchitects",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "2",
  pages =        "9:1--9:18",
  month =        feb,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1667062.1667066",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 15 11:56:03 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Degradation of devices has become a major issue for
                 processor design due to continuous device shrinkage and
                 current density increase. Transistors and wires suffer
                 high stress, and failures may appear in the field. In
                 particular, wires degrade mainly due to
                 electromigration when driving current. Techniques to
                 mitigate electromigration to some extent have been
                 proposed from the circuit point of view, but much
                 effort is still required from the microarchitecture
                 side to enable wire scaling in future
                 technologies.\par

                 This survey brings to the microarchitecture community a
                 comprehensive study of the causes and implications of
                 electromigration in digital circuits and describes the
                 challenges that must be faced to mitigate
                 electromigration by means of microarchitectural
                 solutions.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "buses; degradation; Electromigration; wires",
}

@Article{Salfner:2010:SOF,
  author =       "Felix Salfner and Maren Lenk and Miroslaw Malek",
  title =        "A survey of online failure prediction methods",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "3",
  pages =        "10:1--10:42",
  month =        mar,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1670679.1670680",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 25 09:34:56 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "With the ever-growing complexity and dynamicity of
                 computer systems, proactive fault management is an
                 effective approach to enhancing availability. Online
                 failure prediction is the key to such techniques. In
                 contrast to classical reliability methods, online
                 failure prediction is based on runtime monitoring and a
                 variety of models and methods that use the current
                 state of a system and, frequently, the past experience
                 as well. This survey describes these methods. To
                 capture the wide spectrum of approaches concerning this
                 area, a taxonomy has been developed, whose different
                 approaches are explained and major concepts are
                 described in detail.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Error; failure prediction; fault; prediction metrics;
                 runtime monitoring",
}

@Article{Kabak:2010:SAE,
  author =       "Yildiray Kabak and Asuman Dogac",
  title =        "A survey and analysis of electronic business document
                 standards",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "3",
  pages =        "11:1--11:31",
  month =        mar,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1670679.1670681",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 25 09:34:56 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "No document standard is sufficient for all purposes
                 because the requirements significantly differ among
                 businesses, industries, and geopolitical regions. On
                 the other hand, the ultimate aim of business document
                 interoperability is to exchange business data among
                 partners without any prior agreements related to the
                 document syntax and semantics. Therefore, an important
                 characteristic of a document standard is its ability to
                 adapt to different contexts, its extensibility, and its
                 customization. The UN/CEFACT Core Component Technical
                 Specification (CCTS) is an important landmark in this
                 direction.\par

                 In this article, we present a survey and an analysis of
                 some of the prominent UN/CEFACT CCTS-based electronic
                 document standards. We describe their document design
                 principles and discuss how they handle customization
                 and extensibility. We address their industry relevance
                 and the recent efforts for their harmonization and
                 convergence. We conclude by mentioning some emerging
                 efforts for the semantic interoperability of different
                 document standards.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Document Interoperability Standards; eBusiness; Global
                 Standards One (GS1) XML; OAGIS Business Object
                 Documents (BODs); OASIS Universal Business Language
                 (UBL); UN/CEFACT Core Component Technical Specification
                 (CCTS)",
}

@Article{Ilarri:2010:LDQ,
  author =       "Sergio Ilarri and Eduardo Mena and Arantza
                 Illarramendi",
  title =        "Location-dependent query processing: {Where} we are
                 and where we are heading",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "3",
  pages =        "12:1--12:73",
  month =        mar,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1670679.1670682",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 25 09:34:56 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The continuous development of wireless networks and
                 mobile devices has motivated an intense research in
                 mobile data services. Some of these services provide
                 the user with context-aware information. Specifically,
                 location-based services and location-dependent queries
                 have attracted a lot of interest.\par

                 In this article, the existing literature in the field
                 of location-dependent query processing is reviewed. The
                 technological context (mobile computing) and support
                 middleware (such as moving object databases and data
                 stream technology) are described, location-based
                 services and location-dependent queries are defined and
                 classified, and different query processing approaches
                 are reviewed and compared.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Continuous queries; location-based services;
                 location-dependent data; location-dependent queries;
                 mobile computing; query processing",
}

@Article{Cardoso:2010:CRC,
  author =       "Jo{\~a}o M. P. Cardoso and Pedro C. Diniz and Markus
                 Weinhardt",
  title =        "Compiling for reconfigurable computing: a survey",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "4",
  pages =        "13:1--13:65",
  month =        jun,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1749603.1749604",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 21 18:51:52 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Reconfigurable computing platforms offer the promise
                 of substantially accelerating computations through the
                 concurrent nature of hardware structures and the
                 ability of these architectures for hardware
                 customization. Effectively programming such
                 reconfigurable architectures, however, is an extremely
                 cumbersome and error-prone process, as it requires
                 programmers to assume the role of hardware designers
                 while mastering hardware description languages, thus
                 limiting the acceptance and dissemination of this
                 promising technology. To address this problem,
                 researchers have developed numerous approaches at both
                 the programming languages as well as the compilation
                 levels, to offer high-level programming abstractions
                 that would allow programmers to easily map applications
                 to reconfigurable architectures. This survey describes
                 the major research efforts on compilation techniques
                 for reconfigurable computing architectures. The survey
                 focuses on efforts that map computations written in
                 imperative programming languages to reconfigurable
                 architectures and identifies the main compilation and
                 synthesis techniques used in this mapping.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "Compilation; custom-computing platforms; FPGA;
                 hardware compilers; high-level synthesis; mapping
                 methods; reconfigurable computing",
}

@Article{Fung:2010:PPD,
  author =       "Benjamin C. M. Fung and Ke Wang and Rui Chen and
                 Philip S. Yu",
  title =        "Privacy-preserving data publishing: a survey of recent
                 developments",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "4",
  pages =        "14:1--14:53",
  month =        jun,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1749603.1749605",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 21 18:51:52 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The collection of digital information by governments,
                 corporations, and individuals has created tremendous
                 opportunities for knowledge- and information-based
                 decision making. Driven by mutual benefits, or by
                 regulations that require certain data to be published,
                 there is a demand for the exchange and publication of
                 data among various parties. Data in its original form,
                 however, typically contains sensitive information about
                 individuals, and publishing such data will violate
                 individual privacy. The current practice in data
                 publishing relies mainly on policies and guidelines as
                 to what types of data can be published and on
                 agreements on the use of published data. This approach
                 alone may lead to excessive data distortion or
                 insufficient protection. {\em Privacy-preserving data
                 publishing\/} (PPDP) provides methods and tools for
                 publishing useful information while preserving data
                 privacy. Recently, PPDP has received considerable
                 attention in research communities, and many approaches
                 have been proposed for different data publishing
                 scenarios. In this survey, we will systematically
                 summarize and evaluate different approaches to PPDP,
                 study the challenges in practical data publishing,
                 clarify the differences and requirements that
                 distinguish PPDP from other related problems, and
                 propose future research directions.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "anonymity; data mining; Information sharing; privacy
                 protection; sensitive information",
}

@Article{Gao:2010:VSV,
  author =       "Wen Gao and Yonghong Tian and Tiejun Huang and Qiang
                 Yang",
  title =        "Vlogging: a survey of videoblogging technology on the
                 {Web}",
  journal =      j-COMP-SURV,
  volume =       "42",
  number =       "4",
  pages =        "15:1--15:57",
  month =        jun,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1749603.1749606",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 21 18:51:52 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In recent years, blogging has become an exploding
                 passion among Internet communities. By combining the
                 grassroots blogging with the richness of expression
                 available in video, videoblogs (vlogs for short) will
                 be a powerful new media adjunct to our existing
                 televised news sources. Vlogs have gained much
                 attention worldwide, especially with Google's
                 acquisition of YouTube. This article presents a
                 comprehensive survey of videoblogging (vlogging for
                 short) as a new technological trend. We first summarize
                 the technological challenges for vlogging as four key
                 issues that need to be answered. Along with their
                 respective possibilities, we give a review of the
                 currently available techniques and tools supporting
                 vlogging, and envision emerging technological
                 directions for future vlogging. Several multimedia
                 technologies are introduced to empower vlogging
                 technology with better scalability, interactivity,
                 searchability, and accessability, and to potentially
                 reduce the legal, economic, and moral risks of vlogging
                 applications. We also make an in-depth investigation of
                 various vlog mining topics from a research perspective
                 and present several incentive applications such as
                 user-targeted video advertising and collective
                 intelligence gaming. We believe that vlogging and its
                 applications will bring new opportunities and drives to
                 the research in related fields.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "multimedia computing; Survey; vlog mining; vlogging;
                 vlogs",
}

@Article{Cannataro:2010:PPI,
  author =       "Mario Cannataro and Pietro H. Guzzi and Pierangelo
                 Veltri",
  title =        "Protein-to-protein interactions: {Technologies},
                 databases, and algorithms",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "1",
  pages =        "1:1--1:36",
  month =        nov,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1824795.1824796",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 9 11:50:14 MST 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Studying proteins and their structures has an
                 important role for understanding protein
                 functionalities. Recently, due to important results
                 obtained with proteomics, a great interest has been
                 given to interactomics, that is, the study of
                 protein-to-protein interactions, called PPI, or more
                 generally, interactions among macromolecules,
                 particularly within cells. Interactomics means
                 studying, modeling, storing, and retrieving
                 protein-to-protein interactions as well as algorithms
                 for manipulating, simulating, and predicting
                 interactions. PPI data can be obtained from biological
                 experiments studying interactions. Modeling and storing
                 PPIs can be realized by using graph theory and graph
                 data management, thus graph databases can be queried
                 for further experiments. PPI graphs can be used as
                 input for data-mining algorithms, where raw data are
                 binary interactions forming interaction graphs, and
                 analysis algorithms retrieve biological interactions
                 among proteins (i.e., PPI biological meanings).",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Diesburg:2010:SCD,
  author =       "Sarah M. Diesburg and An-I Andy Wang",
  title =        "A survey of confidential data storage and deletion
                 methods",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "1",
  pages =        "2:1--2:37",
  month =        nov,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1824795.1824797",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 9 11:50:14 MST 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "As the amount of digital data grows, so does the theft
                 of sensitive data through the loss or misplacement of
                 laptops, thumb drives, external hard drives, and other
                 electronic storage media. Sensitive data may also be
                 leaked accidentally due to improper disposal or resale
                 of storage media. To protect the secrecy of the entire
                 data lifetime, we must have confidential ways to store
                 and delete data. This survey summarizes and compares
                 existing methods of providing confidential storage and
                 deletion of data in personal computing environments.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mabroukeh:2010:TSP,
  author =       "Nizar R. Mabroukeh and C. I. Ezeife",
  title =        "A taxonomy of sequential pattern mining algorithms",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "1",
  pages =        "3:1--3:41",
  month =        nov,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1824795.1824798",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 9 11:50:14 MST 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Owing to important applications such as mining Web
                 page traversal sequences, many algorithms have been
                 introduced in the area of sequential pattern mining
                 over the last decade, most of which have also been
                 modified to support concise representations like
                 closed, maximal, incremental or hierarchical sequences.
                 This article presents a taxonomy of sequential
                 pattern-mining techniques in the literature with Web
                 usage mining as an application. This article
                 investigates these algorithms by introducing a taxonomy
                 for classifying sequential pattern-mining algorithms
                 based on important key features supported by the
                 techniques. This classification aims at enhancing
                 understanding of sequential pattern-mining problems,
                 current status of provided solutions, and direction of
                 research in this area.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mili:2010:BPM,
  author =       "Hafedh Mili and Guy Tremblay and Guitta Bou Jaoude and
                 {\'E}ric Lefebvre and Lamia Elabed and Ghizlane El
                 Boussaidi",
  title =        "Business process modeling languages: {Sorting} through
                 the alphabet soup",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "1",
  pages =        "4:1--4:56",
  month =        nov,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1824795.1824799",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 9 11:50:14 MST 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Requirements capture is arguably the most important
                 step in software engineering, and yet the most
                 difficult and the least formalized one [Phalp and
                 Shepperd 2000]. Enterprises build information systems
                 to support their business processes. Software
                 engineering research has typically focused on the
                 development process, starting with user
                 requirements---if that---with business modeling often
                 confused with software system modeling [Isoda 2001].
                 Researchers and practitioners in management information
                 systems have long recognized that understanding the
                 business processes that an information system must
                 support is key to eliciting the needs of its users (see
                 e.g., Eriksson and Penker 2000), but lacked the tools
                 to model such business processes or to relate such
                 models to software requirements.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kurian:2010:SDA,
  author =       "Jinu Kurian and Kamil Sarac",
  title =        "A survey on the design, applications, and enhancements
                 of application-layer overlay networks",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "1",
  pages =        "5:1--5:34",
  month =        nov,
  year =         "2010",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1824795.1824800",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 9 11:50:14 MST 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article presents a survey of recent advancements
                 in application-layer overlay networks. Some of the most
                 important applications that have been proposed for
                 overlays include multicast, QoS support,
                 denial-of-service (DoS) defense, and resilient routing.
                 We look at some of the important approaches proposed
                 for these applications and compare the advantages and
                 disadvantages of these approaches. We also examine some
                 of the enhancements that have been proposed in overlay
                 topology design, enhanced routing performance, failure
                 resistance, and the issues related to coexistence of
                 overlay and native layers in the Internet. We conclude
                 the article with a comment on the purist vs pluralist
                 argument of overlay networks that has received much
                 debate recently.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chaovalit:2011:DWT,
  author =       "Pimwadee Chaovalit and Aryya Gangopadhyay and George
                 Karabatis and Zhiyuan Chen",
  title =        "Discrete wavelet transform-based time series analysis
                 and mining",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "2",
  pages =        "6:1--6:37",
  month =        jan,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1883612.1883613",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Jan 30 14:27:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Time series are recorded values of an interesting
                 phenomenon such as stock prices, household incomes, or
                 patient heart rates over a period of time. Time series
                 data mining focuses on discovering interesting patterns
                 in such data. This article introduces a wavelet-based
                 time series data analysis to interested readers. It
                 provides a systematic survey of various analysis
                 techniques that use discrete wavelet transformation
                 (DWT) in time series data mining, and outlines the
                 benefits of this approach demonstrated by previous
                 studies performed on diverse application domains,
                 including image classification, multimedia retrieval,
                 and computer network anomaly detection.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Viana:2011:OSF,
  author =       "Aline Carneiro Viana and Stephane Maag and Fatiha
                 Zaidi",
  title =        "One step forward: Linking wireless self-organizing
                 network validation techniques with formal testing
                 approaches",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "2",
  pages =        "7:1--7:36",
  month =        jan,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1883612.1883614",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Jan 30 14:27:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Wireless self-organizing networks (WSONs) have
                 attracted considerable attention from the network
                 research community; however, the key for their success
                 is the rigorous validation of the properties of the
                 network protocols. Applications of risk or those
                 demanding precision (like alert-based systems) require
                 a rigorous and reliable validation of deployed network
                 protocols. While the main goal is to ensure the
                 reliability of the protocols, validation techniques
                 also allow the establishment of their correctness
                 regarding the related protocols' requirements.
                 Nevertheless, even if different communities have
                 carried out intensive research activities on the
                 validation domain, WSONs still raise new issues for and
                 challenging constraints to these communities.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Urdaneta:2011:SDS,
  author =       "Guido Urdaneta and Guillaume Pierre and Maarten {Van
                 Steen}",
  title =        "A survey of {DHT} security techniques",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "2",
  pages =        "8:1--8:49",
  month =        jan,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1883612.1883615",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Jan 30 14:27:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Peer-to-peer networks based on distributed hash tables
                 (DHTs) have received considerable attention ever since
                 their introduction in 2001. Unfortunately, DHT-based
                 systems have been shown to be notoriously difficult to
                 protect against security attacks. Various reports have
                 been published that discuss or classify general
                 security issues, but so far a comprehensive survey
                 describing the various proposed defenses has been
                 lacking. In this article, we present an overview of
                 techniques reported in the literature for making
                 DHT-based systems resistant to the three most important
                 attacks that can be launched by malicious nodes
                 participating in the DHT: (1) the Sybil attack, (2) the
                 Eclipse attack, and (3) routing and storage attacks.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Freiling:2011:FDA,
  author =       "Felix C. Freiling and Rachid Guerraoui and Petr
                 Kuznetsov",
  title =        "The failure detector abstraction",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "2",
  pages =        "9:1--9:40",
  month =        jan,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1883612.1883616",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Jan 30 14:27:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A failure detector is a fundamental abstraction in
                 distributed computing. This article surveys this
                 abstraction through two dimensions. First we study
                 failure detectors as building blocks to simplify the
                 design of reliable distributed algorithms. In
                 particular, we illustrate how failure detectors can
                 factor out timing assumptions to detect failures in
                 distributed agreement algorithms. Second, we study
                 failure detectors as computability benchmarks. That is,
                 we survey the weakest failure detector question and
                 illustrate how failure detectors can be used to
                 classify problems. We also highlight some limitations
                 of the failure detector abstraction along each of the
                 dimensions.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Parsons:2011:ABG,
  author =       "Simon Parsons and Juan A. Rodriguez-Aguilar and Mark
                 Klein",
  title =        "Auctions and bidding: a guide for computer
                 scientists",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "2",
  pages =        "10:1--10:59",
  month =        jan,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1883612.1883617",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Jan 30 14:27:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "There is a veritable menagerie of
                 auctions---single-dimensional, multi-dimensional,
                 single-sided, double-sided, first-price, second-price,
                 English, Dutch, Japanese, sealed-bid---and these have
                 been extensively discussed and analyzed in the
                 economics literature. The main purpose of this article
                 is to survey this literature from a computer science
                 perspective, primarily from the viewpoint of computer
                 scientists who are interested in learning about auction
                 theory, and to provide pointers into the economics
                 literature for those who want a deeper technical
                 understanding. In addition, since auctions are an
                 increasingly important topic in computer science, we
                 also look at work on auctions from the computer science
                 literature.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nie:2011:SCT,
  author =       "Changhai Nie and Hareton Leung",
  title =        "A survey of combinatorial testing",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "2",
  pages =        "11:1--11:29",
  month =        jan,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1883612.1883618",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Jan 30 14:27:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Combinatorial Testing (CT) can detect failures
                 triggered by interactions of parameters in the Software
                 Under Test (SUT) with a covering array test suite
                 generated by some sampling mechanisms. It has been an
                 active field of research in the last twenty years. This
                 article aims to review previous work on CT, highlights
                 the evolution of CT, and identifies important issues,
                 methods, and applications of CT, with the goal of
                 supporting and directing future practice and research
                 in this area. First, we present the basic concepts and
                 notations of CT. Second, we classify the research on CT
                 into the following categories: modeling for CT, test
                 suite generation, constraints, failure diagnosis,
                 prioritization, metric, evaluation, testing procedure
                 and the application of CT.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jie:2011:RGA,
  author =       "Wei Jie and Junaid Arshad and Richard Sinnott and Paul
                 Townend and Zhou Lei",
  title =        "A review of grid authentication and authorization
                 technologies and support for federated access control",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "2",
  pages =        "12:1--12:26",
  month =        jan,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1883612.1883619",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Jan 30 14:27:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Grid computing facilitates resource sharing typically
                 to support distributed virtual organizations (VO). The
                 multi-institutional nature of a grid environment
                 introduces challenging security issues, especially with
                 regard to authentication and authorization. This
                 article presents a state-of-the-art review of major
                 grid authentication and authorization technologies. In
                 particular we focus upon the Internet2 Shibboleth
                 technologies and their use to support federated
                 authentication and authorization to support
                 interinstitutional sharing of remote grid resources
                 that are subject to access control. We outline the
                 architecture, features, advantages, limitations,
                 projects, and applications of Shibboleth in a grid
                 environment.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Magnien:2011:IRF,
  author =       "Cl{\'e}mence Magnien and Matthieu Latapy and Jean-Loup
                 Guillaume",
  title =        "Impact of random failures and attacks on {Poisson} and
                 power-law random networks",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "3",
  pages =        "13:1--13:31",
  month =        apr,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1922649.1922650",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Apr 27 07:58:39 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "It has appeared recently that the underlying degree
                 distribution of networks may play a crucial role
                 concerning their robustness. Previous work insisted on
                 the fact that power-law degree distributions induce
                 high resilience to random failures but high sensitivity
                 to attack strategies, while Poisson degree
                 distributions are quite sensitive in both cases. Then
                 much work has been done to extend these results. We aim
                 here at studying in depth these results, their origin,
                 and limitations. We review in detail previous
                 contributions in a unified framework, and identify the
                 approximations on which these results rely. We then
                 present new results aimed at clarifying some important
                 aspects.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Beatty:2011:CTC,
  author =       "Patricia Beatty and Ian Reay and Scott Dick and James
                 Miller",
  title =        "Consumer trust in e-commerce {Web} sites: a
                 meta-study",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "3",
  pages =        "14:1--14:46",
  month =        apr,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1922649.1922651",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Apr 27 07:58:39 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Trust is at once an elusive, imprecise concept, and a
                 critical attribute that must be engineered into
                 e-commerce systems. Trust conveys a vast number of
                 meanings, and is deeply dependent upon context. The
                 literature on engineering trust into e-commerce systems
                 reflects these ambiguous meanings; there are a large
                 number of articles, but there is as yet no clear
                 theoretical framework for the investigation of trust in
                 e-commerce. E-commerce, however, is predicated on
                 trust; indeed, any e-commerce vendor that fails to
                 establish a trusting relationship with their customers
                 is doomed. There is a very clear need for specific
                 guidance on e-commerce system attributes and business
                 operations that will effectively promote consumer
                 trust.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mcgill:2011:RAL,
  author =       "Kathleen Mcgill and Stephen Taylor",
  title =        "Robot algorithms for localization of multiple emission
                 sources",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "3",
  pages =        "15:1--15:25",
  month =        apr,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1922649.1922652",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Apr 27 07:58:39 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The problem of time-varying, multisource localization
                 using robotic swarms has received relatively little
                 attention when compared to single-source localization.
                 It involves distinct challenges regarding how to
                 partition the robots during search to ensure that all
                 sources are located in minimal time, how to avoid
                 obstacles and other robots, and how to proceed after
                 each source is found. Unfortunately, no common set of
                 validation problems and reference algorithms has
                 evolved, and there are no general theoretical
                 foundations that guarantee progress, convergence, and
                 termination. This article surveys the current
                 multisource literature from the viewpoint of these
                 central questions.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Aggarwal:2011:HAA,
  author =       "J. K. Aggarwal and M. S. Ryoo",
  title =        "Human activity analysis: a review",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "3",
  pages =        "16:1--16:43",
  month =        apr,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1922649.1922653",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Apr 27 07:58:39 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Human activity recognition is an important area of
                 computer vision research. Its applications include
                 surveillance systems, patient monitoring systems, and a
                 variety of systems that involve interactions between
                 persons and electronic devices such as human-computer
                 interfaces. Most of these applications require an
                 automated recognition of high-level activities,
                 composed of multiple simple (or atomic) actions of
                 persons. This article provides a detailed overview of
                 various state-of-the-art research papers on human
                 activity recognition. We discuss both the methodologies
                 developed for simple human actions and those for
                 high-level activities. An approach-based taxonomy is
                 chosen that compares the advantages and limitations of
                 each approach. Recognition methodologies for an
                 analysis of the simple actions of a single person are
                 first presented in the article.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Karimi:2011:MTS,
  author =       "Sarvnaz Karimi and Falk Scholer and Andrew Turpin",
  title =        "Machine transliteration survey",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "3",
  pages =        "17:1--17:46",
  month =        apr,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1922649.1922654",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Apr 27 07:58:39 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Machine transliteration is the process of
                 automatically transforming the script of a word from a
                 source language to a target language, while preserving
                 pronunciation. The development of algorithms
                 specifically for machine transliteration began over a
                 decade ago based on the phonetics of source and target
                 languages, followed by approaches using statistical and
                 language-specific methods. In this survey, we review
                 the key methodologies introduced in the transliteration
                 literature. The approaches are categorized based on the
                 resources and algorithms used, and the effectiveness is
                 compared.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ducournau:2011:IST,
  author =       "Roland Ducournau",
  title =        "Implementing statically typed object-oriented
                 programming languages",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "3",
  pages =        "18:1--18:48",
  month =        apr,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1922649.1922655",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Apr 27 07:58:39 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Object-oriented programming represents an original
                 implementation issue due to its philosophy of making
                 the program behavior depend on the dynamic type of
                 objects. This is expressed by the late binding
                 mechanism, aka message sending. The underlying
                 principle is that the address of the actually called
                 procedure is not statically determined at compile-time,
                 but depends on the dynamic type of a distinguished
                 parameter known as the receiver. A similar issue arises
                 with attributes, because their position in the object
                 layout may also depend on the object's dynamic type.
                 Furthermore, subtyping introduces another original
                 feature (i.e., runtime subtype checks). All three
                 mechanisms need specific implementations and data
                 structures.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mottola:2011:PWS,
  author =       "Luca Mottola and Gian Pietro Picco",
  title =        "Programming wireless sensor networks: Fundamental
                 concepts and state of the art",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "3",
  pages =        "19:1--19:51",
  month =        apr,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1922649.1922656",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Apr 27 07:58:39 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Wireless sensor networks (WSNs) are attracting great
                 interest in a number of application domains concerned
                 with monitoring and control of physical phenomena, as
                 they enable dense and untethered deployments at low
                 cost and with unprecedented flexibility. However,
                 application development is still one of the main
                 hurdles to a wide adoption of WSN technology. In
                 current real-world WSN deployments, programming is
                 typically carried out very close to the operating
                 system, therefore requiring the programmer to focus on
                 low-level system issues. This not only distracts the
                 programmer from the application logic, but also
                 requires a technical background rarely found among
                 application domain experts.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{VanBakel:2011:SIT,
  author =       "Steffen {Van Bakel}",
  title =        "Strict intersection types for the {Lambda Calculus}",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "3",
  pages =        "20:1--20:49",
  month =        apr,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1922649.1922657",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Apr 27 07:58:39 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article will show the usefulness and elegance of
                 strict intersection types for the Lambda Calculus, that
                 are strict in the sense that they are the
                 representatives of equivalence classes of types in the
                 BCD-system [Barendregt et al. 1983]. We will focus on
                 the essential intersection type assignment; this system
                 is almost syntax directed, and we will show that all
                 major properties hold that are known to hold for other
                 intersection systems, like the approximation theorem,
                 the characterization of (head/strong) normalization,
                 completeness of type assignment using filter semantics,
                 strong normalization for cut-elimination and the
                 principal pair property.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ko:2011:SAE,
  author =       "Andrew J. Ko and Robin Abraham and Laura Beckwith and
                 Alan Blackwell and Margaret Burnett and Martin Erwig
                 and Chris Scaffidi and Joseph Lawrance and Henry
                 Lieberman and Brad Myers and Mary Beth Rosson and Gregg
                 Rothermel and Mary Shaw and Susan Wiedenbeck",
  title =        "The state of the art in end-user software
                 engineering",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "3",
  pages =        "21:1--21:44",
  month =        apr,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1922649.1922658",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Apr 27 07:58:39 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Most programs today are written not by professional
                 software developers, but by people with expertise in
                 other domains working towards goals for which they need
                 computational support. For example, a teacher might
                 write a grading spreadsheet to save time grading, or an
                 interaction designer might use an interface builder to
                 test some user interface design ideas. Although these
                 end-user programmers may not have the same goals as
                 professional developers, they do face many of the same
                 software engineering challenges, including
                 understanding their requirements, as well as making
                 decisions about design, reuse, integration, testing,
                 and debugging. This article summarizes and classifies
                 research on these activities, defining the area of
                 End-User Software Engineering (EUSE) and related
                 terminology.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Duarte:2011:SCB,
  author =       "Elias P. {Duarte, Jr.} and Roverli P. Ziwich and Luiz
                 C. P. Albini",
  title =        "A survey of comparison-based system-level diagnosis",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "3",
  pages =        "22:1--22:56",
  month =        apr,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1922649.1922659",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Apr 27 07:58:39 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The growing complexity and dependability requirements
                 of hardware, software, and networks demand efficient
                 techniques for discovering disruptive behavior in those
                 systems. Comparison-based diagnosis is a realistic
                 approach to detect faulty units based on the outputs of
                 tasks executed by system units. This survey integrates
                 the vast amount of research efforts that have been
                 produced in this field, from the earliest theoretical
                 models to new promising applications. Key results also
                 include the quantitative evaluation of a relevant
                 reliability metric---the diagnosability---of several
                 popular interconnection network topologies. Relevant
                 diagnosis algorithms are also described.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Deng:2011:WFD,
  author =       "Yuhui Deng",
  title =        "What is the future of disk drives, death or rebirth?",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "3",
  pages =        "23:1--23:27",
  month =        apr,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1922649.1922660",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Apr 27 07:58:39 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Disk drives have experienced dramatic development to
                 meet performance requirements since the IBM 1301 disk
                 drive was announced in 1961. However, the performance
                 gap between memory and disk drives has widened to 6
                 orders of magnitude and continues to widen by about
                 50\% per year. Furthermore, energy efficiency has
                 become one of the most important challenges in
                 designing disk drive storage systems. The architectural
                 design of disk drives has reached a turning point which
                 should allow their performance to advance further,
                 while still maintaining high reliability and energy
                 efficiency. This article explains how disk drives have
                 evolved over five decades to meet challenging customer
                 demands.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{McLeod:2011:FAS,
  author =       "Laurie McLeod and Stephen G. MacDonell",
  title =        "Factors that affect software systems development
                 project outcomes: a survey of research",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "4",
  pages =        "24:1--24:56",
  month =        oct,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1978802.1978803",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 12 09:59:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Determining the factors that have an influence on
                 software systems development and deployment project
                 outcomes has been the focus of extensive and ongoing
                 research for more than 30 years. We provide here a
                 survey of the research literature that has addressed
                 this topic in the period 1996--2006, with a particular
                 focus on empirical analyses. On the basis of this
                 survey we present a new classification framework that
                 represents an abstracted and synthesized view of the
                 types of factors that have been asserted as influencing
                 project outcomes.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Algergawy:2011:XDC,
  author =       "Alsayed Algergawy and Marco Mesiti and Richi Nayak and
                 Gunter Saake",
  title =        "{XML} data clustering: an overview",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "4",
  pages =        "25:1--25:41",
  month =        oct,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1978802.1978804",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 12 09:59:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In the last few years we have observed a proliferation
                 of approaches for clustering XML documents and schemas
                 based on their structure and content. The presence of
                 such a huge amount of approaches is due to the
                 different applications requiring the clustering of XML
                 data. These applications need data in the form of
                 similar contents, tags, paths, structures, and
                 semantics. In this article, we first outline the
                 application contexts in which clustering is useful,
                 then we survey approaches so far proposed relying on
                 the abstract representation of data (instances or
                 schema), on the identified similarity measure, and on
                 the clustering algorithm.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rocha:2011:VUC,
  author =       "Anderson Rocha and Walter Scheirer and Terrance Boult
                 and Siome Goldenstein",
  title =        "Vision of the unseen: {Current} trends and challenges
                 in digital image and video forensics",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "4",
  pages =        "26:1--26:42",
  month =        oct,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1978802.1978805",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 12 09:59:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Digital images are everywhere---from our cell phones
                 to the pages of our online news sites. How we choose to
                 use digital image processing raises a surprising host
                 of legal and ethical questions that we must address.
                 What are the ramifications of hiding data within an
                 innocent image? Is this an intentional security
                 practice when used legitimately, or intentional
                 deception? Is tampering with an image appropriate in
                 cases where the image might affect public behavior?
                 Does an image represent a crime, or is it simply a
                 representation of a scene that has never existed?
                 Before action can even be taken on the basis of a
                 questionable image, we must detect something about the
                 image itself.",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Damas:2011:FIC,
  author =       "Sergio Damas and Oscar Cord{\'o}n and Oscar
                 Ib{\'a}{\~n}ez and Jose Santamar{\'\i}a and Inmaculada
                 Alem{\'a}n and Miguel Botella and Fernando Navarro",
  title =        "Forensic identification by computer-aided craniofacial
                 superimposition: a survey",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "4",
  pages =        "27:1--27:27",
  month =        oct,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1978802.1978806",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 12 09:59:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Craniofacial superimposition is a forensic process in
                 which a photograph of a missing person is compared with
                 a skull found to determine its identity. After one
                 century of development, craniofacial superimposition
                 has become an interdisciplinary research field where
                 computer sciences have acquired a key role as a
                 complement of forensic sciences. Moreover, the
                 availability of new digital equipment (such as
                 computers and 3D scanners) has resulted in a
                 significant advance in the applicability of this
                 forensic identification technique. The purpose of this
                 contribution is twofold. On the one hand, we aim to
                 clearly define the different stages involved in the
                 computer-aided craniofacial superimposition process.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wimmer:2011:SUB,
  author =       "Manuel Wimmer and Andrea Schauerhuber and Gerti Kappel
                 and Werner Retschitzegger and Wieland Schwinger and
                 Elizabeth Kapsammer",
  title =        "A survey on {UML}-based aspect-oriented design
                 modeling",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "4",
  pages =        "28:1--28:33",
  month =        oct,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1978802.1978807",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 12 09:59:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Aspect-orientation provides a new way of
                 modularization by clearly separating crosscutting
                 concerns from noncrosscutting ones. While
                 aspect-orientation originally has emerged at the
                 programming level, it now stretches also over other
                 development phases. There are, for example, already
                 several proposals for Aspect-Oriented Modeling (AOM),
                 most of them pursuing distinguished goals, providing
                 different concepts as well as notations, and showing
                 various levels of maturity. Consequently, there is an
                 urgent need to provide an in-depth survey, clearly
                 identifying commonalities and differences between
                 current AOM approaches. Existing surveys in this area
                 focus more on comprehensibility with respect to
                 development phases or evaluated approaches rather than
                 on comparability on bases of a detailed evaluation
                 framework.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sohel:2011:GDM,
  author =       "Ferdous A. Sohel and Gour C. Karmakar and Laurence S.
                 Dooley and Mohammed Bennamoun",
  title =        "Geometric distortion measurement for shape coding: a
                 contemporary review",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "4",
  pages =        "29:1--29:22",
  month =        oct,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1978802.1978808",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 12 09:59:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Geometric distortion measurement and the associated
                 metrics involved are integral to the Rate Distortion
                 (RD) shape coding framework, with importantly the
                 efficacy of the metrics being strongly influenced by
                 the underlying measurement strategy. This has been the
                 catalyst for many different techniques with this
                 article presenting a comprehensive review of geometric
                 distortion measurement, the diverse metrics applied,
                 and their impact on shape coding. The respective
                 performance of these measuring strategies is analyzed
                 from both a RD and complexity perspective, with a
                 recent distortion measurement technique based on
                 arc-length-parameterization being comparatively
                 evaluated.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Anders:2011:CPS,
  author =       "Torsten Anders and Eduardo R. Miranda",
  title =        "Constraint programming systems for modeling music
                 theories and composition",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "4",
  pages =        "30:1--30:38",
  month =        oct,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1978802.1978809",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 12 09:59:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Constraint programming is well suited for the
                 computational modeling of music theories and
                 composition: its declarative and modular approach
                 shares similarities with the way music theory is
                 traditionally expressed, namely by a set of rules which
                 describe the intended result. Various music theory
                 disciplines have been modeled, including counterpoint,
                 harmony, rhythm, form, and instrumentation. Because
                 modeling music theories ``from scratch'' is a complex
                 task, generic music constraint programming systems have
                 been proposed that predefine the required building
                 blocks for modeling a range of music theories.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Parris:2011:PAF,
  author =       "Matthew G. Parris and Carthik A. Sharma and Ronald F.
                 Demara",
  title =        "Progress in autonomous fault recovery of field
                 programmable gate arrays",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "4",
  pages =        "31:1--31:30",
  month =        oct,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1978802.1978810",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 12 09:59:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The capabilities of current fault-handling techniques
                 for Field Programmable Gate Arrays (FPGAs) develop a
                 descriptive classification ranging from simple passive
                 techniques to robust dynamic methods. Fault-handling
                 methods not requiring modification of the FPGA device
                 architecture or user intervention to recover from
                 faults are examined and evaluated against
                 overhead-based and sustainability-based performance
                 metrics such as additional resource requirements,
                 throughput reduction, fault capacity, and fault
                 coverage. This classification alongside these
                 performance metrics forms a standard for confident
                 comparisons.",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wang:2011:CPS,
  author =       "Bang Wang",
  title =        "Coverage problems in sensor networks: a survey",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "4",
  pages =        "32:1--32:53",
  month =        oct,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1978802.1978811",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 12 09:59:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Sensor networks, which consist of sensor nodes each
                 capable of sensing environment and transmitting data,
                 have lots of applications in battlefield surveillance,
                 environmental monitoring, industrial diagnostics, etc.
                 Coverage which is one of the most important performance
                 metrics for sensor networks reflects how well a sensor
                 field is monitored. Individual sensor coverage models
                 are dependent on the sensing functions of different
                 types of sensors, while network-wide sensing coverage
                 is a collective performance measure for geographically
                 distributed sensor nodes. This article surveys research
                 progress made to address various coverage problems in
                 sensor networks. We first provide discussions on sensor
                 coverage models and design issues.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Falessi:2011:DMT,
  author =       "Davide Falessi and Giovanni Cantone and Rick Kazman
                 and Philippe Kruchten",
  title =        "Decision-making techniques for software architecture
                 design: a comparative survey",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "4",
  pages =        "33:1--33:28",
  month =        oct,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1978802.1978812",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 12 09:59:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The architecture of a software-intensive system can be
                 defined as the set of relevant design decisions that
                 affect the qualities of the overall system
                 functionality; therefore, architectural decisions are
                 eventually crucial to the success of a software
                 project. The software engineering literature describes
                 several techniques to choose among architectural
                 alternatives, but it gives no clear guidance on which
                 technique is more suitable than another, and in which
                 circumstances. As such, there is no systematic way for
                 software engineers to choose among decision-making
                 techniques for resolving tradeoffs in architecture
                 design. In this article, we provide a comparison of
                 existing decision-making techniques, aimed to guide
                 architects in their selection.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Skopal:2011:NSS,
  author =       "Tom{\'a}{\v{s}} Skopal and Benjamin Bustos",
  title =        "On nonmetric similarity search problems in complex
                 domains",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "4",
  pages =        "34:1--34:50",
  month =        oct,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1978802.1978813",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 12 09:59:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The task of similarity search is widely used in
                 various areas of computing, including multimedia
                 databases, data mining, bioinformatics, social
                 networks, etc. In fact, retrieval of semantically
                 unstructured data entities requires a form of
                 aggregated qualification that selects entities relevant
                 to a query. A popular type of such a mechanism is
                 similarity querying. For a long time, the
                 database-oriented applications of similarity search
                 employed the definition of similarity restricted to
                 metric distances. Due to its topological properties,
                 metric similarity can be effectively used to index a
                 database which can then be queried efficiently by
                 so-called metric access methods. However, together with
                 the increasing complexity of data entities across
                 various domains, in recent years there appeared many
                 similarities that were not metrics---we call them
                 nonmetric similarity functions.",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Davis:2011:SHR,
  author =       "Robert I. Davis and Alan Burns",
  title =        "A survey of hard real-time scheduling for
                 multiprocessor systems",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "4",
  pages =        "35:1--35:44",
  month =        oct,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1978802.1978814",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 12 09:59:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This survey covers hard real-time scheduling
                 algorithms and schedulability analysis techniques for
                 homogeneous multiprocessor systems. It reviews the key
                 results in this field from its origins in the late
                 1960s to the latest research published in late 2009.
                 The survey outlines fundamental results about
                 multiprocessor real-time scheduling that hold
                 independent of the scheduling algorithms employed. It
                 provides a taxonomy of the different scheduling
                 methods, and considers the various performance metrics
                 that can be used for comparison purposes. A detailed
                 review is provided covering partitioned, global, and
                 hybrid scheduling algorithms, approaches to resource
                 sharing, and the latest results from empirical
                 investigations.",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sadri:2011:AIS,
  author =       "Fariba Sadri",
  title =        "Ambient intelligence: a survey",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "4",
  pages =        "36:1--36:66",
  month =        oct,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1978802.1978815",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 12 09:59:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In this article we survey ambient intelligence (AmI),
                 including its applications, some of the technologies it
                 uses, and its social and ethical implications. The
                 applications include AmI at home, care of the elderly,
                 healthcare, commerce, and business, recommender
                 systems, museums and tourist scenarios, and group
                 decision making. Among technologies, we focus on
                 ambient data management and artificial intelligence;
                 for example planning, learning, event-condition-action
                 rules, temporal reasoning, and agent-oriented
                 technologies. The survey is not intended to be
                 exhaustive, but to convey a broad range of
                 applications, technologies, and technical, social, and
                 ethical challenges.",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Carpineto:2012:SAQ,
  author =       "Claudio Carpineto and Giovanni Romano",
  title =        "A Survey of Automatic Query Expansion in Information
                 Retrieval",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "1",
  pages =        "1:1--1:50",
  month =        jan,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2071389.2071390",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Jan 31 06:44:41 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The relative ineffectiveness of information retrieval
                 systems is largely caused by the inaccuracy with which
                 a query formed by a few keywords models the actual user
                 information need. One well known method to overcome
                 this limitation is automatic query expansion (AQE),
                 whereby the user's original query is augmented by new
                 features with a similar meaning. AQE has a long history
                 in the information retrieval community but it is only
                 in the last years that it has reached a level of
                 scientific and experimental maturity, especially in
                 laboratory settings such as TREC. This survey presents
                 a unified view of a large number of recent approaches
                 to AQE that leverage various data sources and employ
                 very different principles and techniques.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhang:2012:CSP,
  author =       "David Zhang and Wangmeng Zuo and Feng Yue",
  title =        "A Comparative Study of Palmprint Recognition
                 Algorithms",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "1",
  pages =        "2:1--2:37",
  month =        jan,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2071389.2071391",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Jan 31 06:44:41 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Palmprint images contain rich unique features for
                 reliable human identification, which makes it a very
                 competitive topic in biometric research. A great many
                 different low resolution palmprint recognition
                 algorithms have been developed, which can be roughly
                 grouped into three categories: holistic-based,
                 feature-based, and hybrid methods. The purpose of this
                 article is to provide an updated survey of palmprint
                 recognition methods, and present a comparative study to
                 evaluate the performance of the state-of-the-art
                 palmprint recognition methods. Using the Hong Kong
                 Polytechnic University (HKPU) palmprint database
                 (version 2), we compare the recognition performance of
                 a number of holistic-based (Fisherpalms and DCT+LDA)
                 and local feature-based (competitive code, ordinal
                 code, robust line orientation code, derivative of
                 Gaussian code, and wide line detector) methods, and
                 then investigate the error correlation and score-level
                 fusion performance of different algorithms.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nielson:2012:FLP,
  author =       "Hanne Riis Nielson and Flemming Nielson and Henrik
                 Pilegaard",
  title =        "{Flow Logic} for Process Calculi",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "1",
  pages =        "3:1--3:39",
  month =        jan,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2071389.2071392",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Jan 31 06:44:41 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Flow Logic is an approach to statically determining
                 the behavior of programs and processes. It borrows
                 methods and techniques from Abstract Interpretation,
                 Data Flow Analysis and Constraint Based Analysis while
                 presenting the analysis in a style more reminiscent of
                 Type Systems. Traditionally developed for programming
                 languages, this article provides a tutorial development
                 of the approach of Flow Logic for process calculi based
                 on a decade of research. We first develop a simple
                 analysis for the $ \pi $-calculus; this consists of the
                 specification, semantic soundness (in the form of
                 subject reduction and adequacy results), and a Moore
                 Family result showing that a least solution always
                 exists, as well as providing insights on how to
                 implement the analysis.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Song:2012:SPT,
  author =       "Songbo Song and Hassnaa Moustafa and Hossam Afifi",
  title =        "A Survey on Personalized {TV} and {NGN} Services
                 through Context-Awareness",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "1",
  pages =        "4:1--4:18",
  month =        jan,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2071389.2071393",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Jan 31 06:44:41 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The advances in IPTV (Internet Protocol Television)
                 technology enable a new user-centric and interactive TV
                 model, in which context-awareness is promising in
                 making the user's interaction with the TV dynamic and
                 transparent. Our research interest is how to achieve TV
                 service personalization applying context-awareness to
                 the NGN IPTV architecture. In this article we present
                 the different existing contributions that employ
                 context-awareness to allow interactive services. Some
                 of these contributions directly focus on TV, while
                 others are proposed for specific NGN services. We
                 present a technical analysis for these solutions and
                 give some guidelines for future deployment of
                 personalized IPTV services.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wojcik:2012:FOA,
  author =       "Robert W{\'o}jcik and Andrzej Jajszczyk",
  title =        "Flow Oriented Approaches to {QoS} Assurance",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "1",
  pages =        "5:1--5:37",
  month =        jan,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2071389.2071394",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Jan 31 06:44:41 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The following flow-oriented architectures for quality
                 of service assurance in IP networks are surveyed:
                 Integrated Services, Connectionless Approach to QoS
                 guarantees, Dynamic Packet State, Caspian Networks and
                 Anagran, the Feedback and Distribution method,
                 Flow-Based Differentiated Services, Flow-Aware
                 Networking, the Flow-State-Aware transport, and
                 Flow-Aggregate-Based services. The reasons why
                 flow-awareness attracted so much attention are
                 explained, and the current studies as well as the
                 development history of the solutions are presented. The
                 following features of the discussed architectures are
                 compared: flow definition, classes of service,
                 architecture, and signaling. Also, their pros and cons,
                 complexity, and scalability, as well as perspectives
                 are assessed.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Egele:2012:SAD,
  author =       "Manuel Egele and Theodoor Scholte and Engin Kirda and
                 Christopher Kruegel",
  title =        "A survey on automated dynamic malware-analysis
                 techniques and tools",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "2",
  pages =        "6:1--6:42",
  month =        feb,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2089125.2089126",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 28 16:26:04 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Anti-virus vendors are confronted with a multitude of
                 potentially malicious samples today. Receiving
                 thousands of new samples every day is not uncommon. The
                 signatures that detect confirmed malicious threats are
                 mainly still created manually, so it is important to
                 discriminate between samples that pose a new unknown
                 threat and those that are mere variants of known
                 malware. This survey article provides an overview of
                 techniques based on dynamic analysis that are used to
                 analyze potentially malicious samples.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Crowston:2012:FLO,
  author =       "Kevin Crowston and Kangning Wei and James Howison and
                 Andrea Wiggins",
  title =        "{Free\slash} Libre open-source software development:
                 {What} we know and what we do not know",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "2",
  pages =        "7:1--7:35",
  month =        feb,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2089125.2089127",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 28 16:26:04 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/gnu.bib",
  abstract =     "We review the empirical research on Free/Libre and
                 Open-Source Software (FLOSS) development and assess the
                 state of the literature. We develop a framework for
                 organizing the literature based on the
                 input-mediator-output-input (IMOI) model from the small
                 groups literature. We present a quantitative summary of
                 articles selected for the review and then discuss
                 findings of this literature categorized into issues
                 pertaining to inputs (e.g., member characteristics,
                 technology use, and project characteristics), processes
                 (software development practices, social processes, and
                 firm involvement practices), emergent states (e.g.,
                 social states and task-related states), and outputs
                 (e.g. team performance, FLOSS implementation, and
                 project evolution).",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Antunes:2012:SDC,
  author =       "Pedro Antunes and Valeria Herskovic and Sergio F.
                 Ochoa and Jose A. Pino",
  title =        "Structuring dimensions for collaborative systems
                 evaluation",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "2",
  pages =        "8:1--8:28",
  month =        feb,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2089125.2089128",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 28 16:26:04 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Collaborative systems evaluation is always necessary
                 to determine the impact a solution will have on the
                 individuals, groups, and the organization. Several
                 methods of evaluation have been proposed. These methods
                 comprise a variety of approaches with various goals.
                 Thus, the need for a strategy to select the most
                 appropriate method for a specific case is clear. This
                 research work presents a detailed framework to evaluate
                 collaborative systems according to given variables and
                 performance levels. The proposal assumes that
                 evaluation is an evolving process during the system
                 lifecycle.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Caruana:2012:SEA,
  author =       "Godwin Caruana and Maozhen Li",
  title =        "A survey of emerging approaches to spam filtering",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "2",
  pages =        "9:1--9:27",
  month =        feb,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2089125.2089129",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 28 16:26:04 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "From just an annoying characteristic of the electronic
                 mail epoch, spam has evolved into an expensive resource
                 and time-consuming problem. In this survey, we focus on
                 emerging approaches to spam filtering built on recent
                 developments in computing technologies. These include
                 peer-to-peer computing, grid computing, semantic Web,
                 and social networks. We also address a number of
                 perspectives related to personalization and privacy in
                 spam filtering. We conclude that, while important
                 advancements have been made in spam filtering in recent
                 years, high performance approaches remain to be
                 explored due to the large scale of the problem.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Midtgaard:2012:CFA,
  author =       "Jan Midtgaard",
  title =        "Control-flow analysis of functional programs",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "3",
  pages =        "10:1--10:33",
  month =        jun,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2187671.2187672",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jun 13 16:57:49 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We present a survey of control-flow analysis of
                 functional programs, which has been the subject of
                 extensive investigation throughout the past 30 years.
                 Analyses of the control flow of functional programs
                 have been formulated in multiple settings and have led
                 to many different approximations, starting with the
                 seminal works of Jones, Shivers, and Sestoft. In this
                 article, we survey control-flow analysis of functional
                 programs by structuring the multitude of formulations
                 and approximations and comparing them.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shahriar:2012:MPS,
  author =       "Hossain Shahriar and Mohammad Zulkernine",
  title =        "Mitigating program security vulnerabilities:
                 {Approaches} and challenges",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "3",
  pages =        "11:1--11:46",
  month =        jun,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2187671.2187673",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jun 13 16:57:49 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Programs are implemented in a variety of languages and
                 contain serious vulnerabilities which might be
                 exploited to cause security breaches. These
                 vulnerabilities have been exploited in real life and
                 caused damages to related stakeholders such as program
                 users. As many security vulnerabilities belong to
                 program code, many techniques have been applied to
                 mitigate these vulnerabilities before program
                 deployment. Unfortunately, there is no comprehensive
                 comparative analysis of different vulnerability
                 mitigation works. As a result, there exists an obscure
                 mapping between the techniques, the addressed
                 vulnerabilities, and the limitations of different
                 approaches. This article attempts to address these
                 issues. The work extensively compares and contrasts the
                 existing program security vulnerability mitigation
                 techniques, namely testing, static analysis, and hybrid
                 analysis. We also discuss three other approaches
                 employed to mitigate the most common program security
                 vulnerabilities: secure programming, program
                 transformation, and patching. The survey provides a
                 comprehensive understanding of the current program
                 security vulnerability mitigation approaches and
                 challenges as well as their key characteristics and
                 limitations. Moreover, our discussion highlights the
                 open issues and future research directions in the area
                 of program security vulnerability mitigation.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Silva:2012:VPS,
  author =       "Josep Silva",
  title =        "A vocabulary of program slicing-based techniques",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "3",
  pages =        "12:1--12:41",
  month =        jun,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2187671.2187674",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jun 13 16:57:49 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article surveys previous work on program
                 slicing-based techniques. For each technique, we
                 describe its features, its main applications, and a
                 common example of slicing using such a technique. After
                 discussing each technique separately, all of them are
                 compared in order to clarify and establish the
                 relations between them. This comparison gives rise to a
                 classification of techniques which can help to guide
                 future research directions in this field.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kong:2012:RTM,
  author =       "Joonho Kong and Sung Woo Chung and Kevin Skadron",
  title =        "Recent thermal management techniques for
                 microprocessors",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "3",
  pages =        "13:1--13:42",
  month =        jun,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2187671.2187675",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jun 13 16:57:49 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Microprocessor design has recently encountered many
                 constraints such as power, energy, reliability, and
                 temperature. Among these challenging issues,
                 temperature-related issues have become especially
                 important within the past several years. We summarize
                 recent thermal management techniques for
                 microprocessors, focusing on those that affect or rely
                 on the microarchitecture. We categorize thermal
                 management techniques into six main categories:
                 temperature monitoring, microarchitectural techniques,
                 floorplanning, OS/compiler techniques, liquid cooling
                 techniques, and thermal reliability/security.
                 Temperature monitoring, a requirement for Dynamic
                 Thermal Management (DTM), includes temperature
                 estimation and sensor placement techniques for accurate
                 temperature measurement or estimation.
                 Microarchitectural techniques include both static and
                 dynamic thermal management techniques that control
                 hardware structures. Floorplanning covers a range of
                 thermal-aware floorplanning techniques for 2D and 3D
                 microprocessors. OS/compiler techniques include
                 thermal-aware task scheduling and instruction
                 scheduling techniques. Liquid cooling techniques are
                 higher-capacity alternatives to conventional air
                 cooling techniques. Thermal reliability/security issues
                 cover temperature-dependent reliability modeling,
                 Dynamic Reliability Management (DRM), and malicious
                 codes that specifically cause overheating.
                 Temperature-related issues will only become more
                 challenging as process technology continues to evolve
                 and transistor densities scale up faster than power per
                 transistor scales down. The overall objective of this
                 survey is to give microprocessor designers a broad
                 perspective on various aspects of designing
                 thermal-aware microprocessors and to guide future
                 thermal management studies.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Islam:2012:RRA,
  author =       "Syed M. S. Islam and Mohammed Bennamoun and Robyn A.
                 Owens and Rowan Davies",
  title =        "A review of recent advances in {$3$D} ear- and
                 expression-invariant face biometrics",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "3",
  pages =        "14:1--14:34",
  month =        jun,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2187671.2187676",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jun 13 16:57:49 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Biometric-based human recognition is rapidly gaining
                 popularity due to breaches of traditional security
                 systems and the lowering cost of sensors. The current
                 research trend is to use 3D data and to combine
                 multiple traits to improve accuracy and robustness.
                 This article comprehensively reviews unimodal and
                 multimodal recognition using 3D ear and face data. It
                 covers associated data collection, detection,
                 representation, and matching techniques and focuses on
                 the challenging problem of expression variations. All
                 the approaches are classified according to their
                 methodologies. Through the analysis of the scope and
                 limitations of these techniques, it is concluded that
                 further research should investigate fast and fully
                 automatic ear-face multimodal systems robust to
                 occlusions and deformations.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cugola:2012:PFI,
  author =       "Gianpaolo Cugola and Alessandro Margara",
  title =        "Processing flows of information: {From} data stream to
                 complex event processing",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "3",
  pages =        "15:1--15:62",
  month =        jun,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2187671.2187677",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jun 13 16:57:49 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A large number of distributed applications requires
                 continuous and timely processing of information as it
                 flows from the periphery to the center of the system.
                 Examples include intrusion detection systems which
                 analyze network traffic in real-time to identify
                 possible attacks; environmental monitoring applications
                 which process raw data coming from sensor networks to
                 identify critical situations; or applications
                 performing online analysis of stock prices to identify
                 trends and forecast future values. Traditional DBMSs,
                 which need to store and index data before processing
                 it, can hardly fulfill the requirements of timeliness
                 coming from such domains. Accordingly, during the last
                 decade, different research communities developed a
                 number of tools, which we collectively call Information
                 flow processing (IFP) systems, to support these
                 scenarios. They differ in their system architecture,
                 data model, rule model, and rule language. In this
                 article, we survey these systems to help researchers,
                 who often come from different backgrounds, in
                 understanding how the various approaches they adopt may
                 complement each other. In particular, we propose a
                 general, unifying model to capture the different
                 aspects of an IFP system and use it to provide a
                 complete and precise classification of the systems and
                 mechanisms proposed so far.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hatcliff:2012:BIS,
  author =       "John Hatcliff and Gary T. Leavens and K. Rustan M.
                 Leino and Peter M{\"u}ller and Matthew Parkinson",
  title =        "Behavioral interface specification languages",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "3",
  pages =        "16:1--16:58",
  month =        jun,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2187671.2187678",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jun 13 16:57:49 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Behavioral interface specification languages provide
                 formal code-level annotations, such as preconditions,
                 postconditions, invariants, and assertions that allow
                 programmers to express the intended behavior of program
                 modules. Such specifications are useful for precisely
                 documenting program behavior, for guiding
                 implementation, and for facilitating agreement between
                 teams of programmers in modular development of
                 software. When used in conjunction with automated
                 analysis and program verification tools, such
                 specifications can support detection of common code
                 vulnerabilities, capture of light-weight
                 application-specific semantic properties, generation of
                 test cases and test oracles, and full formal program
                 verification. This article surveys behavioral interface
                 specification languages with a focus toward automatic
                 program verification and with a view towards aiding the
                 Verified Software Initiative --- a fifteen-year,
                 cooperative, international project directed at the
                 scientific challenges of large-scale software
                 verification.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Younan:2012:RCC,
  author =       "Yves Younan and Wouter Joosen and Frank Piessens",
  title =        "Runtime countermeasures for code injection attacks
                 against {C} and {C++} programs",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "3",
  pages =        "17:1--17:28",
  month =        jun,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2187671.2187679",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jun 13 16:57:49 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The lack of memory safety in C/C++ often leads to
                 vulnerabilities. Code injection attacks exploit these
                 vulnerabilities to gain control over the execution flow
                 of applications. These attacks have played a key role
                 in many major security incidents. Consequently, a huge
                 body of research on countermeasures exists. We provide
                 a comprehensive and structured survey of
                 vulnerabilities and countermeasures that operate at
                 runtime. These countermeasures make different
                 trade-offs in terms of performance, effectivity,
                 compatibility, etc., making it hard to evaluate and
                 compare countermeasures in a given context. We define a
                 classification and evaluation framework on the basis of
                 which countermeasures can be assessed.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Budzisz:2012:TSS,
  author =       "Lukasz Budzisz and Johan Garcia and Anna Brunstrom and
                 Ramon Ferr{\'u}s",
  title =        "A taxonomy and survey of {SCTP} research",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "4",
  pages =        "18:1--18:36",
  month =        aug,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2333112.2333113",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Sep 6 09:45:45 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The Stream Control Transmission Protocol (SCTP) is a
                 relatively recent general-purpose transport layer
                 protocol for IP networks that has been introduced as a
                 complement to the well-established TCP and UDP
                 transport protocols. Although initially conceived for
                 the transport of PSTN signaling messages over IP
                 networks, the introduction of key features in SCTP,
                 such as multihoming and multistreaming, has spurred
                 considerable research interest surrounding SCTP and its
                 applicability to different networking scenarios. This
                 article aims to provide a detailed survey of one of
                 these new features-multihoming-which, as it is shown,
                 is the subject of evaluation in more than half of all
                 published SCTP-related articles. To this end, the
                 article first summarizes and organizes SCTP-related
                 research conducted so far by developing a
                 four-dimensional taxonomy reflecting the (1) protocol
                 feature examined, (2) application area, (3) network
                 environment, and (4) study approach. Over 430
                 SCTP-related publications have been analyzed and
                 classified according to the proposed taxonomy. As a
                 result, a clear perspective on this research area in
                 the decade since the first protocol standardization in
                 2000 is given, covering both current and future
                 research trends. On continuation, a detailed survey of
                 the SCTP multihoming feature is provided, examining
                 possible applications of multihoming, such as
                 robustness, handover support, and loadsharing.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Biddle:2012:GPL,
  author =       "Robert Biddle and Sonia Chiasson and P. C. {Van
                 Oorschot}",
  title =        "Graphical passwords: {Learning} from the first twelve
                 years",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "4",
  pages =        "19:1--19:41",
  month =        aug,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2333112.2333114",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Sep 6 09:45:45 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Starting around 1999, a great many graphical password
                 schemes have been proposed as alternatives to
                 text-based password authentication. We provide a
                 comprehensive overview of published research in the
                 area, covering both usability and security aspects as
                 well as system evaluation. The article first catalogues
                 existing approaches, highlighting novel features of
                 selected schemes and identifying key usability or
                 security advantages. We then review usability
                 requirements for knowledge-based authentication as they
                 apply to graphical passwords, identify security threats
                 that such systems must address and review known
                 attacks, discuss methodological issues related to
                 empirical evaluation, and identify areas for further
                 research and improved methodology.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wong:2012:OLT,
  author =       "Wilson Wong and Wei Liu and Mohammed Bennamoun",
  title =        "Ontology learning from text: a look back and into the
                 future",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "4",
  pages =        "20:1--20:36",
  month =        aug,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2333112.2333115",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Sep 6 09:45:45 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Ontologies are often viewed as the answer to the need
                 for interoperable semantics in modern information
                 systems. The explosion of textual information on the
                 Read/Write Web coupled with the increasing demand for
                 ontologies to power the Semantic Web have made
                 (semi-)automatic ontology learning from text a very
                 promising research area. This together with the
                 advanced state in related areas, such as natural
                 language processing, have fueled research into ontology
                 learning over the past decade. This survey looks at how
                 far we have come since the turn of the millennium and
                 discusses the remaining challenges that will define the
                 research directions in this area in the near future.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Liu:2012:SSM,
  author =       "Huaiyu Liu and Mic Bowman and Francis Chang",
  title =        "Survey of state melding in virtual worlds",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "4",
  pages =        "21:1--21:25",
  month =        aug,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2333112.2333116",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Sep 6 09:45:45 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The fundamental goal of virtual worlds is to provide
                 users with the illusion that they are all seeing and
                 interacting with each other in a consistent world.
                 State melding is the core of creating this illusion of
                 a shared reality. It includes two major parts:
                 consistency maintenance and state update dissemination.
                 Well-designed state melding technologies are also
                 critical for developing a virtual world that can scale
                 to a large number of concurrent users and provide
                 satisfying user experiences. In this article, we
                 present a taxonomy of consistency models and
                 categorization of state update dissemination
                 technologies for virtual worlds. To connect theories
                 and practices, we then apply the taxonomy to case study
                 several state-of-the-art virtual worlds. We also
                 discuss challenges and promising solutions of state
                 melding in large-scale virtual worlds. This survey aims
                 to provide a thorough understanding of existing
                 approaches and their strength and limitations and to
                 assist in developing solutions to improve scalability
                 and performance of virtual worlds.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gonnet:2012:REE,
  author =       "Pedro Gonnet",
  title =        "A review of error estimation in adaptive quadrature",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "4",
  pages =        "22:1--22:36",
  month =        aug,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2333112.2333117",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Sep 6 09:45:45 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The most critical component of any adaptive numerical
                 quadrature routine is the estimation of the integration
                 error. Since the publication of the first algorithms in
                 the 1960s, many error estimation schemes have been
                 presented, evaluated, and discussed. This article
                 presents a review of existing error estimation
                 techniques and discusses their differences and their
                 common features. Some common shortcomings of these
                 algorithms are discussed, and a new general error
                 estimation technique is presented.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sengul:2012:SAS,
  author =       "Cigdem Sengul and Aline Carneiro Viana and Artur
                 Ziviani",
  title =        "A survey of adaptive services to cope with dynamics in
                 wireless self-organizing networks",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "4",
  pages =        "23:1--23:35",
  month =        aug,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2333112.2333118",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Sep 6 09:45:45 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In this article, we consider different types of
                 wireless networks that benefit from and, in certain
                 cases, require self-organization. Taking mobile ad hoc,
                 wireless sensor, wireless mesh, and delay-tolerant
                 networks as examples of wireless self-organizing
                 networks (WSONs), we identify that the common
                 challenges these networks face are mainly due to lack
                 of centralized management, device heterogeneity,
                 unreliable wireless communication, mobility, resource
                 constraints, or the need to support different traffic
                 types. In this context, we survey several adaptive
                 services proposed to handle these challenges. In
                 particular, we group the adaptive services as core
                 services and network-level services. By categorizing
                 different types of services that handle adaptation and
                 the types of adaptations, we intend to provide useful
                 design guidelines for achieving self-organizing
                 behavior in network protocols. Finally, we discuss open
                 research problems to encourage the design of novel
                 protocols for WSONs.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bellavista:2012:SCD,
  author =       "Paolo Bellavista and Antonio Corradi and Mario Fanelli
                 and Luca Foschini",
  title =        "A survey of context data distribution for mobile
                 ubiquitous systems",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "4",
  pages =        "24:1--24:45",
  month =        aug,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2333112.2333119",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Sep 6 09:45:45 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The capacity to gather and timely deliver to the
                 service level any relevant information that can
                 characterize the service-provisioning environment, such
                 as computing resources/capabilities, physical device
                 location, user preferences, and time constraints,
                 usually defined as context-awareness, is widely
                 recognized as a core function for the development of
                 modern ubiquitous and mobile systems. Much work has
                 been done to enable context-awareness and to ease the
                 diffusion of context-aware services; at the same time,
                 several middleware solutions have been designed to
                 transparently implement context management and
                 provisioning in the mobile system. However, to the best
                 of our knowledge, an in-depth analysis of the context
                 data distribution, namely, the function in charge of
                 distributing context data to interested entities, is
                 still missing. Starting from the core assumption that
                 only effective and efficient context data distribution
                 can pave the way to the deployment of truly
                 context-aware services, this article aims at putting
                 together current research efforts to derive an original
                 and holistic view of the existing literature. We
                 present a unified architectural model and a new
                 taxonomy for context data distribution by considering
                 and comparing a large number of solutions. Finally,
                 based on our analysis, we draw some of the research
                 challenges still unsolved and identify some possible
                 directions for future work.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wang:2012:ATS,
  author =       "Meng Wang and Bingbing Ni and Xian-Sheng Hua and
                 Tat-Seng Chua",
  title =        "Assistive tagging: a survey of multimedia tagging with
                 human-computer joint exploration",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "4",
  pages =        "25:1--25:24",
  month =        aug,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2333112.2333120",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Sep 6 09:45:45 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Along with the explosive growth of multimedia data,
                 automatic multimedia tagging has attracted great
                 interest of various research communities, such as
                 computer vision, multimedia, and information retrieval.
                 However, despite the great progress achieved in the
                 past two decades, automatic tagging technologies still
                 can hardly achieve satisfactory performance on
                 real-world multimedia data that vary widely in genre,
                 quality, and content. Meanwhile, the power of human
                 intelligence has been fully demonstrated in the Web 2.0
                 era. If well motivated, Internet users are able to tag
                 a large amount of multimedia data. Therefore, a set of
                 new techniques has been developed by combining humans
                 and computers for more accurate and efficient
                 multimedia tagging, such as batch tagging, active
                 tagging, tag recommendation, and tag refinement. These
                 techniques are able to accomplish multimedia tagging by
                 jointly exploring humans and computers in different
                 ways. This article refers to them collectively as
                 assistive tagging and conducts a comprehensive survey
                 of existing research efforts on this theme. We first
                 introduce the status of automatic tagging and manual
                 tagging and then state why assistive tagging can be a
                 good solution. We categorize existing assistive tagging
                 techniques into three paradigms: (1) tagging with data
                 selection {\&} organization; (2) tag recommendation;
                 and (3) tag processing. We introduce the research
                 efforts on each paradigm and summarize the
                 methodologies. We also provide a discussion on several
                 future trends in this research direction.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cittadini:2012:SIR,
  author =       "Luca Cittadini and Giuseppe {Di Battista} and Massimo
                 Rimondini",
  title =        "On the stability of interdomain routing",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "4",
  pages =        "26:1--26:40",
  month =        aug,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2333112.2333121",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Sep 6 09:45:45 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Most routing protocols guarantee convergence to a
                 stable routing state. That is, in the absence of
                 topology or configuration changes, each router will
                 eventually find a stable route to any destination.
                 However, this is not the case for policy-based routing
                 protocols, for example, the BGP protocol used as a de
                 facto standard for interdomain routing. The interaction
                 of not-so-complex BGP configurations can cause
                 permanent oscillations of routing. Several models and
                 algorithms have been proposed in the literature to
                 study routing oscillations. This article surveys
                 state-of-the-art contributions in this field, with a
                 special emphasis on algorithmic and combinatorial
                 aspects.",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhou:2012:TTC,
  author =       "Dong Zhou and Mark Truran and Tim Brailsford and
                 Vincent Wade and Helen Ashman",
  title =        "Translation techniques in cross-language information
                 retrieval",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "1",
  pages =        "1:1--1:44",
  month =        nov,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2379776.2379777",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 6 10:55:59 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Cross-language information retrieval (CLIR) is an
                 active sub-domain of information retrieval (IR). Like
                 IR, CLIR is centered on the search for documents and
                 for information contained within those documents.
                 Unlike IR, CLIR must reconcile queries and documents
                 that are written in different languages. The usual
                 solution to this mismatch involves translating the
                 query and/or the documents before performing the
                 search. Translation is therefore a pivotal activity for
                 CLIR engines. Over the last 15 years, the CLIR
                 community has developed a wide range of techniques and
                 models supporting free text translation. This article
                 presents an overview of those techniques, with a
                 special emphasis on recent developments.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bernardi:2012:DMA,
  author =       "Simona Bernardi and Jos{\'e} Merseguer and Dorina C.
                 Petriu",
  title =        "Dependability modeling and analysis of software
                 systems specified with {UML}",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "1",
  pages =        "2:1--2:48",
  month =        nov,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2379776.2379778",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 6 10:55:59 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The goal is to survey dependability modeling and
                 analysis of software and systems specified with UML,
                 with focus on reliability, availability,
                 maintainability, and safety (RAMS). From the literature
                 published in the last decade, 33 approaches presented
                 in 43 papers were identified. They are evaluated
                 according to three sets of criteria regarding UML
                 modeling issues, addressed dependability
                 characteristics, and quality assessment of the surveyed
                 approaches. The survey shows that more works are
                 devoted to reliability and safety, fewer to
                 availability and maintainability, and none to
                 integrity. Many methods support early life-cycle phases
                 (from requirements to design). More research is needed
                 for tool development to automate the derivation of
                 analysis models and to give feedback to designers.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Avancha:2012:PMT,
  author =       "Sasikanth Avancha and Amit Baxi and David Kotz",
  title =        "Privacy in mobile technology for personal healthcare",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "1",
  pages =        "3:1--3:54",
  month =        nov,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2379776.2379779",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 6 10:55:59 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Information technology can improve the quality,
                 efficiency, and cost of healthcare. In this survey, we
                 examine the privacy requirements of mobile computing
                 technologies that have the potential to transform
                 healthcare. Such mHealth technology enables physicians
                 to remotely monitor patients' health and enables
                 individuals to manage their own health more easily.
                 Despite these advantages, privacy is essential for any
                 personal monitoring technology. Through an extensive
                 survey of the literature, we develop a conceptual
                 privacy framework for mHealth, itemize the privacy
                 properties needed in mHealth systems, and discuss the
                 technologies that could support privacy-sensitive
                 mHealth systems. We end with a list of open research
                 questions.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhuravlev:2012:SST,
  author =       "Sergey Zhuravlev and Juan Carlos Saez and Sergey
                 Blagodurov and Alexandra Fedorova and Manuel Prieto",
  title =        "Survey of scheduling techniques for addressing shared
                 resources in multicore processors",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "1",
  pages =        "4:1--4:28",
  month =        nov,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2379776.2379780",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 6 10:55:59 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Chip multicore processors (CMPs) have emerged as the
                 dominant architecture choice for modern computing
                 platforms and will most likely continue to be dominant
                 well into the foreseeable future. As with any system,
                 CMPs offer a unique set of challenges. Chief among them
                 is the shared resource contention that results because
                 CMP cores are not independent processors but rather
                 share common resources among cores such as the last
                 level cache (LLC). Shared resource contention can lead
                 to severe and unpredictable performance impact on the
                 threads running on the CMP. Conversely, CMPs offer
                 tremendous opportunities for multithreaded
                 applications, which can take advantage of simultaneous
                 thread execution as well as fast inter thread data
                 sharing. Many solutions have been proposed to deal with
                 the negative aspects of CMPs and take advantage of the
                 positive. This survey focuses on the subset of these
                 solutions that exclusively make use of OS thread-level
                 scheduling to achieve their goals. These solutions are
                 particularly attractive as they require no changes to
                 hardware and minimal or no changes to the OS. The OS
                 scheduler has expanded well beyond its original role of
                 time-multiplexing threads on a single core into a
                 complex and effective resource manager. This article
                 surveys a multitude of new and exciting work that
                 explores the diverse new roles the OS scheduler can
                 successfully take on.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Al-Hafeedh:2012:CIB,
  author =       "Anisa Al-Hafeedh and Maxime Crochemore and Lucian Ilie
                 and Evguenia Kopylova and W. F. Smyth and German
                 Tischler and Munina Yusufu",
  title =        "A comparison of index-based {Lempel--Ziv LZ77}
                 factorization algorithms",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "1",
  pages =        "5:1--5:17",
  month =        nov,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2379776.2379781",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 6 10:55:59 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  abstract =     "Since 1977, when Lempel and Ziv described a kind of
                 string factorization useful for text compression, there
                 has been a succession of algorithms proposed for
                 computing ``LZ factorization''. In particular, there
                 have been several recent algorithms proposed that
                 extend the usefulness of LZ factorization, for example,
                 to the calculation of maximal repetitions. In this
                 article, we provide an overview of these new algorithms
                 and compare their efficiency in terms of their usage of
                 time and space.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Danev:2012:PLI,
  author =       "Boris Danev and Davide Zanetti and Srdjan Capkun",
  title =        "On physical-layer identification of wireless devices",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "1",
  pages =        "6:1--6:29",
  month =        nov,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2379776.2379782",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 6 10:55:59 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Physical-layer device identification aims at
                 identifying wireless devices during radio communication
                 by exploiting unique characteristics of their analog
                 (radio) circuitry. This work systematizes the existing
                 knowledge on this topic in order to enable a better
                 understanding of device identification, its
                 implications on the analysis and design of security
                 solutions in wireless networks and possible
                 applications. We therefore present a systematic review
                 of physical-layer identification systems and provide a
                 summary of current state-of-the-art techniques. We
                 further present a classification of attacks and discuss
                 the feasibility, limitations, and implications in
                 selected applications. We also highlight issues that
                 are still open and need to be addressed in future
                 work.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhao:2012:SPM,
  author =       "Yi Zhi Zhao and Chunyan Miao and Maode Ma and Jing
                 Bing Zhang and Cyril Leung",
  title =        "A survey and projection on medium access control
                 protocols for wireless sensor networks",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "1",
  pages =        "7:1--7:37",
  month =        nov,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2379776.2379783",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 6 10:55:59 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Recent advances in wireless communications and sensor
                 technologies have enabled the development of low-cost
                 wireless sensor networks (WSNs) for a wide range of
                 applications. Medium access control (MAC) protocols
                 play a crucial role in WSNs by enabling the sharing of
                 scarce wireless bandwidth efficiently and fairly. This
                 article provides a survey of the literature on MAC
                 protocols for WSNs. We first briefly describe the
                 unique features of WSNs. We then review representative
                 MAC protocols from the following four categories:
                 contention-based protocols, contention-free
                 (scheduled-based) protocols, hybrid protocols, and
                 preamble sampling protocols. Our discussions focus on
                 the background, main features, operation procedures,
                 major design issues, and the advantages and
                 disadvantages of these protocols. We also present an
                 analysis of the inherent and desirable features of the
                 protocols, and the key challenges of MAC technology for
                 WSNs. Finally, we present our view on future research
                 directions for WSN MAC protocols in a reader-friendly
                 way using illustrative diagrams.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hawe:2012:ABS,
  author =       "Glenn I. Hawe and Graham Coates and Duncan T. Wilson
                 and Roger S. Crouch",
  title =        "Agent-based simulation for large-scale emergency
                 response: a survey of usage and implementation",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "1",
  pages =        "8:1--8:51",
  month =        nov,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2379776.2379784",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 6 10:55:59 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "When attempting to determine how to respond optimally
                 to a large-scale emergency, the ability to predict the
                 consequences of certain courses of action in silico is
                 of great utility. Agent-based simulations (ABSs) have
                 become the de facto tool for this purpose; however,
                 they may be used and implemented in a variety of ways.
                 This article reviews existing implementations of ABSs
                 for large-scale emergency response, and presents a
                 taxonomy classifying them by usage. Opportunities for
                 improving ABS for large-scale emergency response are
                 identified.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Uthra:2012:QRW,
  author =       "R. Annie Uthra and S. V. Kasmir Raja",
  title =        "{QoS} routing in wireless sensor networks --- a
                 survey",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "1",
  pages =        "9:1--9:12",
  month =        nov,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2379776.2379785",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 6 10:55:59 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A wireless sensor network (WSN) is a one made up of
                 small sensing devices equipped with processors, memory,
                 and short-range wireless communication. Sensor nodes,
                 are autonomous nodes, which include smart dust sensors,
                 motes and so on. They co-operatively monitor physical
                 or environmental conditions and send the sensed data to
                 the sink node. They differ from traditional computer
                 networks due to resource constraints, unbalanced
                 mixture traffic, data redundancy, network dynamics, and
                 energy balance. These kinds of networks support a wide
                 range of applications that have strong requirements to
                 reduce end-to-end delay and losses during data
                 transmissions. When large numbers of sensors are
                 deployed in a sensor field and are active in
                 transmitting the data, there is a possibility of
                 congestion. Congestion may occur due to buffer
                 overflow, channel contention, packet collision, a high
                 data rate, many to one nature, and so on. This leads to
                 packet loss which causes a decrease in throughput and
                 lifetime. Maximum throughput, energy efficiency and
                 minimum error rate can be achieved by minimizing the
                 congestion. A number of quality of service (QoS)
                 techniques has been developed to improve the quality of
                 the network. This article gives an overview of existing
                 QoS techniques and a parametric comparison made with
                 recent developments. This article mainly concentrates
                 on network congestion in WSN environment.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mendes-Moreira:2012:EAR,
  author =       "Jo{\~a}o Mendes-Moreira and Carlos Soares and
                 Al{\'\i}pio M{\'a}rio Jorge and Jorge Freire De Sousa",
  title =        "Ensemble approaches for regression: a survey",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "1",
  pages =        "10:1--10:40",
  month =        nov,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2379776.2379786",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 6 10:55:59 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The goal of ensemble regression is to combine several
                 models in order to improve the prediction accuracy in
                 learning problems with a numerical target variable. The
                 process of ensemble learning can be divided into three
                 phases: the generation phase, the pruning phase, and
                 the integration phase. We discuss different approaches
                 to each of these phases that are able to deal with the
                 regression problem, categorizing them in terms of their
                 relevant characteristics and linking them to
                 contributions from different fields. Furthermore, this
                 work makes it possible to identify interesting areas
                 for future research.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Harman:2012:SBS,
  author =       "Mark Harman and S. Afshin Mansouri and Yuanyuan
                 Zhang",
  title =        "Search-based software engineering: Trends, techniques
                 and applications",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "1",
  pages =        "11:1--11:61",
  month =        nov,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2379776.2379787",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 6 10:55:59 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In the past five years there has been a dramatic
                 increase in work on Search-Based Software Engineering
                 (SBSE), an approach to Software Engineering (SE) in
                 which Search-Based Optimization (SBO) algorithms are
                 used to address problems in SE. SBSE has been applied
                 to problems throughout the SE lifecycle, from
                 requirements and project planning to maintenance and
                 reengineering. The approach is attractive because it
                 offers a suite of adaptive automated and semiautomated
                 solutions in situations typified by large complex
                 problem spaces with multiple competing and conflicting
                 objectives. This article$^1$ provides a review and
                 classification of literature on SBSE. The work
                 identifies research trends and relationships between
                 the techniques applied and the applications to which
                 they have been applied and highlights gaps in the
                 literature and avenues for further research.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Esling:2012:TSD,
  author =       "Philippe Esling and Carlos Agon",
  title =        "Time-series data mining",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "1",
  pages =        "12:1--12:34",
  month =        nov,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2379776.2379788",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 6 10:55:59 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In almost every scientific field, measurements are
                 performed over time. These observations lead to a
                 collection of organized data called time series. The
                 purpose of time-series data mining is to try to extract
                 all meaningful knowledge from the shape of data. Even
                 if humans have a natural capacity to perform these
                 tasks, it remains a complex problem for computers. In
                 this article we intend to provide a survey of the
                 techniques applied for time-series data mining. The
                 first part is devoted to an overview of the tasks that
                 have captured most of the interest of researchers.
                 Considering that in most cases, time-series task relies
                 on the same components for implementation, we divide
                 the literature depending on these common aspects,
                 namely representation techniques, distance measures,
                 and indexing methods. The study of the relevant
                 literature has been categorized for each individual
                 aspects. Four types of robustness could then be
                 formalized and any kind of distance could then be
                 classified. Finally, the study submits various research
                 trends and avenues that can be explored in the near
                 future. We hope that this article can provide a broad
                 and deep understanding of the time-series data mining
                 research field.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Faro:2013:EOS,
  author =       "Simone Faro and Thierry Lecroq",
  title =        "The exact online string matching problem: a review of
                 the most recent results",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "2",
  pages =        "13:1--13:42",
  month =        feb,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2431211.2431212",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 7 11:42:33 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  abstract =     "This article addresses the online exact string
                 matching problem which consists in finding all
                 occurrences of a given pattern $p$ in a text $t$. It is
                 an extensively studied problem in computer science,
                 mainly due to its direct applications to such diverse
                 areas as text, image and signal processing, speech
                 analysis and recognition, information retrieval, data
                 compression, computational biology and chemistry. In
                 the last decade more than 50 new algorithms have been
                 proposed for the problem, which add up to a wide set of
                 (almost 40) algorithms presented before 2000. In this
                 article we review the string matching algorithms
                 presented in the last decade and present experimental
                 results in order to bring order among the dozens of
                 articles published in this area.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kritikakou:2013:SAC,
  author =       "Angeliki Kritikakou and Francky Catthoor and Vasilios
                 Kelefouras and Costas Goutis",
  title =        "A systematic approach to classify design-time global
                 scheduling techniques",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "2",
  pages =        "14:1--14:30",
  month =        feb,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2431211.2431213",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 7 11:42:33 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The scheduling problem is an important partially
                 solved topic related to a wide range of scientific
                 fields. As it applies to design-time mapping on
                 multiprocessing platforms emphasizing on ordering in
                 time and assignment in place, significant improvements
                 can be achieved. To support this improvement, this
                 article presents a complete systematic classification
                 of the existing scheduling techniques solving this
                 problem in a (near-)optimal way. We show that the
                 proposed approach covers any global scheduling
                 technique, including also future ones. In our
                 systematic classification a technique may belong to one
                 primitive class or to a hybrid combination of such
                 classes. In the latter case the technique is
                 efficiently decomposed into more primitive components
                 each one belonging to a specific class. The systematic
                 classification assists in the in-depth understanding of
                 the diverse classes of techniques which is essential
                 for their further improvement. Their main
                 characteristics and structure, their similarities and
                 differences, and the interrelationships of the classes
                 are conceived. In this way, our classification provides
                 guidance for contributing in novel ways to the broad
                 domain of global scheduling techniques.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Attene:2013:PMR,
  author =       "Marco Attene and Marcel Campen and Leif Kobbelt",
  title =        "Polygon mesh repairing: an application perspective",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "2",
  pages =        "15:1--15:33",
  month =        feb,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2431211.2431214",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 7 11:42:33 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Nowadays, digital 3D models are in widespread and
                 ubiquitous use, and each specific application dealing
                 with 3D geometry has its own quality requirements that
                 restrict the class of acceptable and supported models.
                 This article analyzes typical defects that make a 3D
                 model unsuitable for key application contexts, and
                 surveys existing algorithms that process, repair, and
                 improve its structure, geometry, and topology to make
                 it appropriate to case-by-case requirements. The
                 analysis is focused on polygon meshes, which constitute
                 by far the most common 3D object representation. In
                 particular, this article provides a structured overview
                 of mesh repairing techniques from the point of view of
                 the application context. Different types of mesh
                 defects are classified according to the upstream
                 application that produced the mesh, whereas mesh
                 quality requirements are grouped by representative sets
                 of downstream applications where the mesh is to be
                 used. The numerous mesh repair methods that have been
                 proposed during the last two decades are analyzed and
                 classified in terms of their capabilities, properties,
                 and guarantees. Based on these classifications,
                 guidelines can be derived to support the identification
                 of repairing algorithms best-suited to bridge the
                 compatibility gap between the quality provided by the
                 upstream process and the quality required by the
                 downstream applications in a given geometry processing
                 scenario.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lomax:2013:SCS,
  author =       "Susan Lomax and Sunil Vadera",
  title =        "A survey of cost-sensitive decision tree induction
                 algorithms",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "2",
  pages =        "16:1--16:35",
  month =        feb,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2431211.2431215",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 7 11:42:33 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The past decade has seen a significant interest on the
                 problem of inducing decision trees that take account of
                 costs of misclassification and costs of acquiring the
                 features used for decision making. This survey
                 identifies over 50 algorithms including approaches that
                 are direct adaptations of accuracy-based methods, use
                 genetic algorithms, use anytime methods and utilize
                 boosting and bagging. The survey brings together these
                 different studies and novel approaches to
                 cost-sensitive decision tree learning, provides a
                 useful taxonomy, a historical timeline of how the field
                 has developed and should provide a useful reference
                 point for future research in this field.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pearce:2013:VIS,
  author =       "Michael Pearce and Sherali Zeadally and Ray Hunt",
  title =        "Virtualization: Issues, security threats, and
                 solutions",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "2",
  pages =        "17:1--17:39",
  month =        feb,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2431211.2431216",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 7 11:42:33 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Although system virtualization is not a new paradigm,
                 the way in which it is used in modern system
                 architectures provides a powerful platform for system
                 building, the advantages of which have only been
                 realized in recent years, as a result of the rapid
                 deployment of commodity hardware and software systems.
                 In principle, virtualization involves the use of an
                 encapsulating software layer (Hypervisor or Virtual
                 Machine Monitor) which surrounds or underlies an
                 operating system and provides the same inputs, outputs,
                 and behavior that would be expected from an actual
                 physical device. This abstraction means that an ideal
                 Virtual Machine Monitor provides an environment to the
                 software equivalent to the host system, but which is
                 decoupled from the hardware state. Because a virtual
                 machine is not dependent on the state of the physical
                 hardware, multiple virtual machines may be installed on
                 a single set of hardware. The decoupling of physical
                 and logical states gives virtualization inherent
                 security benefits. However, the design, implementation,
                 and deployment of virtualization technology have also
                 opened up novel threats and security issues which,
                 while not particular to system virtualization, take on
                 new forms in relation to it. Reverse engineering
                 becomes easier due to introspection capabilities, as
                 encryption keys, security algorithms, low-level
                 protection, intrusion detection, or antidebugging
                 measures can become more easily compromised.
                 Furthermore, associated technologies such as virtual
                 routing and networking can create challenging issues
                 for security, intrusion control, and associated
                 forensic processes. We explain the security
                 considerations and some associated methodologies by
                 which security breaches can occur, and offer
                 recommendations for how virtualized environments can
                 best be protected. Finally, we offer a set of
                 generalized recommendations that can be applied to
                 achieve secure virtualized implementations.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Acevedo-Mosqueda:2013:BAM,
  author =       "Maria Elena Acevedo-Mosqueda and Cornelio
                 Y{\'a}{\~n}ez-M{\'a}rquez and Marco Antonio
                 Acevedo-Mosqueda",
  title =        "{Bidirectional Associative Memories}: Different
                 approaches",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "2",
  pages =        "18:1--18:30",
  month =        feb,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2431211.2431217",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 7 11:42:33 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Bidirectional Associative Memories (BAM) are systems
                 that allow to associate pairs of patterns. Once a
                 memory has learned, patterns can be recalled in two
                 directions. BAMs have many applications in pattern
                 recognition and image processing. The aim of this
                 survey is to present several models of BAM throughout
                 time, since Kosko [1988] proposed the first model;
                 followed by those works based on or inspired by it,
                 trying to improve recall capacity; to some recent
                 one-shot models-such as Morphological BAM and
                 Alpha-Beta BAM-which are of particular interest, given
                 their superior performance.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mooney:2013:SPM,
  author =       "Carl H. Mooney and John F. Roddick",
  title =        "Sequential pattern mining --- approaches and
                 algorithms",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "2",
  pages =        "19:1--19:39",
  month =        feb,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2431211.2431218",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 7 11:42:33 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  abstract =     "Sequences of events, items, or tokens occurring in an
                 ordered metric space appear often in data and the
                 requirement to detect and analyze frequent subsequences
                 is a common problem. Sequential Pattern Mining arose as
                 a subfield of data mining to focus on this field. This
                 article surveys the approaches and algorithms proposed
                 to date.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Koskela:2013:PGM,
  author =       "Timo Koskela and Otso Kassinen and Erkki Harjula and
                 Mika Ylianttila",
  title =        "{P2P} group management systems: a conceptual
                 analysis",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "2",
  pages =        "20:1--20:25",
  month =        feb,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2431211.2431219",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 7 11:42:33 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Peer-to-Peer (P2P) networks are becoming eminent
                 platforms for both distributed computing and
                 interpersonal communication. Their role in contemporary
                 multimedia content delivery and communication systems
                 is strong, as witnessed by many popular applications
                 and services. Groups in P2P systems can originate from
                 the relations between humans, or they can be defined
                 with purely technical criteria such as proximity. In
                 this article, we present a conceptual analysis of P2P
                 group management systems. We illustrate how groups are
                 formed using different P2P system architectures, and
                 analyze the advantages and disadvantages of using each
                 P2P system architecture for implementing P2P group
                 management. The evaluation criteria in the analysis are
                 performance, robustness, fairness, suitability for
                 battery-powered devices, scalability, and security. The
                 outcome of the analysis facilitates the selection of an
                 appropriate P2P system architecture for implementing
                 P2P group management in both further research and
                 prototype development.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Saeedi:2013:SOR,
  author =       "Mehdi Saeedi and Igor L. Markov",
  title =        "Synthesis and optimization of reversible circuits ---
                 a survey",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "2",
  pages =        "21:1--21:34",
  month =        feb,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2431211.2431220",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 7 11:42:33 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Reversible logic circuits have been historically
                 motivated by theoretical research in low-power
                 electronics as well as practical improvement of bit
                 manipulation transforms in cryptography and computer
                 graphics. Recently, reversible circuits have attracted
                 interest as components of quantum algorithms, as well
                 as in photonic and nano-computing technologies where
                 some switching devices offer no signal gain. Research
                 in generating reversible logic distinguishes between
                 circuit synthesis, postsynthesis optimization, and
                 technology mapping. In this survey, we review
                 algorithmic paradigms-search based, cycle based,
                 transformation based, and BDD based-as well as specific
                 algorithms for reversible synthesis, both exact and
                 heuristic. We conclude the survey by outlining key open
                 challenges in synthesis of reversible and quantum
                 logic, as well as most common misconceptions.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Abaza:2013:SEB,
  author =       "Ayman Abaza and Arun Ross and Christina Hebert and
                 Mary Ann F. Harrison and Mark S. Nixon",
  title =        "A survey on ear biometrics",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "2",
  pages =        "22:1--22:35",
  month =        feb,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2431211.2431221",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 7 11:42:33 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Recognizing people by their ear has recently received
                 significant attention in the literature. Several
                 reasons account for this trend: first, ear recognition
                 does not suffer from some problems associated with
                 other non-contact biometrics, such as face recognition;
                 second, it is the most promising candidate for
                 combination with the face in the context of multi-pose
                 face recognition; and third, the ear can be used for
                 human recognition in surveillance videos where the face
                 may be occluded completely or in part. Further, the ear
                 appears to degrade little with age. Even though current
                 ear detection and recognition systems have reached a
                 certain level of maturity, their success is limited to
                 controlled indoor conditions. In addition to variation
                 in illumination, other open research problems include
                 hair occlusion, earprint forensics, ear symmetry, ear
                 classification, and ear individuality. This article
                 provides a detailed survey of research conducted in ear
                 detection and recognition. It provides an up-to-date
                 review of the existing literature revealing the current
                 state-of-art for not only those who are working in this
                 area but also for those who might exploit this new
                 approach. Furthermore, it offers insights into some
                 unsolved ear recognition problems as well as ear
                 databases available for researchers.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Parvez:2013:OAH,
  author =       "Mohammad Tanvir Parvez and Sabri A. Mahmoud",
  title =        "Offline {Arabic} handwritten text recognition: a
                 survey",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "2",
  pages =        "23:1--23:35",
  month =        feb,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2431211.2431222",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 7 11:42:33 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/spell.bib",
  abstract =     "Research in offline Arabic handwriting recognition has
                 increased considerably in the past few years. This is
                 evident from the numerous research results published
                 recently in major journals and conferences in the area
                 of handwriting recognition. Features and
                 classifications techniques utilized in recent research
                 work have diversified noticeably compared to the past.
                 Moreover, more efforts have been diverted, in last few
                 years, to construct different databases for Arabic
                 handwriting recognition. This article provides a
                 comprehensive survey of recent developments in Arabic
                 handwriting recognition. The article starts with a
                 summary of the characteristics of Arabic text, followed
                 by a general model for an Arabic text recognition
                 system. Then the used databases for Arabic text
                 recognition are discussed. Research works on
                 preprocessing phase, like text representation, baseline
                 detection, line, word, character, and subcharacter
                 segmentation algorithms, are presented. Different
                 feature extraction techniques used in Arabic
                 handwriting recognition are identified and discussed.
                 Different classification approaches, like HMM, ANN,
                 SVM, k-NN, syntactical methods, etc., are discussed in
                 the context of Arabic handwriting recognition. Works on
                 Arabic lexicon construction and spell checking are
                 presented in the postprocessing phase. Several summary
                 tables of published research work are provided for used
                 Arabic text databases and reported results on Arabic
                 character, word, numerals, and text recognition. These
                 tables summarize the features, classifiers, data, and
                 reported recognition accuracy for each technique.
                 Finally, we discuss some future research directions in
                 Arabic handwriting recognition.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Suomela:2013:SLA,
  author =       "Jukka Suomela",
  title =        "Survey of local algorithms",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "2",
  pages =        "24:1--24:40",
  month =        feb,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2431211.2431223",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 7 11:42:33 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A local algorithm is a distributed algorithm that runs
                 in constant time, independently of the size of the
                 network. Being highly scalable and fault tolerant, such
                 algorithms are ideal in the operation of large-scale
                 distributed systems. Furthermore, even though the model
                 of local algorithms is very limited, in recent years we
                 have seen many positive results for nontrivial
                 problems. This work surveys the state-of-the-art in the
                 field, covering impossibility results, deterministic
                 local algorithms, randomized local algorithms, and
                 local algorithms for geometric graphs.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Manshaei:2013:GTM,
  author =       "Mohammad Hossein Manshaei and Quanyan Zhu and Tansu
                 Alpcan and Tamer Bacsar and Jean-Pierre Hubaux",
  title =        "Game theory meets network security and privacy",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "25:1--25:39",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480742",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This survey provides a structured and comprehensive
                 overview of research on security and privacy in
                 computer and communication networks that use
                 game-theoretic approaches. We present a selected set of
                 works to highlight the application of game theory in
                 addressing different forms of security and privacy
                 problems in computer networks and mobile applications.
                 We organize the presented works in six main categories:
                 security of the physical and MAC layers, security of
                 self-organizing networks, intrusion detection systems,
                 anonymity and privacy, economics of network security,
                 and cryptography. In each category, we identify
                 security problems, players, and game models. We
                 summarize the main results of selected works, such as
                 equilibrium analysis and security mechanism designs. In
                 addition, we provide a discussion on the advantages,
                 drawbacks, and future direction of using game theory in
                 this field. In this survey, our goal is to instill in
                 the reader an enhanced understanding of different
                 research approaches in applying game-theoretic methods
                 to network security. This survey can also help
                 researchers from various fields develop game-theoretic
                 solutions to current and emerging security problems in
                 computer networking.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Stanier:2013:IRI,
  author =       "James Stanier and Des Watson",
  title =        "Intermediate representations in imperative compilers:
                 a survey",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "26:1--26:27",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480743",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Compilers commonly translate an input program into an
                 intermediate representation (IR) before optimizing it
                 and generating code. Over time there have been a number
                 of different approaches to designing and implementing
                 IRs. Different IRs have varying benefits and drawbacks.
                 In this survey, we highlight key developments in the
                 area of IR for imperative compilers, group them by a
                 taxonomy and timeline, and comment on the divide
                 between academic research and real-world compiler
                 technology. We conclude that mainstream compilers,
                 especially in the multicore era, could benefit from
                 further IR innovations.",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hoseini-Tabatabaei:2013:SSB,
  author =       "Seyed Amir Hoseini-Tabatabaei and Alexander Gluhak and
                 Rahim Tafazolli",
  title =        "A survey on smartphone-based systems for opportunistic
                 user context recognition",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "27:1--27:51",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480744",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The ever-growing computation and storage capability of
                 mobile phones have given rise to mobile-centric context
                 recognition systems, which are able to sense and
                 analyze the context of the carrier so as to provide an
                 appropriate level of service. As nonintrusive
                 autonomous sensing and context recognition are
                 desirable characteristics of a personal sensing system;
                 efforts have been made to develop opportunistic sensing
                 techniques on mobile phones. The resulting combination
                 of these approaches has ushered in a new realm of
                 applications, namely opportunistic user context
                 recognition with mobile phones. This article surveys
                 the existing research and approaches towards
                 realization of such systems. In doing so, the typical
                 architecture of a mobile-centric user context
                 recognition system as a sequential process of sensing,
                 preprocessing, and context recognition phases is
                 introduced. The main techniques used for the
                 realization of the respective processes during these
                 phases are described, and their strengths and
                 limitations are highlighted. In addition, lessons
                 learned from previous approaches are presented as
                 motivation for future research. Finally, several open
                 challenges are discussed as possible ways to extend the
                 capabilities of current systems and improve their
                 real-world experience.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Colombo:2013:RWL,
  author =       "Christian Colombo and Gordon J. Pace",
  title =        "Recovery within long-running transactions",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "28:1--28:35",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480745",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "As computer systems continue to grow in complexity,
                 the possibility of failure increases. At the same time,
                 the increase in computer system pervasiveness in
                 day-to-day activities bring along increased
                 expectations on their reliability. This has led to the
                 need for effective and automatic error-recovery
                 techniques to resolve failures. Transactions enable the
                 handling of failure propagation over concurrent systems
                 due to dependencies, restoring the system to the point
                 before the failure occurred. However, in various
                 settings, especially when interacting with the real
                 world, reversal is not possible. The notion of
                 compensations has been long advocated as a way of
                 addressing this issue, through the specification of
                 activities which can be executed to undo partial
                 transactions. Still, there is no accepted standard
                 theory; the literature offers a plethora of distinct
                 formalisms and approaches. In this survey, we review
                 the compensations from a theoretical point of view by
                 (i) giving a historic account of the evolution of
                 compensating transactions; (ii) delineating and
                 describing a number of design options involved; (iii)
                 presenting a number of formalisms found in the
                 literature, exposing similarities and differences; (iv)
                 comparing formal notions of compensation correctness;
                 (v) giving insights regarding the application of
                 compensations in practice; and (vi) discussing current
                 and future research trends in the area.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zilberberg:2013:PCM,
  author =       "Omer Zilberberg and Shlomo Weiss and Sivan Toledo",
  title =        "Phase-change memory: an architectural perspective",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "29:1--29:33",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480746",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article surveys the current state of phase-change
                 memory (PCM) as a nonvolatile memory technology set to
                 replace flash and DRAM in modern computerized systems.
                 It has been researched and developed in the last
                 decade, with researchers providing better architectural
                 designs which address the technology's main
                 challenges-its limited write endurance, potential long
                 latency, high energy writes, power dissipation, and
                 some concerns for memory privacy. Some physical
                 properties of the technology are also discussed,
                 providing a basis for architectural discussions. Also
                 briefly shown are other architectural alternatives,
                 such as FeRAM and MRAM. The designs surveyed in this
                 article include read before write, wear leveling, write
                 cancellation, write pausing, some encryption schemes,
                 and buffer organizations. These allow PCM to stand on
                 its own as a replacement for DRAM as main memory.
                 Designs for hybrid memory systems with both PCM and
                 DRAM are also shown and some designs for SSDs
                 incorporating PCM.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gomes:2013:DCP,
  author =       "Jo{\~a}o V. Gomes and Pedro R. M. In{\'a}cio and
                 Manuela Pereira and M{\'a}rio M. Freire and Paulo P.
                 Monteiro",
  title =        "Detection and classification of peer-to-peer traffic:
                 a survey",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "30:1--30:40",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480747",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The emergence of new Internet paradigms has changed
                 the common properties of network data, increasing the
                 bandwidth consumption and balancing traffic in both
                 directions. These facts raise important challenges,
                 making it necessary to devise effective solutions for
                 managing network traffic. Since traditional methods are
                 rather ineffective and easily bypassed, particular
                 attention has been paid to the development of new
                 approaches for traffic classification. This article
                 surveys the studies on peer-to-peer traffic detection
                 and classification, making an extended review of the
                 literature. Furthermore, it provides a comprehensive
                 analysis of the concepts and strategies for network
                 monitoring.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Serban:2013:SIA,
  author =       "Floarea Serban and Joaquin Vanschoren and J{\"o}rg-Uwe
                 Kietz and Abraham Bernstein",
  title =        "A survey of intelligent assistants for data analysis",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "31:1--31:35",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480748",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Research and industry increasingly make use of large
                 amounts of data to guide decision-making. To do this,
                 however, data needs to be analyzed in typically
                 nontrivial refinement processes, which require
                 technical expertise about methods and algorithms,
                 experience with how a precise analysis should proceed,
                 and knowledge about an exploding number of analytic
                 approaches. To alleviate these problems, a plethora of
                 different systems have been proposed that
                 ``intelligently'' help users to analyze their data.
                 This article provides a first survey to almost 30 years
                 of research on intelligent discovery assistants (IDAs).
                 It explicates the types of help IDAs can provide to
                 users and the kinds of (background) knowledge they
                 leverage to provide this help. Furthermore, it provides
                 an overview of the systems developed over the past
                 years, identifies their most important features, and
                 sketches an ideal future IDA as well as the challenges
                 on the road ahead.",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zang:2013:SCT,
  author =       "Wei Zang and Ann Gordon-Ross",
  title =        "A survey on cache tuning from a power\slash energy
                 perspective",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "32:1--32:49",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480749",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Low power and/or energy consumption is a requirement
                 not only in embedded systems that run on batteries or
                 have limited cooling capabilities, but also in desktop
                 and mainframes where chips require costly cooling
                 techniques. Since the cache subsystem is typically the
                 most power/energy-consuming subsystem, caches are good
                 candidates for power/energy optimizations, and
                 therefore, cache tuning techniques are widely
                 researched. This survey focuses on state-of-the-art
                 offline static and online dynamic cache tuning
                 techniques and summarizes the techniques' attributes,
                 major challenges, and potential research trends to
                 inspire novel ideas and future research avenues.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bostoen:2013:PRT,
  author =       "Tom Bostoen and Sape Mullender and Yolande Berbers",
  title =        "Power-reduction techniques for data-center storage
                 systems",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "33:1--33:38",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480750",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "As data-intensive, network-based applications
                 proliferate, the power consumed by the data-center
                 storage subsystem surges. This survey summarizes,
                 organizes, and integrates a decade of research on
                 power-aware enterprise storage systems. All of the
                 existing power-reduction techniques are classified
                 according to the disk-power factor and storage-stack
                 layer addressed. A majority of power-reduction
                 techniques is based on dynamic power management. We
                 also consider alternative methods that reduce disk
                 access time, conserve space, or exploit
                 energy-efficient storage hardware. For every
                 energy-conservation technique, the fundamental
                 trade-offs between power, capacity, performance, and
                 dependability are uncovered. With this survey, we
                 intend to stimulate integration of different
                 power-reduction techniques in new energy-efficient file
                 and storage systems.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dionisio:2013:VWM,
  author =       "John David N. Dionisio and William G. {Burns III} and
                 Richard Gilbert",
  title =        "{$3$D} Virtual worlds and the metaverse: {Current}
                 status and future possibilities",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "34:1--34:38",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480751",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Moving from a set of independent virtual worlds to an
                 integrated network of 3D virtual worlds or Metaverse
                 rests on progress in four areas: immersive realism,
                 ubiquity of access and identity, interoperability, and
                 scalability. For each area, the current status and
                 needed developments in order to achieve a functional
                 Metaverse are described. Factors that support the
                 formation of a viable Metaverse, such as institutional
                 and popular interest and ongoing improvements in
                 hardware performance, and factors that constrain the
                 achievement of this goal, including limits in
                 computational methods and unrealized collaboration
                 among virtual world stakeholders and developers, are
                 also considered.",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Crepinsek:2013:EEE,
  author =       "Matej Crepinsek and Shih-Hsi Liu and Marjan Mernik",
  title =        "Exploration and exploitation in evolutionary
                 algorithms: a survey",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "35:1--35:33",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480752",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "``Exploration and exploitation are the two
                 cornerstones of problem solving by search.'' For more
                 than a decade, Eiben and Schippers' advocacy for
                 balancing between these two antagonistic cornerstones
                 still greatly influences the research directions of
                 evolutionary algorithms (EAs) [1998]. This article
                 revisits nearly 100 existing works and surveys how such
                 works have answered the advocacy. The article
                 introduces a fresh treatment that classifies and
                 discusses existing work within three rational aspects:
                 (1) what and how EA components contribute to
                 exploration and exploitation; (2) when and how
                 exploration and exploitation are controlled; and (3)
                 how balance between exploration and exploitation is
                 achieved. With a more comprehensive and systematic
                 understanding of exploration and exploitation, more
                 research in this direction may be motivated and
                 refined.",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{SilvaGalvaoDeCarvalho:2013:SAL,
  author =       "Leandro {Silva Galv{\~a}o De Carvalho} and Edjair {De
                 Souza Mota}",
  title =        "Survey on application-layer mechanisms for speech
                 quality adaptation in {VoIP}",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "36:1--36:31",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480753",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "VoIP calls are sensitive to several impairments, such
                 as delay and packet loss. One way to overcome these
                 problems is by adaptively adjusting application-layer
                 parameters to keep a minimum speech quality level. At
                 the heart of self-adaptive systems lies a feedback
                 loop, which consists of four key activities:
                 monitoring, analysis, planning, and execution.
                 Nevertheless, the existing adaptive approaches to QoS
                 control of VoIP do not explicitly exhibit this feedback
                 loop. Bringing it to surface can help developers in
                 designing more robust and human-independent VoIP
                 systems. This survey presents a comprehensive review of
                 the current state-of-the-art research on speech quality
                 adaptation of VoIP systems at the application layer and
                 some research challenges on this subject.",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Grehant:2013:STM,
  author =       "Xavier Grehant and Isabelle Demeure and Sverre Jarp",
  title =        "A survey of task mapping on production grids",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "37:1--37:25",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480754",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Grids designed for computationally demanding
                 scientific applications started experimental phases ten
                 years ago and have been continuously delivering
                 computing power to a wide range of applications for
                 more than half of this time. The observation of their
                 emergence and evolution reveals actual constraints and
                 successful approaches to task mapping across
                 administrative boundaries. Beyond differences in
                 distributions, services, protocols, and standards, a
                 common architecture is outlined. Application-agnostic
                 infrastructures built for resource registration,
                 identification, and access control dispatch delegation
                 to grid sites. Efficient task mapping is managed by
                 large, autonomous applications or collaborations that
                 temporarily infiltrate resources for their own
                 benefits.",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kiasari:2013:MFP,
  author =       "Abbas Eslami Kiasari and Axel Jantsch and Zhonghai
                 Lu",
  title =        "Mathematical formalisms for performance evaluation of
                 networks-on-chip",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "38:1--38:41",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480755",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article reviews four popular mathematical
                 formalisms- queueing theory, network calculus,
                 schedulability analysis, and dataflow analysis -and how
                 they have been applied to the analysis of on-chip
                 communication performance in Systems-on-Chip. The
                 article discusses the basic concepts and results of
                 each formalism and provides examples of how they have
                 been used in Networks-on-Chip (NoCs) performance
                 analysis. Also, the respective strengths and weaknesses
                 of each technique and its suitability for a specific
                 purpose are investigated. An open research issue is a
                 unified analytical model for a comprehensive
                 performance evaluation of NoCs. To this end, this
                 article reviews the attempts that have been made to
                 bridge these formalisms.",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Newell:2013:PCD,
  author =       "Andrew Newell and Jing Dong and Cristina Nita-Rotaru",
  title =        "On the practicality of cryptographic defences against
                 pollution attacks in wireless network coding",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "39:1--39:26",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480756",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Numerous practical systems based on network coding
                 have been proposed in recent years demonstrating the
                 wide range of benefits of network coding, such as
                 increased throughput, reliability, and energy
                 efficiency. However, network coding systems are
                 inherently vulnerable to a severe attack, known as
                 packet pollution, which presents a key obstacle to the
                 deployment of such systems. Several cryptographic
                 schemes have been proposed to defend against pollution
                 attacks. We conduct a detailed analysis and an
                 experimental evaluation in a realistic wireless network
                 coding setting of a set of representative cryptographic
                 defenses against pollution attacks. Our analysis
                 identifies severe limitations of asymmetric-based
                 schemes, which impose high communication overhead by
                 placing constraints on the basic network coding
                 parameters and high computation overhead by relying on
                 numerous operations over large fields. Our analysis
                 also shows that symmetric cryptographic schemes, while
                 having better performance than asymmetric
                 cryptographic-based schemes, impose prohibitive
                 overhead in the presence of multiple byzantine
                 adversaries. We further evaluate these schemes by using
                 a set of typical network coding system parameters on a
                 realistic topology. Our experimental evaluation shows
                 that all the schemes we compare induce a throughput
                 degradation that negates the performance benefits of
                 network coding in the presence of multiple colluding
                 adversaries.",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pek:2013:SSI,
  author =       "G{\'a}bor P{\'e}k and Levente Butty'an and
                 Boldizs{\'a}r Bencs{\'a}th",
  title =        "A survey of security issues in hardware
                 virtualization",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "40:1--40:34",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480757",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Virtualization is a powerful technology for increasing
                 the efficiency of computing services; however, besides
                 its advantages, it also raises a number of security
                 issues. In this article, we provide a thorough survey
                 of those security issues in hardware virtualization. We
                 focus on potential vulnerabilities and existing attacks
                 on various virtualization platforms, but we also
                 briefly sketch some possible countermeasures. To the
                 best of our knowledge, this is the first survey of
                 security issues in hardware virtualization with this
                 level of details. Moreover, the adversary model and the
                 structuring of the attack vectors are original
                 contributions, never published before.",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bossuet:2013:AFS,
  author =       "Lilian Bossuet and Michael Grand and Lubos Gaspar and
                 Viktor Fischer and Guy Gogniat",
  title =        "Architectures of flexible symmetric key crypto engines
                 --- a survey: From hardware coprocessor to
                 multi-crypto-processor system on chip",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "41:1--41:32",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501655",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Throughput, flexibility, and security form the design
                 trilogy of reconfigurable crypto engines; they must be
                 carefully considered without reducing the major role of
                 classical design constraints, such as surface, power
                 consumption, dependability, and cost. Applications such
                 as network security, Virtual Private Networks (VPN),
                 Digital Rights Management (DRM), and pay per view have
                 drawn attention to these three constraints. For more
                 than ten years, many studies in the field of
                 cryptographic engineering have focused on the design of
                 optimized high-throughput hardware cryptographic cores
                 (e.g., symmetric and asymmetric key block ciphers,
                 stream ciphers, and hash functions). The flexibility of
                 cryptographic systems plays a very important role in
                 their practical application. Reconfigurable hardware
                 systems can evolve with algorithms, face up to new
                 types of attacks, and guarantee interoperability
                 between countries and institutions. The flexibility of
                 reconfigurable crypto processors and crypto
                 coprocessors has reached new levels with the emergence
                 of dynamically reconfigurable hardware architectures
                 and tools. Last but not least, the security of systems
                 that handle confidential information needs to be
                 thoroughly evaluated at the design stage in order to
                 meet security objectives that depend on the importance
                 of the information to be protected and on the cost of
                 protection. Usually, designers tackle security problems
                 at the same time as other design constraints and in
                 many cases target only one security objective, for
                 example, a side-channel attack countermeasures, fault
                 tolerance capability, or the monitoring of the device
                 environment. Only a few authors have addressed all
                 three design constraints at the same time. In
                 particular, key management security (e.g., secure key
                 generation and transmission, the use of a hierarchical
                 key structure composed of session keys and master keys)
                 has frequently been neglected to the benefit of
                 performance and/or flexibility. Nevertheless, a few
                 authors propose original processor architectures based
                 on multi-crypto-processor structures and reconfigurable
                 cryptographic arrays. In this article, we review
                 published works on symmetric key crypto engines and
                 present current trends and design challenges.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Parent:2013:STM,
  author =       "Christine Parent and Stefano Spaccapietra and Chiara
                 Renso and Gennady Andrienko and Natalia Andrienko and
                 Vania Bogorny and Maria Luisa Damiani and Aris
                 Gkoulalas-Divanis and Jose Macedo and Nikos Pelekis and
                 Yannis Theodoridis and Zhixian Yan",
  title =        "Semantic trajectories modeling and analysis",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "42:1--42:32",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501656",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Focus on movement data has increased as a consequence
                 of the larger availability of such data due to current
                 GPS, GSM, RFID, and sensors techniques. In parallel,
                 interest in movement has shifted from raw movement data
                 analysis to more application-oriented ways of analyzing
                 segments of movement suitable for the specific purposes
                 of the application. This trend has promoted
                 semantically rich trajectories, rather than raw
                 movement, as the core object of interest in mobility
                 studies. This survey provides the definitions of the
                 basic concepts about mobility data, an analysis of the
                 issues in mobility data management, and a survey of the
                 approaches and techniques for: (i) constructing
                 trajectories from movement tracks, (ii) enriching
                 trajectories with semantic information to enable the
                 desired interpretations of movements, and (iii) using
                 data mining to analyze semantic trajectories and
                 extract knowledge about their characteristics, in
                 particular the behavioral patterns of the moving
                 objects. Last but not least, the article surveys the
                 new privacy issues that arise due to the semantic
                 aspects of trajectories.",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Xie:2013:OCD,
  author =       "Jierui Xie and Stephen Kelley and Boleslaw K.
                 Szymanski",
  title =        "Overlapping community detection in networks: The
                 state-of-the-art and comparative study",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "43:1--43:35",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501657",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article reviews the state-of-the-art in
                 overlapping community detection algorithms, quality
                 measures, and benchmarks. A thorough comparison of
                 different algorithms (a total of fourteen) is provided.
                 In addition to community-level evaluation, we propose a
                 framework for evaluating algorithms' ability to detect
                 overlapping nodes, which helps to assess overdetection
                 and underdetection. After considering community-level
                 detection performance measured by normalized mutual
                 information, the Omega index, and node-level detection
                 performance measured by F-score, we reached the
                 following conclusions. For low overlapping density
                 networks, SLPA, OSLOM, Game, and COPRA offer better
                 performance than the other tested algorithms. For
                 networks with high overlapping density and high
                 overlapping diversity, both SLPA and Game provide
                 relatively stable performance. However, test results
                 also suggest that the detection in such networks is
                 still not yet fully resolved. A common feature observed
                 by various algorithms in real-world networks is the
                 relatively small fraction of overlapping nodes
                 (typically less than 30\%), each of which belongs to
                 only 2 or 3 communities.",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Liu:2013:NDV,
  author =       "Jiajun Liu and Zi Huang and Hongyun Cai and Heng Tao
                 Shen and Chong Wah Ngo and Wei Wang",
  title =        "Near-duplicate video retrieval: Current research and
                 future trends",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "44:1--44:23",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501658",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The exponential growth of online videos, along with
                 increasing user involvement in video-related
                 activities, has been observed as a constant phenomenon
                 during the last decade. User's time spent on video
                 capturing, editing, uploading, searching, and viewing
                 has boosted to an unprecedented level. The massive
                 publishing and sharing of videos has given rise to the
                 existence of an already large amount of near-duplicate
                 content. This imposes urgent demands on near-duplicate
                 video retrieval as a key role in novel tasks such as
                 video search, video copyright protection, video
                 recommendation, and many more. Driven by its
                 significance, near-duplicate video retrieval has
                 recently attracted a lot of attention. As discovered in
                 recent works, latest improvements and progress in
                 near-duplicate video retrieval, as well as related
                 topics including low-level feature extraction,
                 signature generation, and high-dimensional indexing,
                 are employed to assist the process. As we survey the
                 works in near-duplicate video retrieval, we
                 comparatively investigate existing variants of the
                 definition of near-duplicate video, describe a generic
                 framework, summarize state-of-the-art practices, and
                 explore the emerging trends in this research topic.",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rodriguez-Gomez:2013:STB,
  author =       "Rafael A. Rodr{\'\i}guez-G{\'o}mez and Gabriel
                 Maci{\'a}-Fern{\'a}ndez and Pedro Garc{\'\i}a-Teodoro",
  title =        "Survey and taxonomy of botnet research through
                 life-cycle",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "45:1--45:33",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501659",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Of all current threats to cybersecurity, botnets are
                 at the top of the list. In consequence, interest in
                 this problem is increasing rapidly among the research
                 community and the number of publications on the
                 question has grown exponentially in recent years. This
                 article proposes a taxonomy of botnet research and
                 presents a survey of the field to provide a
                 comprehensive overview of all these contributions.
                 Furthermore, we hope to provide researchers with a
                 clear perspective of the gaps that remain to be filled
                 in our defenses against botnets. The taxonomy is based
                 upon the botnet's life-cycle, defined as the sequence
                 of stages a botnet needs to pass through in order to
                 reach its goal. This approach allows us to consider the
                 problem of botnets from a global perspective, which
                 constitutes a key difference from other taxonomies that
                 have been proposed. Under this novel taxonomy, we
                 conclude that all attempts to defeat botnets should be
                 focused on one or more stages of this life-cycle. In
                 fact, the sustained hindering of any of the stages
                 makes it possible to thwart a botnet's progress and
                 thus render it useless. We test the potential
                 capabilities of our taxonomy by means of a survey of
                 current botnet research, and find it genuinely useful
                 in understanding the focus of the different
                 contributions in this field.",
  acknowledgement = ack-nhfb,
  articleno =    "45",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Basu:2013:SPP,
  author =       "Anirban Basu and Simon Fleming and James Stanier and
                 Stephen Naicken and Ian Wakeman and Vijay K. Gurbani",
  title =        "The state of peer-to-peer network simulators",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "46:1--46:25",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501660",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Networking research often relies on simulation in
                 order to test and evaluate new ideas. An important
                 requirement of this process is that results must be
                 reproducible so that other researchers can replicate,
                 validate, and extend existing work. We look at the
                 landscape of simulators for research in peer-to-peer
                 (P2P) networks by conducting a survey of a combined
                 total of over 280 papers from before and after 2007
                 (the year of the last survey in this area), and comment
                 on the large quantity of research using bespoke,
                 closed-source simulators. We propose a set of criteria
                 that P2P simulators should meet, and poll the P2P
                 research community for their agreement. We aim to drive
                 the community towards performing their experiments on
                 simulators that allow for others to validate their
                 results.",
  acknowledgement = ack-nhfb,
  articleno =    "46",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sherchan:2013:STS,
  author =       "Wanita Sherchan and Surya Nepal and Cecile Paris",
  title =        "A survey of trust in social networks",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "47:1--47:33",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501661",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Web-based social networks have become popular as a
                 medium for disseminating information and connecting
                 like-minded people. The public accessibility of such
                 networks with the ability to share opinions, thoughts,
                 information, and experience offers great promise to
                 enterprises and governments. In addition to individuals
                 using such networks to connect to their friends and
                 families, governments and enterprises have started
                 exploiting these platforms for delivering their
                 services to citizens and customers. However, the
                 success of such attempts relies on the level of trust
                 that members have with each other as well as with the
                 service provider. Therefore, trust becomes an essential
                 and important element of a successful social network.
                 In this article, we present the first comprehensive
                 review of social and computer science literature on
                 trust in social networks. We first review the existing
                 definitions of trust and define social trust in the
                 context of social networks. We then discuss recent
                 works addressing three aspects of social trust: trust
                 information collection, trust evaluation, and trust
                 dissemination. Finally, we compare and contrast the
                 literature and identify areas for further research in
                 social trust.",
  acknowledgement = ack-nhfb,
  articleno =    "47",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kalayappan:2013:SCA,
  author =       "Rajshekar Kalayappan and Smruti R. Sarangi",
  title =        "A survey of checker architectures",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "48:1--48:34",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501662",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Reliability is quickly becoming a primary design
                 constraint for high-end processors because of the
                 inherent limits of manufacturability, extreme
                 miniaturization of transistors, and the growing
                 complexity of large multicore chips. To achieve a high
                 degree of fault tolerance, we need to detect faults
                 quickly and try to rectify them. In this article, we
                 focus on the former aspect. We present a survey of
                 different kinds of fault detection mechanisms for
                 processors at circuit, architecture, and software
                 level. We collectively refer to such mechanisms as
                 checker architectures. First, we propose a novel
                 two-level taxonomy for different classes of checkers
                 based on their structure and functionality.
                 Subsequently, for each class we present the ideas in
                 some of the seminal papers that have defined the
                 direction of the area along with important extensions
                 published in later work.",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chang:2013:ADA,
  author =       "Jian Chang and Krishna K. Venkatasubramanian and
                 Andrew G. West and Insup Lee",
  title =        "Analyzing and defending against {Web}-based malware",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "49:1--49:35",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501663",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Web-based malware is a growing threat to today's
                 Internet security. Attacks of this type are prevalent
                 and lead to serious security consequences. Millions of
                 malicious URLs are used as distribution channels to
                 propagate malware all over the Web. After being
                 infected, victim systems fall in the control of
                 attackers, who can utilize them for various cyber
                 crimes such as stealing credentials, spamming, and
                 distributed denial-of-service attacks. Moreover, it has
                 been observed that traditional security technologies
                 such as firewalls and intrusion detection systems have
                 only limited capability to mitigate this new problem.
                 In this article, we survey the state-of-the-art
                 research regarding the analysis of-and defense
                 against-Web-based malware attacks. First, we study the
                 attack model, the root cause, and the vulnerabilities
                 that enable these attacks. Second, we analyze the
                 status quo of the Web-based malware problem. Third,
                 three categories of defense mechanisms are discussed in
                 detail: (1) building honeypots with virtual machines or
                 signature-based detection system to discover existing
                 threats; (2) using code analysis and testing techniques
                 to identify the vulnerabilities of Web applications;
                 and (3) constructing reputation-based blacklists or
                 smart sandbox systems to protect end-users from
                 attacks. We show that these three categories of
                 approaches form an extensive solution space to the
                 Web-based malware problem. Finally, we compare the
                 surveyed approaches and discuss possible future
                 research directions.",
  acknowledgement = ack-nhfb,
  articleno =    "49",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Benoit:2013:SPW,
  author =       "Anne Benoit and {\"U}mit V. {\c{C}}ataly{\"u}rek and
                 Yves Robert and Erik Saule",
  title =        "A survey of pipelined workflow scheduling: {Models}
                 and algorithms",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "50:1--50:36",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501664",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A large class of applications need to execute the same
                 workflow on different datasets of identical size.
                 Efficient execution of such applications necessitates
                 intelligent distribution of the application components
                 and tasks on a parallel machine, and the execution can
                 be orchestrated by utilizing task, data, pipelined,
                 and/or replicated parallelism. The scheduling problem
                 that encompasses all of these techniques is called
                 pipelined workflow scheduling, and it has been widely
                 studied in the last decade. Multiple models and
                 algorithms have flourished to tackle various
                 programming paradigms, constraints, machine behaviors,
                 or optimization goals. This article surveys the field
                 by summing up and structuring known results and
                 approaches.",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hubaux:2013:SCF,
  author =       "Arnaud Hubaux and Thein Than Tun and Patrick Heymans",
  title =        "Separation of concerns in feature diagram languages: a
                 systematic survey",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "51:1--51:23",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501665",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The need for flexible customization of large
                 feature-rich software systems, according to
                 requirements of various stakeholders, has become an
                 important problem in software development. Among the
                 many software engineering approaches dealing with
                 variability management, the notion of Software Product
                 Line (SPL) has emerged as a major unifying concept.
                 Drawing from established disciplines of manufacturing,
                 SPL approaches aim to design repertoires of software
                 artifacts, from which customized software systems for
                 specific stakeholder requirements can be developed. A
                 major difficulty SPL approaches attempt to address is
                 the modularization of software artifacts, which
                 reconciles the user's needs for certain features and
                 the development and technical constraints. Towards this
                 end, many SPL approaches use feature diagrams to
                 describe possible configurations of a feature set.
                 There have been several proposals for feature diagram
                 languages with varying degrees of expressiveness,
                 intuitiveness, and precision. However, these feature
                 diagram languages have limited scalability when applied
                 to realistic software systems. This article provides a
                 systematic survey of various concerns of feature
                 diagrams and ways in which concerns have been
                 separated. The survey shows how the uncertainty in the
                 purpose of feature diagram languages creates both
                 conceptual and practical limitations to scalability of
                 those languages.",
  acknowledgement = ack-nhfb,
  articleno =    "51",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bainomugisha:2013:SRP,
  author =       "Engineer Bainomugisha and Andoni Lombide Carreton and
                 Tom van Cutsem and Stijn Mostinckx and Wolfgang de
                 Meuter",
  title =        "A survey on reactive programming",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "52:1--52:34",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501666",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Reactive programming has recently gained popularity as
                 a paradigm that is well-suited for developing
                 event-driven and interactive applications. It
                 facilitates the development of such applications by
                 providing abstractions to express time-varying values
                 and automatically managing dependencies between such
                 values. A number of approaches have been recently
                 proposed embedded in various languages such as Haskell,
                 Scheme, JavaScript, Java, {.NET}, etc. This survey
                 describes and provides a taxonomy of existing reactive
                 programming approaches along six axes: representation
                 of time-varying values, evaluation model, lifting
                 operations, multidirectionality, glitch avoidance, and
                 support for distribution. From this taxonomy, we
                 observe that there are still open challenges in the
                 field of reactive programming. For instance,
                 multidirectionality is supported only by a small number
                 of languages, which do not automatically track
                 dependencies between time-varying values. Similarly,
                 glitch avoidance, which is subtle in reactive programs,
                 cannot be ensured in distributed reactive programs
                 using the current techniques.",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Androutsopoulos:2013:SBM,
  author =       "Kelly Androutsopoulos and David Clark and Mark Harman
                 and Jens Krinke and Laurence Tratt",
  title =        "State-based model slicing: a survey",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "53:1--53:36",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501667",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Slicing is a technique, traditionally applied to
                 programs, for extracting the parts of a program that
                 affect the values computed at a statement of interest.
                 In recent years authors have begun to consider slicing
                 at model level. We present a detailed review of
                 existing work on slicing at the level of
                 finite-state-machine-based models. We focus on
                 state-based modeling notations because these have
                 received sufficient attention from the slicing
                 community that there is now a coherent body of hitherto
                 unsurveyed work. We also identify the challenges that
                 state-based slicing presents and how the existing
                 literature has addressed these. We conclude by
                 identifying problems that remain open either because of
                 the challenges involved in addressing them or because
                 the community simply has yet to turn its attention to
                 solving them.",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lazaro:2013:DRD,
  author =       "Daniel Lazaro and Joan Manuel Marques and Josep Jorba
                 and Xavier Vilajosana",
  title =        "Decentralized resource discovery mechanisms for
                 distributed computing in peer-to-peer environments",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "54:1--54:54",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501668",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Resource discovery is an important part of distributed
                 computing and resource sharing systems, like grids and
                 utility computing. Because of the increasing importance
                 of decentralized and peer-to-peer environments,
                 characterized by high dynamism and churn, a number of
                 resource discovery mechanisms, mainly based on
                 peer-to-peer techniques, have been presented recently.
                 We present and classify them according to criteria like
                 their topology and the degree of achievement of various
                 common requirements of great importance for the
                 targeted environments, as well as compare their
                 reported performance. These classifications intend to
                 provide an intuitive vision of the strengths and
                 weaknesses of each system.",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shaul:2013:CSF,
  author =       "Levi Shaul and Doron Tauber",
  title =        "Critical success factors in enterprise resource
                 planning systems: Review of the last decade",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "55:1--55:39",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501669",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Organizations perceive ERP as a vital tool for
                 organizational competition as it integrates dispersed
                 organizational systems and enables flawless
                 transactions and production. This review examines
                 studies investigating Critical Success Factors (CSFs)
                 in implementing Enterprise Resource Planning (ERP)
                 systems. Keywords relating to the theme of this study
                 were defined and used to search known Web engines and
                 journal databases for studies on both implementing ERP
                 systems per se and integrating ERP systems with other
                 well- known systems (e.g., SCM, CRM) whose importance
                 to business organizations and academia is acknowledged
                 to work in a complementary fashion. A total of 341
                 articles were reviewed to address three main goals.
                 This study structures previous research by presenting a
                 comprehensive taxonomy of CSFs in the area of ERP.
                 Second, it maps studies, identified through an
                 exhaustive and comprehensive literature review, to
                 different dimensions and facets of ERP system
                 implementation. Third, it presents studies
                 investigating CSFs in terms of a specific ERP lifecycle
                 phase and across the entire ERP life cycle. This study
                 not only reviews articles in which an ERP system is the
                 sole or primary field of research, but also articles
                 that refer to an integration of ERP systems and other
                 popular systems (e.g., SCM, CRM). Finally it provides a
                 comprehensive bibliography of the articles published
                 during this period that can serve as a guide for future
                 research.",
  acknowledgement = ack-nhfb,
  articleno =    "55",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kritikos:2013:SSQ,
  author =       "Kyriakos Kritikos and Barbara Pernici and Pierluigi
                 Plebani and Cinzia Cappiello and Marco Comuzzi and
                 Salima Benrernou and Ivona Brandic and Attila
                 Kert{\'e}sz and Michael Parkin and Manuel Carro",
  title =        "A survey on service quality description",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "1",
  pages =        "1:1--1:??",
  month =        oct,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2522968.2522969",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 1 18:27:34 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Quality of service (QoS) can be a critical element for
                 achieving the business goals of a service provider, for
                 the acceptance of a service by the user, or for
                 guaranteeing service characteristics in a composition
                 of services, where a service is defined as either a
                 software or a software-support (i.e., infrastructural)
                 service which is available on any type of network or
                 electronic channel. The goal of this article is to
                 compare the approaches to QoS description in the
                 literature, where several models and metamodels are
                 included. consider a large spectrum of models and
                 metamodels to describe service quality, ranging from
                 ontological approaches to define quality measures,
                 metrics, and dimensions, to metamodels enabling the
                 specification of quality-based service requirements and
                 capabilities as well as of SLAs (Service-Level
                 Agreements) and SLA templates for service provisioning.
                 Our survey is performed by inspecting the
                 characteristics of the available approaches to reveal
                 which are the consolidated ones and which are the ones
                 specific to given aspects and to analyze where the need
                 for further research and investigation lies. The
                 approaches here illustrated have been selected based on
                 a systematic review of conference proceedings and
                 journals spanning various research areas in computer
                 science and engineering, including: distributed,
                 information, and telecommunication systems, networks
                 and security, and service-oriented and grid
                 computing.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Yenikaya:2013:KVR,
  author =       "Sibel Yenikaya and G{\"o}khan Yenikaya and Ekrem
                 D{\"u}ven",
  title =        "Keeping the vehicle on the road: a survey on on-road
                 lane detection systems",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "1",
  pages =        "2:1--2:??",
  month =        oct,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2522968.2522970",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 1 18:27:34 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The development of wireless sensor networks, such as
                 researchers Advanced Driver Assistance Systems (ADAS)
                 requires the ability to analyze the road scene just
                 like a human does. Road scene analysis is an essential,
                 complex, and challenging task and it consists of: road
                 detection (which includes the localization of the road,
                 the determination of the relative position between
                 vehicle and road, and the analysis of the vehicle's
                 heading direction) and obstacle detection (which is
                 mainly based on localizing possible obstacles on the
                 vehicle's path). The detection of the road borders, the
                 estimation of the road geometry, and the localization
                 of the vehicle are essential tasks in this context
                 since they are required for the lateral and
                 longitudinal control of the vehicle. Within this field,
                 on-board vision has been widely used since it has many
                 advantages (higher resolution, low power consumption,
                 low cost, easy aesthetic integration, and nonintrusive
                 nature) over other active sensors such as RADAR or
                 LIDAR. At first glance the problem of detecting the
                 road geometry from visual information seems simple and
                 early works in this field were quickly rewarded with
                 promising results. However, the large variety of
                 scenarios and the high rates of success demanded by the
                 industry have kept the lane detection research work
                 alive. In this article a comprehensive review of
                 vision-based road detection systems vision is
                 presented.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tamburri:2013:OSS,
  author =       "Damian A. Tamburri and Patricia Lago and Hans van
                 Vliet",
  title =        "Organizational social structures for software
                 engineering",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "1",
  pages =        "3:1--3:??",
  month =        oct,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2522968.2522971",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 1 18:27:34 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Software engineering evolved from a rigid process to a
                 dynamic interplay of people (e.g., stakeholders or
                 developers). Organizational and social literature call
                 this interplay an Organizational Social Structure
                 (OSS). Software practitioners still lack a systematic
                 way to select, analyze, and support OSSs best fitting
                 their problems (e.g., software development). We provide
                 the state-of-the-art in OSSs, and discuss mechanisms to
                 support OSS-related decisions in software engineering
                 (e.g., choosing the OSS best fitting development
                 scenarios). Our data supports two conclusions. First,
                 software engineering focused on building software using
                 project teams alone, yet these are one of thirteen OSS
                 flavors from literature. Second, an emerging OSS should
                 be further explored for software development: social
                 networks. This article represents a first glimpse at
                 OSS-aware software engineering, that is, to engineer
                 software using OSSs best fit for the problem.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Roundy:2013:BCO,
  author =       "Kevin A. Roundy and Barton P. Miller",
  title =        "Binary-code obfuscations in prevalent packer tools",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "1",
  pages =        "4:1--4:??",
  month =        oct,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2522968.2522972",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 1 18:27:34 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The first steps in analyzing defensive malware are
                 understanding what obfuscations are present in
                 real-world malware binaries, how these obfuscations
                 hinder analysis, and how they can be overcome. While
                 some obfuscations have been reported independently,
                 this survey consolidates the discussion while adding
                 substantial depth and breadth to it. This survey also
                 quantifies the relative prevalence of these
                 obfuscations by using the Dyninst binary analysis and
                 instrumentation tool that was recently extended for
                 defensive malware analysis. The goal of this survey is
                 to encourage analysts to focus on resolving the
                 obfuscations that are most prevalent in real-world
                 malware.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{deNicola:2013:UDS,
  author =       "Rocco de Nicola and Diego Latella and Michele Loreti
                 and Mieke Massink",
  title =        "A uniform definition of stochastic process calculi",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "1",
  pages =        "5:1--5:??",
  month =        oct,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2522968.2522973",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 1 18:27:34 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We introduce a unifying framework to provide the
                 semantics of process algebras, including their
                 quantitative variants useful for modeling quantitative
                 aspects of behaviors. The unifying framework is then
                 used to describe some of the most representative
                 stochastic process algebras. This provides a general
                 and clear support for an understanding of their
                 similarities and differences. The framework is based on
                 State to Function Labeled Transition Systems, FuTSs for
                 short, that are state transition structures where each
                 transition is a triple of the form {$ (s, \alpha, P)
                 $}. The first and the second components are the source
                 state, $s$, and the label, $ \alpha $, of the
                 transition, while the third component is the
                 continuation function, {$P$}, associating a value of a
                 suitable type to each state $ s' $. For example, in the
                 case of stochastic process algebras the value of the
                 continuation function on $ s' $ represents the rate of
                 the negative exponential distribution characterizing
                 the duration/delay of the action performed to reach
                 state $ s' $ from $s$. We first provide the semantics
                 of a simple formalism used to describe continuous-time
                 Markov chains, then we model a number of process
                 algebras that permit parallel composition of models
                 according to the two main interaction paradigms
                 (multiparty and one-to-one synchronization). Finally,
                 we deal with formalisms where actions and rates are
                 kept separate and address the issues related to the
                 coexistence of stochastic, probabilistic, and
                 nondeterministic behaviors. For each formalism, we
                 establish the formal correspondence between the FuTSs
                 semantics and its original semantics.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Esposito:2013:SES,
  author =       "Flavio Esposito and Ibrahim Matta and Vatche
                 Ishakian",
  title =        "Slice embedding solutions for distributed service
                 architectures",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "1",
  pages =        "6:1--6:??",
  month =        oct,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2522968.2522974",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 1 18:27:34 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Network virtualization provides a novel approach to
                 running multiple concurrent virtual networks over a
                 common physical network infrastructure. From a research
                 perspective, this enables the networking community to
                 concurrently experiment with new Internet architectures
                 and protocols. From a market perspective, on the other
                 hand, this paradigm is appealing as it enables
                 infrastructure service providers to experiment with new
                 business models that range from leasing virtual slices
                 of their infrastructure to hosting multiple concurrent
                 network services. In this article, we present the slice
                 embedding problem and recent developments in the area.
                 A slice is a set of virtual instances spanning a set of
                 physical resources. The embedding problem consists of
                 three main tasks: (1) resource discovery, which
                 involves monitoring the state of the physical
                 resources, (2) virtual network mapping, which involves
                 matching users' requests with the available resources,
                 and (3) allocation, which involves assigning the
                 resources that match the users' requests. We also
                 outline how these three tasks are tightly coupled, and
                 how there exists a wide spectrum of solutions that
                 either solve a particular task or jointly solve
                 multiple tasks along with the interactions among them.
                 To dissect the space of solutions, we introduce three
                 main classification criteria, namely: (1) the type of
                 constraints imposed by the user, (2) the type of
                 dynamics considered in the embedding process, and (3)
                 the allocation strategy adopted. Finally, we conclude
                 with a few interesting research directions.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Araujo:2013:SOM,
  author =       "Aluizio F. R. Araujo and Renata L. M. E. Rego",
  title =        "Self-organizing maps with a time-varying structure",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "1",
  pages =        "7:1--7:??",
  month =        oct,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2522968.2522975",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 1 18:27:34 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A number of research studies considering a
                 self-organizing map have been developed since such a
                 map was proposed by Kohonen [1982]. Some of these
                 studies concern SOM-based models that do not use
                 pre-defined structures to produce their mappings. We
                 call these models Self-Organizing Maps with
                 Time-Varying Structure (SOM-TVS). Despite the large
                 number of SOM-TVS models there is not a standard way to
                 describe them. In this article, we propose a framework
                 to describe SOM-TVS models, which we use to describe
                 some of these models and to compare their algorithms,
                 and we present some real-world applications of the
                 models presented.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Radetzki:2013:MFT,
  author =       "Martin Radetzki and Chaochao Feng and Xueqian Zhao and
                 Axel Jantsch",
  title =        "Methods for fault tolerance in networks-on-chip",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "1",
  pages =        "8:1--8:??",
  month =        oct,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2522968.2522976",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 1 18:27:34 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Networks-on-Chip constitute the interconnection
                 architecture of future, massively parallel
                 multiprocessors that assemble hundreds to thousands of
                 processing cores on a single chip. Their integration is
                 enabled by ongoing miniaturization of chip
                 manufacturing technologies following Moore's Law. It
                 comes with the downside of the circuit elements'
                 increased susceptibility to failure. Research on
                 fault-tolerant Networks-on-Chip tries to mitigate
                 partial failure and its effect on network performance
                 and reliability by exploiting various forms of
                 redundancy at the suitable network layers. The article
                 at hand reviews the failure mechanisms, fault models,
                 diagnosis techniques, and fault-tolerance methods in
                 on-chip networks, and surveys and summarizes the
                 research of the last ten years. It is structured along
                 three communication layers: the data link, the network,
                 and the transport layers. The most important results
                 are summarized and open research problems and
                 challenges are highlighted to guide future research on
                 this topic.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Yahyavi:2013:PPA,
  author =       "Amir Yahyavi and Bettina Kemme",
  title =        "Peer-to-peer architectures for massively multiplayer
                 online games: a survey",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "1",
  pages =        "9:1--9:??",
  month =        oct,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2522968.2522977",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 1 18:27:34 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Scalability, fast response time, and low cost are of
                 utmost importance in designing a successful massively
                 multiplayer online game. The underlying architecture
                 plays an important role in meeting these conditions.
                 Peer-to-peer architectures, due to their distributed
                 and collaborative nature, have low infrastructure costs
                 and can achieve high scalability. They can also achieve
                 fast response times by creating direct connections
                 between players. However, these architectures face many
                 challenges. Distributing a game among peers makes
                 maintaining control over the game more complex.
                 Peer-to-peer architectures also tend to be vulnerable
                 to churn and cheating. Moreover, different genres of
                 games have different requirements that should be met by
                 the underlying architecture, rendering the task of
                 designing a general-purpose architecture harder. Many
                 peer-to-peer gaming solutions have been proposed that
                 utilize a range of techniques while using somewhat
                 different and confusing terminologies. This article
                 presents a comprehensive overview of current
                 peer-to-peer solutions for massively multiplayer games
                 using a uniform terminology.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhang:2013:OCD,
  author =       "Xin Zhang and Yee-Hong Yang and Zhiguang Han and Hui
                 Wang and Chao Gao",
  title =        "Object class detection: a survey",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "1",
  pages =        "10:1--10:??",
  month =        oct,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2522968.2522978",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 1 18:27:34 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Object class detection, also known as category-level
                 object detection, has become one of the most focused
                 areas in computer vision in the new century. This
                 article attempts to provide a comprehensive survey of
                 the recent technical achievements in this area of
                 research. More than 270 major publications are included
                 in this survey covering different aspects of the
                 research, which include: (i) problem description: key
                 tasks and challenges; (ii) core techniques: appearance
                 modeling, localization strategies, and supervised
                 classification methods; (iii) evaluation issues:
                 approaches, metrics, standard datasets, and
                 state-of-the-art results; and (iv) new development:
                 particularly new approaches and applications motivated
                 by the recent boom of social images. Finally, in
                 retrospect of what has been achieved so far, the survey
                 also discusses what the future may hold for object
                 class detection research.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sakr:2013:FML,
  author =       "Sherif Sakr and Anna Liu and Ayman G. Fayoumi",
  title =        "The family of {MapReduce} and large-scale data
                 processing systems",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "1",
  pages =        "11:1--11:??",
  month =        oct,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2522968.2522979",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 1 18:27:34 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In the last two decades, the continuous increase of
                 computational power has produced an overwhelming flow
                 of data which has called for a paradigm shift in the
                 computing architecture and large-scale data processing
                 mechanisms. MapReduce is a simple and powerful
                 programming model that enables easy development of
                 scalable parallel applications to process vast amounts
                 of data on large clusters of commodity machines. It
                 isolates the application from the details of running a
                 distributed program such as issues on data
                 distribution, scheduling, and fault tolerance. However,
                 the original implementation of the MapReduce framework
                 had some limitations that have been tackled by many
                 research efforts in several followup works after its
                 introduction. This article provides a comprehensive
                 survey for a family of approaches and mechanisms of
                 large-scale data processing mechanisms that have been
                 implemented based on the original idea of the MapReduce
                 framework and are currently gaining a lot of momentum
                 in both research and industrial communities. We also
                 cover a set of introduced systems that have been
                 implemented to provide declarative programming
                 interfaces on top of the MapReduce framework. In
                 addition, we review several large-scale data processing
                 systems that resemble some of the ideas of the
                 MapReduce framework for different purposes and
                 application scenarios. Finally, we discuss some of the
                 future research directions for implementing the next
                 generation of MapReduce-like solutions.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Noor:2013:TMS,
  author =       "Talal H. Noor and Quan Z. Sheng and Sherali Zeadally
                 and Jian Yu",
  title =        "Trust management of services in cloud environments:
                 obstacles and solutions",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "1",
  pages =        "12:1--12:??",
  month =        oct,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2522968.2522980",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 1 18:27:34 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Trust management is one of the most challenging issues
                 in the emerging cloud computing area. Over the past few
                 years, many studies have proposed different techniques
                 to address trust management issues. However, despite
                 these past efforts, several trust management issues
                 such as identification, privacy, personalization,
                 integration, security, and scalability have been mostly
                 neglected and need to be addressed before cloud
                 computing can be fully embraced. In this article, we
                 present an overview of the cloud service models and we
                 survey the main techniques and research prototypes that
                 efficiently support trust management of services in
                 cloud environments. We present a generic analytical
                 framework that assesses existing trust management
                 research prototypes in cloud computing and relevant
                 areas using a set of assessment criteria. Open research
                 issues for trust management in cloud environments are
                 also discussed.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Silva:2013:DSC,
  author =       "Jonathan A. Silva and Elaine R. Faria and Rodrigo C.
                 Barros and Eduardo R. Hruschka and Andr{\'e} C. P. L.
                 F. de Carvalho and Jo{\~a}o Gama",
  title =        "Data stream clustering: a survey",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "1",
  pages =        "13:1--13:??",
  month =        oct,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2522968.2522981",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 1 18:27:34 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Data stream mining is an active research area that has
                 recently emerged to discover knowledge from large
                 amounts of continuously generated data. In this
                 context, several data stream clustering algorithms have
                 been proposed to perform unsupervised learning.
                 Nevertheless, data stream clustering imposes several
                 challenges to be addressed, such as dealing with
                 nonstationary, unbounded data that arrive in an online
                 fashion. The intrinsic nature of stream data requires
                 the development of algorithms capable of performing
                 fast and incremental processing of data objects,
                 suitably addressing time and memory limitations. In
                 this article, we present a survey of data stream
                 clustering algorithms, providing a thorough discussion
                 of the main design components of state-of-the-art
                 algorithms. In addition, this work addresses the
                 temporal aspects involved in data stream clustering,
                 and presents an overview of the usually employed
                 experimental methodologies. A number of references are
                 provided that describe applications of data stream
                 clustering in different domains, such as network
                 intrusion detection, sensor networks, and stock market
                 analysis. Information regarding software packages and
                 data repositories are also available for helping
                 researchers and practitioners. Finally, some important
                 issues and open questions that can be subject of future
                 research are discussed.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Vijayalayan:2013:DSS,
  author =       "Kanthaiah Sivapragasam Vijayalayan and Aaron Harwood
                 and Shanika Karunasekera",
  title =        "Distributed scheduling schemes for wireless mesh
                 networks: a survey",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "1",
  pages =        "14:1--14:??",
  month =        oct,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2522968.2522982",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 1 18:27:34 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "An efficient scheduling scheme is a crucial part of
                 Wireless Mesh Networks (WMNs)-an emerging communication
                 infrastructure solution for autonomy, scalability,
                 higher throughput, lower delay metrics, energy
                 efficiency, and other service-level guarantees.
                 Distributed schedulers are preferred due to better
                 scalability, smaller setup delays, smaller management
                 overheads, no single point of failure, and for avoiding
                 bottlenecks. Based on the sequence in which nodes
                 access the shared medium, repetitiveness, and
                 determinism, distributed schedulers that are supported
                 by wireless mesh standards can be classified as either
                 random, pseudo-random, or cyclic schemes. We performed
                 qualitative and quantitative studies that show the
                 strengths and weaknesses of each category, and how the
                 schemes complement each other. We discuss how wireless
                 standards with mesh definitions have evolved by
                 incorporating and enhancing one or more of these
                 schemes. Emerging trends and research problems
                 remaining for future research also have been
                 identified.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sen:2013:SSD,
  author =       "Soumya Sen and Carlee Joe-Wong and Sangtae Ha and Mung
                 Chiang",
  title =        "A survey of smart data pricing: Past proposals,
                 current plans, and future trends",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "15:1--15:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543582",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Traditionally, network operators have used simple
                 flat-rate broadband data plans for both wired and
                 wireless network access. But today, with the popularity
                 of mobile devices and exponential growth of apps,
                 videos, and clouds, service providers are gradually
                 moving toward more sophisticated pricing schemes. This
                 decade will therefore likely witness a major change in
                 the ways in which network resources are managed, and
                 the role of economics in allocating these resources.
                 This survey reviews some of the well-known past
                 broadband pricing proposals (both static and dynamic),
                 including their current realizations in various
                 consumer data plans around the world, and discusses
                 several research problems and open questions. By
                 exploring the benefits and challenges of pricing data,
                 this article attempts to facilitate both the industrial
                 and the academic communities' efforts in understanding
                 the existing literature, recognizing new trends, and
                 shaping an appropriate and timely research agenda.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kermarrec:2013:XPP,
  author =       "Anne-Marie Kermarrec and Peter Triantafillou",
  title =        "{XL} peer-to-peer pub\slash sub systems",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "16:1--16:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543583",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Increasingly, one of the most prominent ways to
                 disseminate information on the Web is through
                 ``notifications'' (also known as alerts), and as such
                 they are at the core of many large-scale applications.
                 For instance, users are notified of articles in which
                 they are interested through RSS feeds, of posts from
                 their friends through social networks, or of
                 recommendation generated by various sites. Event
                 notification usually relies on the so-called
                 Publish-Subscribe (P ub/Sub) communication paradigm. In
                 Pub/Sub systems, subscribers sign up for events or
                 classes of events in order to be asynchronously
                 notified afterward by the system. The size of such
                 systems (with respect to events and subscriptions)
                 keeps growing, and providing scalable implementations
                 of Pub/Sub systems is extremely challenging. Although
                 there exist popular examples of centralized Pub/Sub
                 systems that currently support a large number of
                 subscribers, such as online social networks, they
                 periodically face formidable challenges due to peak
                 loads and do not always offer a support for fine-grain
                 subscriptions. In fact, providing scalability along
                 with expressiveness in the subscription patterns calls
                 for distributed implementations of Pub/Sub systems. In
                 parallel, peer-to-peer (P2P) overlay networks have
                 emerged, providing a sound and highly scalable network
                 foundation upon which to build distributed applications
                 including Pub/Sub systems. In this article, we focus on
                 fully decentralized (P2P), highly scalable, P ub/Sub
                 systems. More specifically, we investigate how Pub/Sub
                 and P2P research can be integrated. We define the
                 design space and explore it in a systematic way. We
                 expose an understanding of available design choices;
                 provide a comprehensive classification and
                 understanding of prominent P2P Pub/Sub systems,
                 positioning them against the design dimensions; and
                 highlight correlations between and implications,
                 benefits, and shortcomings of design alternatives.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Castro:2013:TGT,
  author =       "Pablo Samuel Castro and Daqing Zhang and Chao Chen and
                 Shijian Li and Gang Pan",
  title =        "From taxi {GPS} traces to social and community
                 dynamics: a survey",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "17:1--17:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543584",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Vehicles equipped with GPS localizers are an important
                 sensory device for examining people's movements and
                 activities. Taxis equipped with GPS localizers serve
                 the transportation needs of a large number of people
                 driven by diverse needs; their traces can tell us where
                 passengers were picked up and dropped off, which route
                 was taken, and what steps the driver took to find a new
                 passenger. In this article, we provide an exhaustive
                 survey of the work on mining these traces. We first
                 provide a formalization of the data sets, along with an
                 overview of different mechanisms for preprocessing the
                 data. We then classify the existing work into three
                 main categories: social dynamics, traffic dynamics and
                 operational dynamics. Social dynamics refers to the
                 study of the collective behaviour of a city's
                 population, based on their observed movements; Traffic
                 dynamics studies the resulting flow of the movement
                 through the road network; Operational dynamics refers
                 to the study and analysis of taxi driver's modus
                 operandi. We discuss the different problems currently
                 being researched, the various approaches proposed, and
                 suggest new avenues of research. Finally, we present a
                 historical overview of the research work in this field
                 and discuss which areas hold most promise for future
                 research.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wu:2013:CPC,
  author =       "Qiong Wu and Chunyan Miao",
  title =        "Curiosity: From psychology to computation",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "18:1--18:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543585",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Literature in psychology has shown that curiosity is
                 the intrinsic motivation for exploration, learning, and
                 creativity. Various forms of computational curiosity
                 have been developed to provide artificial beings with
                 desirable functions, such as detecting and adapting to
                 novel inputs, making decisions related to aesthetics,
                 and achieving pedagogical purposes. This article
                 reviews existing models of computational curiosity in
                 light of psychological theories that are beneficial to
                 building models of human cognition and designing
                 human-like agents. We first study theories in
                 psychology to shed light on the underpinnings of human
                 curiosity, where a two-step process is proposed to
                 serve as a general model for analyzing curiosity.
                 Subsequently, existing models of computational
                 curiosity are reviewed under the proposed framework. We
                 conclude the review by identifying 4 key research
                 issues in computational curiosity and 10 important
                 research areas where computational curiosity could
                 bring significant impact.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Csapo:2013:OAR,
  author =       "{\'A}d{\'a}m Csap{\'o} and Gy{\"o}rgy Wers{\'e}nyi",
  title =        "Overview of auditory representations in human-machine
                 interfaces",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "19:1--19:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543586",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In recent years, a large number of research projects
                 have focused on the use of auditory representations in
                 a broadened scope of application scenarios. Results in
                 such projects have shown that auditory elements can
                 effectively complement other modalities not only in the
                 traditional desktop computer environment but also in
                 virtual and augmented reality, mobile platforms, and
                 other kinds of novel computing environments. The
                 successful use of auditory representations in this
                 growing number of application scenarios has in turn
                 prompted researchers to rediscover the more basic
                 auditory representations and extend them in various
                 directions. The goal of this article is to survey both
                 classical auditory representations (e.g., auditory
                 icons and earcons) and those auditory representations
                 that have been created as extensions to earlier
                 approaches, including speech-based sounds (e.g.,
                 spearcons and spindex representations), emotionally
                 grounded sounds (e.g., auditory emoticons and
                 spemoticons), and various other sound types used to
                 provide sonifications in practical scenarios. The
                 article concludes by outlining the latest trends in
                 auditory interface design and providing examples of
                 these trends.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mazurczyk:2013:VSD,
  author =       "Wojciech Mazurczyk",
  title =        "{VoIP} steganography and its detection --- a survey",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "20:1--20:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543587",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Steganography is an ancient art that encompasses
                 various techniques of information hiding, the aim of
                 which is to embed secret information into a carrier
                 message. Steganographic methods are usually aimed at
                 hiding the very existence of the communication. Due to
                 the rise in popularity of IP telephony, together with
                 the large volume of data and variety of protocols
                 involved, it is currently attracting the attention of
                 the research community as a perfect carrier for
                 steganographic purposes. This article is a first survey
                 of the existing Voice over IP (VoIP) steganography
                 methods and their countermeasures.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gammie:2013:SDC,
  author =       "Peter Gammie",
  title =        "Synchronous digital circuits as functional programs",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "21:1--21:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543588",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Functional programming techniques have been used to
                 describe synchronous digital circuits since the early
                 1980s. Here we survey the systems and formal
                 underpinnings that constitute this tradition. We
                 situate these techniques with respect to other formal
                 methods for hardware design and discuss the work yet to
                 be done.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ghosh:2013:UPV,
  author =       "Subir K. Ghosh and Partha P. Goswami",
  title =        "Unsolved problems in visibility graphs of points,
                 segments, and polygons",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "22:1--22:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543589",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In this survey article, we present open problems and
                 conjectures on visibility graphs of points, segments,
                 and polygons along with necessary backgrounds for
                 understanding them.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Renner:2013:PED,
  author =       "Rebekka S. Renner and Boris M. Velichkovsky and Jens
                 R. Helmert",
  title =        "The perception of egocentric distances in virtual
                 environments --- a review",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "23:1--23:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543590",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Over the last 20 years research has been done on the
                 question of how egocentric distances, i.e., the
                 subjectively reported distance from a human observer to
                 an object, are perceived in virtual environments. This
                 review surveys the existing literature on empirical
                 user studies on this topic. In summary, there is a mean
                 estimation of egocentric distances in virtual
                 environments of about 74\% of the modeled distances.
                 Many factors possibly influencing distance estimates
                 were reported in the literature. We arranged these
                 factors into four groups, namely measurement methods,
                 technical factors, compositional factors, and human
                 factors. The research on these factors is summarized,
                 conclusions are drawn, and promising areas for future
                 research are outlined.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Barkati:2013:SPA,
  author =       "Karim Barkati and Pierre Jouvelot",
  title =        "Synchronous programming in audio processing: a lookup
                 table oscillator case study",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "24:1--24:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543591",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/pvm.bib",
  abstract =     "The adequacy of a programming language to a given
                 software project or application domain is often
                 considered a key factor of success in software
                 development and engineering, even though little
                 theoretical or practical information is readily
                 available to help make an informed decision. In this
                 article, we address a particular version of this issue
                 by comparing the adequacy of general-purpose
                 synchronous programming languages to more
                 Domain-Specific Languages (DSLs) in the field of
                 computer music. More precisely, we implemented and
                 tested the same lookup table oscillator example
                 program, one of the most classical algorithms for sound
                 synthesis, using a selection of significant synchronous
                 programming languages, half of which designed as
                 specific music languages-Csound, Pure Data,
                 SuperCollider, ChucK, Faust-and the other half being
                 general synchronous formalisms-Signal, Lustre, Esterel,
                 Lucid Synchrone and C with the OpenMP Stream Extension
                 (Matlab/Octave is used for the initial specification).
                 The advantages of these two approaches are discussed,
                 providing insights to language designers and possibly
                 software developers of both communities regarding
                 programming languages design for the audio domain.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Yang:2013:RCI,
  author =       "Zheng Yang and Zimu Zhou and Yunhao Liu",
  title =        "From {RSSI} to {CSI}: Indoor localization via channel
                 response",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "25:1--25:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543592",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The spatial features of emitted wireless signals are
                 the basis of location distinction and determination for
                 wireless indoor localization. Available in mainstream
                 wireless signal measurements, the Received Signal
                 Strength Indicator (RSSI) has been adopted in vast
                 indoor localization systems. However, it suffers from
                 dramatic performance degradation in complex situations
                 due to multipath fading and temporal dynamics.
                 Break-through techniques resort to finer-grained
                 wireless channel measurement than RSSI. Different from
                 RSSI, the PHY layer power feature, channel response, is
                 able to discriminate multipath characteristics, and
                 thus holds the potential for the convergence of
                 accurate and pervasive indoor localization. Channel
                 State Information (CSI, reflecting channel response in
                 802.11 a/g/n) has attracted many research efforts and
                 some pioneer works have demonstrated submeter or even
                 centimeter-level accuracy. In this article, we survey
                 this new trend of channel response in localization. The
                 differences between CSI and RSSI are highlighted with
                 respect to network layering, time resolution, frequency
                 resolution, stability, and accessibility. Furthermore,
                 we investigate a large body of recent works and
                 classify them overall into three categories according
                 to how to use CSI. For each category, we emphasize the
                 basic principles and address future directions of
                 research in this new and largely open area.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pedro:2013:UGP,
  author =       "Ricardo Wandr{\'e} Dias Pedro and F{\'a}tima L. S.
                 Nunes and Ariane Machado-Lima",
  title =        "Using grammars for pattern recognition in images: a
                 systematic review",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "26:1--26:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543593",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Grammars are widely used to describe string languages
                 such as programming and natural languages and, more
                 recently, biosequences. Moreover, since the 1980s
                 grammars have been used in computer vision and related
                 areas. Some factors accountable for this increasing use
                 regard its relatively simple understanding and its
                 ability to represent some semantic pattern models found
                 in images, both spatially and temporally. The objective
                 of this article is to present an overview regarding the
                 use of syntactic pattern recognition methods in image
                 representations in several applications. To achieve
                 this purpose, we used a systematic review process to
                 investigate the main digital libraries in the area and
                 to document the phases of the study in order to allow
                 the auditing and further investigation. The results
                 indicated that in some of the studies retrieved,
                 manually created grammars were used to comply with a
                 particular purpose. Other studies performed a learning
                 process of the grammatical rules. In addition, this
                 article also points out still unexplored research
                 opportunities in the literature.",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pereira:2013:SAC,
  author =       "Orlando R. E. Pereira and Joel J. P. C. Rodrigues",
  title =        "Survey and analysis of current mobile learning
                 applications and technologies",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "27:1--27:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543594",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Distance learning, electronic learning, and mobile
                 learning offer content, methods, and technologies that
                 decrease the limitations of traditional education.
                 Mobile learning (m-learning) is an extension of
                 distance education, supported by mobile devices
                 equipped with wireless technologies. It is an emerging
                 learning model and process that requires new forms of
                 teaching, learning, contents, and dynamics between
                 actors. In order to ascertain the current state of
                 knowledge and research, an extensive review of the
                 literature in m-learning has been undertaken to
                 identify and harness potential factors and gaps in
                 implementation. This article provides a critical
                 analysis of m-learning projects and related literature,
                 presenting the findings of this aforementioned
                 analysis. It seeks to facilitate the inquiry into the
                 following question: ``What is possible in m-learning
                 using recent technologies?'' The analysis will be
                 divided into two main parts: applications from the
                 recent online mobile stores and operating system
                 standalone applications.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Herraiz:2013:ELS,
  author =       "Israel Herraiz and Daniel Rodriguez and Gregorio
                 Robles and Jesus M. Gonzalez-Barahona",
  title =        "The evolution of the laws of software evolution: a
                 discussion based on a systematic literature review",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "28:1--28:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543595",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "After more than 40 years of life, software evolution
                 should be considered as a mature field. However,
                 despite such a long history, many research questions
                 still remain open, and controversial studies about the
                 validity of the laws of software evolution are common.
                 During the first part of these 40 years, the laws
                 themselves evolved to adapt to changes in both the
                 research and the software industry environments. This
                 process of adaption to new paradigms, standards, and
                 practices stopped about 15 years ago, when the laws
                 were revised for the last time. However, most
                 controversial studies have been raised during this
                 latter period. Based on a systematic and comprehensive
                 literature review, in this article, we describe how and
                 when the laws, and the software evolution field,
                 evolved. We also address the current state of affairs
                 about the validity of the laws, how they are perceived
                 by the research community, and the developments and
                 challenges that are likely to occur in the coming
                 years.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Vezzani:2013:PRS,
  author =       "Roberto Vezzani and Davide Baltieri and Rita
                 Cucchiara",
  title =        "People reidentification in surveillance and forensics:
                 a survey",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "29:1--29:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543596",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The field of surveillance and forensics research is
                 currently shifting focus and is now showing an ever
                 increasing interest in the task of people
                 reidentification. This is the task of assigning the
                 same identifier to all instances of a particular
                 individual captured in a series of images or videos,
                 even after the occurrence of significant gaps over time
                 or space. People reidentification can be a useful tool
                 for people analysis in security as a data association
                 method for long-term tracking in surveillance. However,
                 current identification techniques being utilized
                 present many difficulties and shortcomings. For
                 instance, they rely solely on the exploitation of
                 visual cues such as color, texture, and the object's
                 shape. Despite the many advances in this field,
                 reidentification is still an open problem. This survey
                 aims to tackle all the issues and challenging aspects
                 of people reidentification while simultaneously
                 describing the previously proposed solutions for the
                 encountered problems. This begins with the first
                 attempts of holistic descriptors and progresses to the
                 more recently adopted 2D and 3D model-based approaches.
                 The survey also includes an exhaustive treatise of all
                 the aspects of people reidentification, including
                 available datasets, evaluation metrics, and
                 benchmarking.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Medina:2013:SMM,
  author =       "Violeta Medina and Juan Manuel Garc{\'\i}a",
  title =        "A survey of migration mechanisms of virtual machines",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "3",
  pages =        "30:1--30:??",
  month =        jan,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2492705",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:33:31 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "In the virtualization area, replication has been
                 considered as a mechanism to provide high availability.
                 A high-availability system should be active most of the
                 time, and this is the reason that its design should
                 consider almost zero downtime and a minimal human
                 intervention if a recovery process is demanded. Several
                 migration and replication mechanisms have been
                 developed to provide high availability inside
                 virtualized environments. In this article, a survey of
                 migration mechanisms is reported. These approaches are
                 classified in three main classes: process migration,
                 memory migration, and suspend/resume migration.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Li:2013:DDM,
  author =       "Feng Li and Beng Chin Ooi and M. Tamer {\"O}zsu and
                 Sai Wu",
  title =        "Distributed data management using {MapReduce}",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "3",
  pages =        "31:1--31:??",
  month =        jan,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2503009",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:33:31 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "MapReduce is a framework for processing and managing
                 large-scale datasets in a distributed cluster, which
                 has been used for applications such as generating
                 search indexes, document clustering, access log
                 analysis, and various other forms of data analytics.
                 MapReduce adopts a flexible computation model with a
                 simple interface consisting of map and reduce functions
                 whose implementations can be customized by application
                 developers. Since its introduction, a substantial
                 amount of research effort has been directed toward
                 making it more usable and efficient for supporting
                 database-centric operations. In this article, we aim to
                 provide a comprehensive review of a wide range of
                 proposals and systems that focusing fundamentally on
                 the support of distributed data management and
                 processing using the MapReduce framework.",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bellucci:2013:LHI,
  author =       "Andrea Bellucci and Alessio Malizia and Ignacio Aedo",
  title =        "Light on horizontal interactive surfaces: Input space
                 for tabletop computing",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "3",
  pages =        "32:1--32:??",
  month =        jan,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2500467",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:33:31 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In the last 25 years we have witnessed the rise and
                 growth of interactive tabletop research, both in
                 academic and in industrial settings. The rising demand
                 for the digital support of human activities motivated
                 the need to bring computational power to table
                 surfaces. In this article, we review the state of the
                 art of tabletop computing, highlighting core aspects
                 that frame the input space of interactive tabletops:
                 (a) developments in hardware technologies that have
                 caused the proliferation of interactive horizontal
                 surfaces and (b) issues related to new classes of
                 interaction modalities (multitouch, tangible, and
                 touchless). A classification is presented that aims to
                 give a detailed view of the current development of this
                 research area and define opportunities and challenges
                 for novel touch- and gesture-based interactions between
                 the human and the surrounding computational
                 environment.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bulling:2013:THA,
  author =       "Andreas Bulling and Ulf Blanke and Bernt Schiele",
  title =        "A tutorial on human activity recognition using
                 body-worn inertial sensors",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "3",
  pages =        "33:1--33:??",
  month =        jan,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2499621",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:33:31 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The last 20 years have seen ever-increasing research
                 activity in the field of human activity recognition.
                 With activity recognition having considerably matured,
                 so has the number of challenges in designing,
                 implementing, and evaluating activity recognition
                 systems. This tutorial aims to provide a comprehensive
                 hands-on introduction for newcomers to the field of
                 human activity recognition. It specifically focuses on
                 activity recognition using on-body inertial sensors. We
                 first discuss the key research challenges that human
                 activity recognition shares with general pattern
                 recognition and identify those challenges that are
                 specific to human activity recognition. We then
                 describe the concept of an Activity Recognition Chain
                 (ARC) as a general-purpose framework for designing and
                 evaluating activity recognition systems. We detail each
                 component of the framework, provide references to
                 related research, and introduce the best practice
                 methods developed by the activity recognition research
                 community. We conclude with the educational example
                 problem of recognizing different hand gestures from
                 inertial sensors attached to the upper and lower arm.
                 We illustrate how each component of this framework can
                 be implemented for this specific activity recognition
                 problem and demonstrate how different implementations
                 compare and how they impact overall recognition
                 performance.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Furia:2013:LIA,
  author =       "Carlo A. Furia and Bertrand Meyer and Sergey Velder",
  title =        "Loop invariants: Analysis, classification, and
                 examples",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "3",
  pages =        "34:1--34:??",
  month =        jan,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2506375",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:33:31 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Software verification has emerged as a key concern for
                 ensuring the continued progress of information
                 technology. Full verification generally requires, as a
                 crucial step, equipping each loop with a ``loop
                 invariant.'' Beyond their role in verification, loop
                 invariants help program understanding by providing
                 fundamental insights into the nature of algorithms. In
                 practice, finding sound and useful invariants remains a
                 challenge. Fortunately, many invariants seem
                 intuitively to exhibit a common flavor. Understanding
                 these fundamental invariant patterns could therefore
                 provide help for understanding and verifying a large
                 variety of programs. We performed a systematic
                 identification, validation, and classification of loop
                 invariants over a range of fundamental algorithms from
                 diverse areas of computer science. This article
                 analyzes the patterns, as uncovered in this study,
                 governing how invariants are derived from
                 postconditions; it proposes a taxonomy of invariants
                 according to these patterns; and it presents its
                 application to the algorithms reviewed. The discussion
                 also shows the need for high-level specifications based
                 on ``domain theory.'' It describes how the invariants
                 and the corresponding algorithms have been mechanically
                 verified using an automated program prover; the proof
                 source files are available. The contributions also
                 include suggestions for invariant inference and for
                 model-based specification.",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Li:2013:OPS,
  author =       "Bin Li and Steven C. H. Hoi",
  title =        "Online portfolio selection: a survey",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "3",
  pages =        "35:1--35:??",
  month =        jan,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2512962",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:33:31 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Online portfolio selection is a fundamental problem in
                 computational finance, which has been extensively
                 studied across several research communities, including
                 finance, statistics, artificial intelligence, machine
                 learning, and data mining. This article aims to provide
                 a comprehensive survey and a structural understanding
                 of online portfolio selection techniques published in
                 the literature. From an online machine learning
                 perspective, we first formulate online portfolio
                 selection as a sequential decision problem, and then we
                 survey a variety of state-of-the-art approaches, which
                 are grouped into several major categories, including
                 benchmarks, Follow-the-Winner approaches,
                 Follow-the-Loser approaches, Pattern-Matching--based
                 approaches, and Meta-Learning Algorithms. In addition
                 to the problem formulation and related algorithms, we
                 also discuss the relationship of these algorithms with
                 the capital growth theory so as to better understand
                 the similarities and differences of their underlying
                 trading ideas. This article aims to provide a timely
                 and comprehensive survey for both machine learning and
                 data mining researchers in academia and quantitative
                 portfolio managers in the financial industry to help
                 them understand the state of the art and facilitate
                 their research and practical applications. We also
                 discuss some open issues and evaluate some emerging new
                 trends for future research.",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ma:2013:SAT,
  author =       "Dongzhe Ma and Jianhua Feng and Guoliang Li",
  title =        "A survey of address translation technologies for flash
                 memories",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "3",
  pages =        "36:1--36:??",
  month =        jan,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2512961",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:33:31 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Flash is a type of Electronically Erasable
                 Programmable Read-Only Memory (EEPROM). Different from
                 traditional magnetic disks, flash memories have no
                 moving parts and are purely electronic devices, giving
                 them unique advantages, such as lower access latency,
                 lower power consumption, higher density, shock
                 resistance, and lack of noise. However, existing
                 applications cannot run directly on flash memories due
                 to their special characteristics. Flash Translation
                 Layer (FTL) is a software layer built on raw flash
                 memories that emulates a normal block device like
                 magnetic disks. Primary functionalities of the FTL
                 include address translation, garbage collection, and
                 wear leveling. This survey focuses on address
                 translation technologies and provides a broad overview
                 of existing schemes described in patents, journals, and
                 conference proceedings.",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Helbig:2013:BDM,
  author =       "Mard{\'e} Helbig and Andries P. Engelbrecht",
  title =        "Benchmarks for dynamic multi-objective optimisation
                 algorithms",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "3",
  pages =        "37:1--37:??",
  month =        jan,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2517649",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:33:31 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Algorithms that solve Dynamic Multi-Objective
                 Optimisation Problems (DMOOPs) should be tested on
                 benchmark functions to determine whether the algorithm
                 can overcome specific difficulties that can occur in
                 real-world problems. However, for Dynamic
                 Multi-Objective Optimisation (DMOO), no standard
                 benchmark functions are used. A number of DMOOPs have
                 been proposed in recent years. However, no
                 comprehensive overview of DMOOPs exist in the
                 literature. Therefore, choosing which benchmark
                 functions to use is not a trivial task. This article
                 seeks to address this gap in the DMOO literature by
                 providing a comprehensive overview of proposed DMOOPs,
                 and proposing characteristics that an ideal DMOO
                 benchmark function suite should exhibit. In addition,
                 DMOOPs are proposed for each characteristic.
                 Shortcomings of current DMOOPs that do not address
                 certain characteristics of an ideal benchmark suite are
                 highlighted. These identified shortcomings are
                 addressed by proposing new DMOO benchmark functions
                 with complicated Pareto-Optimal Sets (POSs), and
                 approaches to develop DMOOPs with either an isolated or
                 deceptive Pareto-Optimal Front (POF). In addition, DMOO
                 application areas and real-world DMOOPs are
                 discussed.",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mei:2013:MSR,
  author =       "Tao Mei and Yong Rui and Shipeng Li and Qi Tian",
  title =        "Multimedia search reranking: a literature survey",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "3",
  pages =        "38:1--38:??",
  month =        jan,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2536798",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:33:31 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The explosive growth and widespread accessibility of
                 community-contributed media content on the Internet
                 have led to a surge of research activity in multimedia
                 search. Approaches that apply text search techniques
                 for multimedia search have achieved limited success as
                 they entirely ignore visual content as a ranking
                 signal. Multimedia search reranking, which reorders
                 visual documents based on multimodal cues to improve
                 initial text-only searches, has received increasing
                 attention in recent years. Such a problem is
                 challenging because the initial search results often
                 have a great deal of noise. Discovering knowledge or
                 visual patterns from such a noisy ranked list to guide
                 the reranking process is difficult. Numerous techniques
                 have been developed for visual search re-ranking. The
                 purpose of this paper is to categorize and evaluate
                 these algorithms. We also discuss relevant issues such
                 as data collection, evaluation metrics, and
                 benchmarking. We conclude with several promising
                 directions for future research.",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fontana:2013:MTA,
  author =       "Peter Fontana and Rance Cleaveland",
  title =        "A menagerie of timed automata",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "3",
  pages =        "40:1--40:??",
  month =        jan,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2518102",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:33:31 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See corrections \cite{Keiren:2017:CMT}.",
  abstract =     "Timed automata are state-machine--like structures used
                 to model real-time systems. Since their invention in
                 the early 1990s, a number of often subtly differing
                 variants have appeared in the literature; one of this
                 article's key contributions is defining, highlighting,
                 and reconciling these differences. The article achieves
                 this by defining a baseline theory of timed automata,
                 characterizing each variant both syntactically and
                 semantically, and giving, when possible, syntactic and
                 semantic conversion to and from the baseline version.
                 This article also surveys various extensions to the
                 basic timed-automaton framework.",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kopliku:2013:ASN,
  author =       "Arlind Kopliku and Karen Pinel-Sauvagnat and Mohand
                 Boughanem",
  title =        "Aggregated search: a new information retrieval
                 paradigm",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "3",
  pages =        "41:1--41:??",
  month =        jan,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2523817",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:33:31 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Traditional search engines return ranked lists of
                 search results. It is up to the user to scroll this
                 list, scan within different documents, and assemble
                 information that fulfill his/her information need.
                 Aggregated search represents a new class of approaches
                 where the information is not only retrieved but also
                 assembled. This is the current evolution in Web search,
                 where diverse content (images, videos, etc.) and
                 relational content (similar entities, features) are
                 included in search results. In this survey, we propose
                 a simple analysis framework for aggregated search and
                 an overview of existing work. We start with related
                 work in related domains such as federated search,
                 natural language generation, and question answering.
                 Then we focus on more recent trends, namely cross
                 vertical aggregated search and relational aggregated
                 search, which are already present in current Web
                 search.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Costa-Jussa:2013:SMT,
  author =       "Marta R. Costa-Juss{\`a} and Mireia Farr{\'u}s",
  title =        "Statistical machine translation enhancements through
                 linguistic levels: a survey",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "3",
  pages =        "42:1--42:??",
  month =        jan,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2518130",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:33:31 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Machine translation can be considered a highly
                 interdisciplinary and multidisciplinary field because
                 it is approached from the point of view of human
                 translators, engineers, computer scientists,
                 mathematicians, and linguists. One of the most popular
                 approaches is the Statistical Machine Translation (smt)
                 approach, which tries to cover translation in a
                 holistic manner by learning from parallel corpus
                 aligned at the sentence level. However, with this basic
                 approach, there are some issues at each written
                 linguistic level (i.e., orthographic, morphological,
                 lexical, syntactic and semantic) that remain unsolved.
                 Research in smt has continuously been focused on
                 solving the different linguistic levels challenges.
                 This article represents a survey of how the smt has
                 been enhanced to perform translation correctly at all
                 linguistic levels.",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rodriguez:2013:SOH,
  author =       "Natalia D{\'\i}az Rodr{\'\i}guez and M. P. Cu{\'e}llar
                 and Johan Lilius and Miguel Delgado Calvo-Flores",
  title =        "A survey on ontologies for human behavior
                 recognition",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "4",
  pages =        "43:1--43:??",
  month =        mar,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2523819",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Mar 21 18:13:35 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Describing user activity plays an essential role in
                 ambient intelligence. In this work, we review different
                 methods for human activity recognition, classified as
                 data-driven and knowledge-based techniques. We focus on
                 context ontologies whose ultimate goal is the tracking
                 of human behavior. After studying upper and domain
                 ontologies, both useful for human activity
                 representation and inference, we establish an
                 evaluation criterion to assess the suitability of the
                 different candidate ontologies for this purpose. As a
                 result, any missing features, which are relevant for
                 modeling daily human behaviors, are identified as
                 future challenges.",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hirzel:2013:CSP,
  author =       "Martin Hirzel and Robert Soul{\'e} and Scott Schneider
                 and Bugra Gedik and Robert Grimm",
  title =        "A catalog of stream processing optimizations",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "4",
  pages =        "46:1--46:??",
  month =        mar,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2528412",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Mar 21 18:13:35 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Various research communities have independently
                 arrived at stream processing as a programming model for
                 efficient and parallel computing. These communities
                 include digital signal processing, databases, operating
                 systems, and complex event processing. Since each
                 community faces applications with challenging
                 performance requirements, each of them has developed
                 some of the same optimizations, but often with
                 conflicting terminology and unstated assumptions. This
                 article presents a survey of optimizations for stream
                 processing. It is aimed both at users who need to
                 understand and guide the system's optimizer and at
                 implementers who need to make engineering tradeoffs. To
                 consolidate terminology, this article is organized as a
                 catalog, in a style similar to catalogs of design
                 patterns or refactorings. To make assumptions explicit
                 and help understand tradeoffs, each optimization is
                 presented with its safety constraints (when does it
                 preserve correctness?) and a profitability experiment
                 (when does it improve performance?). We hope that this
                 survey will help future streaming system builders to
                 stand on the shoulders of giants from not just their
                 own community.",
  acknowledgement = ack-nhfb,
  articleno =    "46",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Orgerie:2013:STI,
  author =       "Anne-Cecile Orgerie and Marcos Dias de Assuncao and
                 Laurent Lefevre",
  title =        "A survey on techniques for improving the energy
                 efficiency of large-scale distributed systems",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "4",
  pages =        "47:1--47:??",
  month =        mar,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2532637",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Mar 21 18:13:35 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The great amounts of energy consumed by large-scale
                 computing and network systems, such as data centers and
                 supercomputers, have been a major source of concern in
                 a society increasingly reliant on information
                 technology. Trying to tackle this issue, the research
                 community and industry have proposed myriad techniques
                 to curb the energy consumed by IT systems. This article
                 surveys techniques and solutions that aim to improve
                 the energy efficiency of computing and network
                 resources. It discusses methods to evaluate and model
                 the energy consumed by these resources, and describes
                 techniques that operate at a distributed system level,
                 trying to improve aspects such as resource allocation,
                 scheduling, and network traffic management. This work
                 aims to review the state of the art on energy
                 efficiency and to foster research on schemes to make
                 network and computing resources more efficient.",
  acknowledgement = ack-nhfb,
  articleno =    "47",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Krishna:2013:FTS,
  author =       "C. M. Krishna",
  title =        "Fault-tolerant scheduling in homogeneous real-time
                 systems",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "4",
  pages =        "48:1--48:??",
  month =        mar,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2534028",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Mar 21 18:13:35 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Real-time systems are one of the most important
                 applications of computers, both in commercial terms and
                 in terms of social impact. Increasingly, real-time
                 computers are used to control life-critical
                 applications and need to meet stringent reliability
                 conditions. Since the reliability of a real-time system
                 is related to the probability of meeting its hard
                 deadlines, these reliability requirements translate to
                 the need to meet critical task deadlines with a very
                 high probability. We survey the problem of how to
                 schedule tasks in such a way that deadlines continue to
                 be met despite processor (permanent or transient) or
                 software failure.",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Perez:2013:SSR,
  author =       "H{\'e}ctor P{\'e}rez and J. Javier Guti{\'e}rrez",
  title =        "A survey on standards for real-time distribution
                 middleware",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "4",
  pages =        "49:1--49:??",
  month =        mar,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2532636",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Mar 21 18:13:35 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This survey covers distribution standards oriented to
                 the development of distributed real-time systems.
                 Currently, there are many distribution standards that
                 provide a wide and different set of real-time
                 facilities to control the temporal aspects of
                 applications. Besides giving a general overview of
                 these standards, we describe the real-time mechanisms
                 proposed by each standard to manage both processor and
                 network resources, discuss whether the available
                 facilities are sufficient to guarantee determinism
                 throughout the whole application, and identify a set of
                 features and deployment options that would be desirable
                 in any real-time distribution middleware regardless of
                 its distribution model and standard. The survey
                 identifies open issues and key challenges for future
                 research.",
  acknowledgement = ack-nhfb,
  articleno =    "49",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Navarro:2013:STC,
  author =       "Gonzalo Navarro",
  title =        "Spaces, Trees, and Colors: The algorithmic landscape
                 of document retrieval on sequences",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "4",
  pages =        "52:1--52:??",
  month =        mar,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2535933",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Mar 21 18:13:35 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Document retrieval is one of the best-established
                 information retrieval activities since the '60s,
                 pervading all search engines. Its aim is to obtain,
                 from a collection of text documents, those most
                 relevant to a pattern query. Current technology is
                 mostly oriented to ``natural language'' text
                 collections, where inverted indexes are the preferred
                 solution. As successful as this paradigm has been, it
                 fails to properly handle various East Asian languages
                 and other scenarios where the ``natural language''
                 assumptions do not hold. Inthis survey, we cover the
                 recent research in extending the document retrieval
                 techniques to a broader class of sequence collections,
                 which has applications in bioinformatics, data and web
                 mining, chemoinformatics, software engineering,
                 multimedia information retrieval, and many other
                 fields. We focus on the algorithmic aspects of the
                 techniques, uncovering a rich world of relations
                 between document retrieval challenges and fundamental
                 problems on trees, strings, range queries, discrete
                 geometry, and other areas.",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Henson:2013:MES,
  author =       "Michael Henson and Stephen Taylor",
  title =        "Memory encryption: a survey of existing techniques",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "4",
  pages =        "53:1--53:??",
  month =        mar,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2566673",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Mar 21 18:13:35 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Memory encryption has yet to be used at the core of
                 operating system designs to provide confidentiality of
                 code and data. As a result, numerous vulnerabilities
                 exist at every level of the software stack. Three
                 general approaches have evolved to rectify this
                 problem. The most popular approach is based on complex
                 hardware enhancements; this allows all encryption and
                 decryption to be conducted within a well-defined
                 trusted boundary. Unfortunately, these designs have not
                 been integrated within commodity processors and have
                 primarily been explored through simulation with very
                 few prototypes. An alternative approach has been to
                 augment existing hardware with operating system
                 enhancements for manipulating keys, providing improved
                 trust. This approach has provided insights into the use
                 of encryption but has involved unacceptable overheads
                 and has not been adopted in commercial operating
                 systems. Finally, specialized industrial devices have
                 evolved, potentially adding coprocessors, to increase
                 security of particular operations in specific operating
                 environments. However, this approach lacks generality
                 and has introduced unexpected vulnerabilities of its
                 own. Recently, memory encryption primitives have been
                 integrated within commodity processors such as the
                 Intel i7, AMD bulldozer, and multiple ARM variants.
                 This opens the door for new operating system designs
                 that provide confidentiality across the entire software
                 stack outside the CPU. To date, little practical
                 experimentation has been conducted, and the
                 improvements in security and associated performance
                 degradation has yet to be quantified. This article
                 surveys the current memory encryption literature from
                 the viewpoint of these central issues.",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mitchell:2013:SID,
  author =       "Robert Mitchell and Ing-Ray Chen",
  title =        "A survey of intrusion detection techniques for
                 cyber-physical systems",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "4",
  pages =        "55:1--55:??",
  month =        mar,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2542049",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Mar 21 18:13:35 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Pervasive healthcare systems, smart grids, and
                 unmanned aircraft systems are examples of
                 Cyber-Physical Systems (CPSs) that have become highly
                 integrated in the modern world. As this integration
                 deepens, the importance of securing these systems
                 increases. In order to identify gaps and propose
                 research directions in CPS intrusion detection
                 research, we survey the literature of this area. Our
                 approach is to classify modern CPS Intrusion Detection
                 System (IDS) techniques based on two design dimensions:
                 detection technique and audit material. We summarize
                 advantages and drawbacks of each dimension's options.
                 We also summarize the most and least studied CPS IDS
                 techniques in the literature and provide insight on the
                 effectiveness of IDS techniques as they apply to CPSs.
                 Finally, we identify gaps in CPS IDS research and
                 suggest future research areas.",
  acknowledgement = ack-nhfb,
  articleno =    "55",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chiang:2014:SDM,
  author =       "Yao-Yi Chiang and Stefan Leyk and Craig A. Knoblock",
  title =        "A Survey of Digital Map Processing Techniques",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "1",
  pages =        "1:1--1:??",
  month =        may,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2557423",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed May 21 09:48:38 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Maps depict natural and human-induced changes on earth
                 at a fine resolution for large areas and over long
                 periods of time. In addition, maps-especially
                 historical maps-are often the only information source
                 about the earth as surveyed using geodetic techniques.
                 In order to preserve these unique documents, increasing
                 numbers of digital map archives have been established,
                 driven by advances in software and hardware
                 technologies. Since the early 1980s, researchers from a
                 variety of disciplines, including computer science and
                 geography, have been working on computational methods
                 for the extraction and recognition of geographic
                 features from archived images of maps (digital map
                 processing). The typical result from map processing is
                 geographic information that can be used in spatial and
                 spatiotemporal analyses in a Geographic Information
                 System environment, which benefits numerous research
                 fields in the spatial, social, environmental, and
                 health sciences. However, map processing literature is
                 spread across a broad range of disciplines in which
                 maps are included as a special type of image. This
                 article presents an overview of existing map processing
                 techniques, with the goal of bringing together the past
                 and current research efforts in this interdisciplinary
                 field, to characterize the advances that have been
                 made, and to identify future research directions and
                 opportunities.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Winkler:2014:SPP,
  author =       "Thomas Winkler and Bernhard Rinner",
  title =        "Security and Privacy Protection in Visual Sensor
                 Networks: a Survey",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "1",
  pages =        "2:1--2:??",
  month =        may,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2545883",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed May 21 09:48:38 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Visual sensor networks (VSNs) are receiving a lot of
                 attention in research, and at the same time, commercial
                 applications are starting to emerge. VSN devices come
                 with image sensors, adequate processing power, and
                 memory. They use wireless communication interfaces to
                 collaborate and jointly solve tasks such as tracking
                 persons within the network. VSNs are expected to
                 replace not only many traditional, closed-circuit
                 surveillance systems but also to enable emerging
                 applications in scenarios such as elderly care, home
                 monitoring, or entertainment. In all of these
                 applications, VSNs monitor a potentially large group of
                 people and record sensitive image data that might
                 contain identities of persons, their behavior,
                 interaction patterns, or personal preferences. These
                 intimate details can be easily abused, for example, to
                 derive personal profiles. The highly sensitive nature
                 of images makes security and privacy in VSNs even more
                 important than in most other sensor and data networks.
                 However, the direct use of security techniques
                 developed for related domains might be misleading due
                 to the different requirements and design challenges.
                 This is especially true for aspects such as data
                 confidentiality and privacy protection against
                 insiders, generating awareness among monitored people,
                 and giving trustworthy feedback about recorded personal
                 data-all of these aspects go beyond what is typically
                 required in other applications. In this survey, we
                 present an overview of the characteristics of VSN
                 applications, the involved security threats and attack
                 scenarios, and the major security challenges. A central
                 contribution of this survey is our classification of
                 VSN security aspects into data-centric, node-centric,
                 network-centric, and user-centric security. We identify
                 and discuss the individual security requirements and
                 present a profound overview of related work for each
                 class. We then discuss privacy protection techniques
                 and identify recent trends in VSN security and privacy.
                 A discussion of open research issues concludes this
                 survey.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shi:2014:CFB,
  author =       "Yue Shi and Martha Larson and Alan Hanjalic",
  title =        "Collaborative Filtering beyond the User-Item Matrix: a
                 Survey of the State of the Art and Future Challenges",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "1",
  pages =        "3:1--3:??",
  month =        may,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2556270",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed May 21 09:48:38 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Over the past two decades, a large amount of research
                 effort has been devoted to developing algorithms that
                 generate recommendations. The resulting research
                 progress has established the importance of the
                 user-item (U-I) matrix, which encodes the individual
                 preferences of users for items in a collection, for
                 recommender systems. The U-I matrix provides the basis
                 for collaborative filtering (CF) techniques, the
                 dominant framework for recommender systems. Currently,
                 new recommendation scenarios are emerging that offer
                 promising new information that goes beyond the U-I
                 matrix. This information can be divided into two
                 categories related to its source: rich side information
                 concerning users and items, and interaction information
                 associated with the interplay of users and items. In
                 this survey, we summarize and analyze recommendation
                 scenarios involving information sources and the CF
                 algorithms that have been recently developed to address
                 them. We provide a comprehensive introduction to a
                 large body of research, more than 200 key references,
                 with the aim of supporting the further development of
                 recommender systems exploiting information beyond the
                 U-I matrix. On the basis of this material, we identify
                 and discuss what we see as the central challenges lying
                 ahead for recommender system technology, both in terms
                 of extensions of existing techniques as well as of the
                 integration of techniques and technologies drawn from
                 other research areas.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Howard:2014:SDE,
  author =       "Catherine Howard and Markus Stumptner",
  title =        "A Survey of Directed Entity-Relation--Based
                 First-Order Probabilistic Languages",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "1",
  pages =        "4:1--4:??",
  month =        may,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2560546",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed May 21 09:48:38 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Languages that combine aspects of probabilistic
                 representations with aspects of first-order logic are
                 referred to as first-order probabilistic languages
                 (FOPLs). FOPLs can be divided into three categories:
                 rule-based, procedural-based and entity-relation--based
                 languages. This article presents a survey of directed
                 entity-relation--based FOPLs and their associated model
                 construction and inference algorithms.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Toosi:2014:ICC,
  author =       "Adel Nadjaran Toosi and Rodrigo N. Calheiros and
                 Rajkumar Buyya",
  title =        "Interconnected Cloud Computing Environments:
                 Challenges, Taxonomy, and Survey",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "1",
  pages =        "7:1--7:??",
  month =        may,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2593512",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed May 21 09:48:38 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A brief review of the Internet history reveals the
                 fact that the Internet evolved after the formation of
                 primarily independent networks. Similarly,
                 interconnected clouds, also called Inter-cloud, can be
                 viewed as a natural evolution of cloud computing.
                 Recent studies show the benefits in utilizing multiple
                 clouds and present attempts for the realization of an
                 Inter-cloud or federated cloud environment. However,
                 cloud vendors have not taken into account cloud
                 interoperability issues, and each cloud comes with its
                 own solution and interfaces for services. This survey
                 initially discusses all the relevant aspects motivating
                 cloud interoperability. Furthermore, it categorizes and
                 identifies possible cloud interoperability scenarios
                 and architectures. The spectrum of challenges and
                 obstacles that the Inter-cloud realization is faced
                 with are covered, a taxonomy of them is provided, and
                 fitting enablers that tackle each challenge are
                 identified. All these aspects require a comprehensive
                 review of the state of the art, including ongoing
                 projects and studies in the area. We conclude by
                 discussing future directions and trends toward the
                 holistic approach in this regard.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chong:2014:SUI,
  author =       "Ming Ki Chong and Rene Mayrhofer and Hans Gellersen",
  title =        "A Survey of User Interaction for Spontaneous Device
                 Association",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "1",
  pages =        "8:1--8:??",
  month =        may,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2597768",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed May 21 09:48:38 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In a wireless world, users can establish ad hoc
                 virtual connections between devices that are unhampered
                 by cables. This process is known as spontaneous device
                 association. A wide range of interactive protocols and
                 techniques have been demonstrated in both research and
                 practice, predominantly with a focus on security
                 aspects. In this article, we survey spontaneous device
                 association with respect to the user interaction it
                 involves. We use a novel taxonomy to structure the
                 survey with respect to the different conceptual models
                 and types of user action employed for device
                 association. Within this framework, we provide an
                 in-depth survey of existing techniques discussing their
                 individual characteristics, benefits, and issues.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Akiki:2014:AMD,
  author =       "Pierre A. Akiki and Arosha K. Bandara and Yijun Yu",
  title =        "Adaptive Model-Driven User Interface Development
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "1",
  pages =        "9:1--9:??",
  month =        may,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2597999",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed May 21 09:48:38 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Adaptive user interfaces (UIs) were introduced to
                 address some of the usability problems that plague many
                 software applications. Model-driven engineering formed
                 the basis for most of the systems targeting the
                 development of such UIs. An overview of these systems
                 is presented and a set of criteria is established to
                 evaluate the strengths and shortcomings of the state of
                 the art, which is categorized under architectures,
                 techniques, and tools. A summary of the evaluation is
                 presented in tables that visually illustrate the
                 fulfillment of each criterion by each system. The
                 evaluation identified several gaps in the existing art
                 and highlighted the areas of promising improvement.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Aggarwal:2014:ENA,
  author =       "Charu Aggarwal and Karthik Subbian",
  title =        "Evolutionary Network Analysis: a Survey",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "1",
  pages =        "10:1--10:??",
  month =        may,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2601412",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed May 21 09:48:38 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Evolutionary network analysis has found an increasing
                 interest in the literature because of the importance of
                 different kinds of dynamic social networks, email
                 networks, biological networks, and social streams. When
                 a network evolves, the results of data mining
                 algorithms such as community detection need to be
                 correspondingly updated. Furthermore, the specific
                 kinds of changes to the structure of the network, such
                 as the impact on community structure or the impact on
                 network structural parameters, such as node degrees,
                 also needs to be analyzed. Some dynamic networks have a
                 much faster rate of edge arrival and are referred to as
                 network streams or graph streams. The analysis of such
                 networks is especially challenging, because it needs to
                 be performed with an online approach, under the
                 one-pass constraint of data streams. The incorporation
                 of content can add further complexity to the evolution
                 analysis process. This survey provides an overview of
                 the vast literature on graph evolution analysis and the
                 numerous applications that arise in different
                 contexts.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Paulo:2014:SCS,
  author =       "Jo{\~a}o Paulo and Jos{\'e} Pereira",
  title =        "A Survey and Classification of Storage Deduplication
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "1",
  pages =        "11:1--11:??",
  month =        jul,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2611778",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 9 16:27:25 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The automatic elimination of duplicate data in a
                 storage system, commonly known as deduplication, is
                 increasingly accepted as an effective technique to
                 reduce storage costs. Thus, it has been applied to
                 different storage types, including archives and
                 backups, primary storage, within solid-state drives,
                 and even to random access memory. Although the general
                 approach to deduplication is shared by all storage
                 types, each poses specific challenges and leads to
                 different trade-offs and solutions. This diversity is
                 often misunderstood, thus underestimating the relevance
                 of new research and development. The first contribution
                 of this article is a classification of deduplication
                 systems according to six criteria that correspond to
                 key design decisions: granularity, locality, timing,
                 indexing, technique, and scope. This classification
                 identifies and describes the different approaches used
                 for each of them. As a second contribution, we describe
                 which combinations of these design decisions have been
                 proposed and found more useful for challenges in each
                 storage type. Finally, outstanding research challenges
                 and unexplored design points are identified and
                 discussed.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wang:2014:MSN,
  author =       "You-Chiun Wang",
  title =        "Mobile Sensor Networks: System Hardware and Dispatch
                 Software",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "1",
  pages =        "12:1--12:??",
  month =        jul,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2617662",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 9 16:27:25 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Wireless sensor networks (WSNs) provide a convenient
                 way to monitor the physical environment. They consist
                 of a large number of sensors that have sensing,
                 computing, and communication abilities. In the past,
                 sensors were considered as static, but the network
                 functionality would degrade when some sensors were
                 broken. Today, the emerging hardware techniques have
                 promoted the development of mobile sensors. Introducing
                 mobility to sensors not only improves their capability
                 but also gives them flexibility to deal with node
                 failure. The article studies the research progress of
                 mobile sensor networks, which embraces both system
                 hardware and dispatch software. For system hardware, we
                 review two popular types of mobile sensor platforms.
                 One is to integrate mobile robots with sensors, whereas
                 the other is to use existing conveyances to carry
                 sensors. Dispatch software includes two topics. We
                 first address how to solve different coverage problems
                 by using a purely mobile WSN and then investigate how
                 to dispatch mobile sensors in a hybrid WSN to perform
                 various missions including data collection, faulty
                 recovery, and event analysis. A discussion about
                 research challenges in mobile sensor networks is also
                 presented in the article.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Paola:2014:IMS,
  author =       "Alessandra {De Paola} and Marco Ortolani and Giuseppe
                 {Lo Re} and Giuseppe Anastasi and Sajal K. Das",
  title =        "Intelligent Management Systems for Energy Efficiency
                 in Buildings: a Survey",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "1",
  pages =        "13:1--13:??",
  month =        jul,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2611779",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 9 16:27:25 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In recent years, reduction of energy consumption in
                 buildings has increasingly gained interest among
                 researchers mainly due to practical reasons, such as
                 economic advantages and long-term environmental
                 sustainability. Many solutions have been proposed in
                 the literature to address this important issue from
                 complementary perspectives, which are often hard to
                 capture in a comprehensive manner. This survey article
                 aims at providing a structured and unifying treatment
                 of the existing literature on intelligent energy
                 management systems in buildings, with a distinct focus
                 on available architectures and methodology supporting a
                 vision transcending the well-established smart home
                 vision, in favor of the novel Ambient Intelligence
                 paradigm. Our exposition will cover the main
                 architectural components of such systems, beginning
                 with the basic sensory infrastructure, moving on to the
                 data processing engine where energy-saving strategies
                 may be enacted, to the user interaction interface
                 subsystem, and finally to the actuation infrastructure
                 necessary to transfer the planned modifications to the
                 environment. For each component, we will analyze
                 different solutions, and we will provide qualitative
                 comparisons, also highlighting the impact that a single
                 design choice can have on the rest of the system.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Treurniet:2014:TSM,
  author =       "Joanne Treurniet",
  title =        "A Taxonomy and Survey of Microscopic Mobility Models
                 from the Mobile Networking Domain",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "1",
  pages =        "14:1--14:??",
  month =        jul,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2616973",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 9 16:27:25 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A mobility model is used to generate the trajectories
                 of mobile nodes in simulations when developing new
                 algorithms for mobile networks. A model must
                 realistically reflect the scenario in which the
                 technology will be used to reliably validate the
                 algorithm. Considerable progress has been made toward
                 realistic mobility models in the academic literature,
                 and models have become quite complex. A consistent
                 taxonomy has not yet been established for this field. A
                 new multifaceted taxonomy is presented in this work
                 that provides a framework for authors to clearly and
                 consistently describe their models, making them easier
                 to understand and reproduce. By surveying the
                 application field of mobile communication networks, a
                 common nomenclature and a high-level view of existing
                 literature are provided, which are required to reduce
                 duplication of effort and to enable a better sense of
                 the way forward. A tactical scenario demonstrates the
                 application of the taxonomy to model construction.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

%%% TO DO: The ACM Web site assigned v47n2 to November 2014, but
%%% later changed it to January 2015.  Resolve the problem after
%%% the printed issue arrives (v46n4 arrived 7-Jan-2015, so print
%%% volumes are seriously behind the electronic ones!).
@Article{Campos:2014:STI,
  author =       "Ricardo Campos and Ga{\"e}l Dias and Al{\'\i}pio M.
                 Jorge and Adam Jatowt",
  title =        "Survey of Temporal Information Retrieval and Related
                 Applications",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "15:1--15:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2619088",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Temporal information retrieval has been a topic of
                 great interest in recent years. Its purpose is to
                 improve the effectiveness of information retrieval
                 methods by exploiting temporal information in documents
                 and queries. In this article, we present a survey of
                 the existing literature on temporal information
                 retrieval. In addition to giving an overview of the
                 field, we categorize the relevant research, describe
                 the main contributions, and compare different
                 approaches. We organize existing research to provide a
                 coherent view, discuss several open issues, and point
                 out some possible future research directions in this
                 area. Despite significant advances, the area lacks a
                 systematic arrangement of prior efforts and an overview
                 of state-of-the-art approaches. Moreover, an effective
                 end-to-end temporal retrieval system that exploits
                 temporal information to improve the quality of the
                 presented results remains undeveloped.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gostner:2014:GMT,
  author =       "Roswitha Gostner and Bianca Baldacci and Melissa J.
                 Morine and Corrado Priami",
  title =        "Graphical Modeling Tools for Systems Biology",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "16:1--16:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2633461",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Modeling biological systems to understand their
                 mechanistic behavior is an important activity in
                 molecular systems biology. Mathematical modeling
                 typically requires deep mathematical or computing
                 knowledge, and this limits the spread of modeling tools
                 among biologists. Graphical modeling languages have
                 been introduced to minimize this limit. Here, we survey
                 the main graphical formalisms (supported by software
                 tools) available to model biological systems with a
                 primary focus on their usability, within the framework
                 of modeling reaction pathways with two-dimensional (2D)
                 (possibly nested) compartments. Considering the main
                 characteristics of the surveyed formalisms, we
                 synthesize a new proposal (Style) and report the
                 results of an online survey conducted among biologists
                 to assess usability of available graphical formalisms.
                 We consider this proposal a guideline developed from
                 what we learned in the survey, which can inform
                 development of graphical formalisms to model reaction
                 pathways in 2D space.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Thomasian:2014:AFJ,
  author =       "Alexander Thomasian",
  title =        "Analysis of Fork\slash Join and Related Queueing
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "17:1--17:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2628913",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Fork/join (F/J) requests arise in contexts such as
                 parallel computing, query processing in parallel
                 databases, and parallel disk access in RAID. F/J
                 requests spawn $K$ tasks that are sent to $K$ parallel
                 servers, and the completion of all $K$ tasks marks the
                 completion of an F/J request. The exact formula for the
                 mean response time of $ K = 2$-way F/J requests derived
                 under Markovian assumptions ($ R^{\rm F / J}_2$) served
                 as the starting point for an approximate expression for
                 $ R^{\rm F / J}_K$ for $ 2 < K \leq = 32$. When servers
                 process independent requests in addition to F/J
                 requests, the mean response time of F/J requests is
                 better approximated by $ R^{\rm max}_K$, which is the
                 maximum of the response times of tasks constituting F/J
                 requests. $ R^{\rm max}_K$ is easier to compute and
                 serves as an upper bound to $ R^{\rm F / J}_K$. We
                 discuss techniques to compute $ R^{\rm max}_K$ and
                 generally the maximum of $K$ random variables denoting
                 the processing times of the tasks of a parallel
                 computation $ \bar {X}^{\rm max}_K$. Graph models of
                 computations such as Petri nets --- a more general form
                 of parallelism than F/J requests --- are also discussed
                 in this work. Jobs with precedence constraints may
                 require multiple resources, which are represented by a
                 queueing network model. We also discuss various
                 queueing systems related to F/J queueing systems and
                 outline their analysis.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bosch:2014:SPS,
  author =       "Christoph B{\"o}sch and Pieter Hartel and Willem
                 Jonker and Andreas Peter",
  title =        "A Survey of Provably Secure Searchable Encryption",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "18:1--18:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2636328",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We survey the notion of provably secure searchable
                 encryption (SE) by giving a complete and comprehensive
                 overview of the two main SE techniques: searchable
                 symmetric encryption (SSE) and public key encryption
                 with keyword search (PEKS). Since the pioneering work
                 of Song, Wagner, and Perrig (IEEE S{\&}P '00), the
                 field of provably secure SE has expanded to the point
                 where we felt that taking stock would provide benefit
                 to the community. The survey has been written primarily
                 for the nonspecialist who has a basic information
                 security background. Thus, we sacrifice full details
                 and proofs of individual constructions in favor of an
                 overview of the underlying key techniques. We
                 categorize and compare the different SE schemes in
                 terms of their security, efficiency, and functionality.
                 For the experienced researcher, we point out
                 connections between the many approaches to SE and
                 identify open research problems. Two major conclusions
                 can be drawn from our work. While the so-called
                 IND-CKA2 security notion becomes prevalent in the
                 literature and efficient (sublinear) SE schemes meeting
                 this notion exist in the symmetric setting, achieving
                 this strong form of security efficiently in the
                 asymmetric setting remains an open problem. We observe
                 that in multirecipient SE schemes, regardless of their
                 efficiency drawbacks, there is a noticeable lack of
                 query expressiveness that hinders deployment in
                 practice.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mittal:2014:SMA,
  author =       "Sparsh Mittal and Jeffrey S. Vetter",
  title =        "A Survey of Methods for Analyzing and Improving {GPU}
                 Energy Efficiency",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "19:1--19:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2636342",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Recent years have witnessed phenomenal growth in the
                 computational capabilities and applications of GPUs.
                 However, this trend has also led to a dramatic increase
                 in their power consumption. This article surveys
                 research works on analyzing and improving energy
                 efficiency of GPUs. It also provides a classification
                 of these techniques on the basis of their main research
                 idea. Further, it attempts to synthesize research works
                 that compare the energy efficiency of GPUs with other
                 computing systems (e.g., FPGAs and CPUs). The aim of
                 this survey is to provide researchers with knowledge of
                 the state of the art in GPU power management and
                 motivate them to architect highly energy-efficient GPUs
                 of tomorrow.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Abid:2014:SDB,
  author =       "Shahbaz Akhtar Abid and Mazliza Othman and Nadir
                 Shah",
  title =        "A Survey on {DHT}-Based Routing for Large-Scale Mobile
                 Ad Hoc Networks",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "20:1--20:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2632296",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Mobile ad hoc networks (MANETs) are infrastructureless
                 and distributed communication systems that require
                 sophisticated approaches to routing to cope with node
                 mobility and heterogeneous application requirements. In
                 the past few years, distributed hash table (DHT) has
                 come forth as a useful additional technique to the
                 design and specification of spontaneous and
                 self-organized networks. Researchers have exploited its
                 advantages by implementing it at the network layer and
                 developing scalable routing protocols for MANETs. The
                 implementation of DHT-based routing in a MANET requires
                 different algorithms and specifications compared to
                 routing in the Internet because a MANET has its unique
                 characteristics, such as node mobility, spontaneous
                 networking, decentralized architecture, limited
                 transmission range, dynamic topology, and frequent
                 network partitioning/merging. In this article, we
                 present a comprehensive survey of research related to
                 DHT-based routing that aims at enhancing the
                 scalability of MANETs. We present a vivid taxonomy of
                 DHT-based routing protocols and the guidelines to
                 design such protocols for MANETs. We compare the
                 features, strengths, and weaknesses of existing
                 DHT-based routing protocols and highlight key research
                 challenges that are vital to address. The outcome of
                 the analysis serves as a guide for anyone willing to
                 delve into research on DHT-based routing in MANETs.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Qiu:2014:RTW,
  author =       "Dong Qiu and Bixin Li and Shunhui Ji and Hareton
                 Leung",
  title =        "Regression Testing of {Web} Service: a Systematic
                 Mapping Study",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "21:1--21:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2631685",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Web service is a widely used implementation technique
                 under the paradigm of Service-Oriented Architecture
                 (SOA). A service-based system is subjected to
                 continuous evolution and regression testing is required
                 to check whether new faults have been introduced. Based
                 on the current scientific work of web service
                 regression testing, this survey aims to identify gaps
                 in current research and suggests some promising areas
                 for further study. To this end, we performed a broad
                 automatic search on publications in the selected
                 electronic databases published from 2000 to 2013.
                 Through our careful review and manual screening, a
                 total of 30 papers have been selected as primary
                 studies for answering our research questions. We
                 presented a qualitative analysis of the findings,
                 including stakeholders, challenges, standards,
                 techniques, and validations employed in these primary
                 studies. Our main results include the following: (1)
                 Service integrator is the key stakeholder that largely
                 impacts how regression testing is performed. (2)
                 Challenges of cost and autonomy issues have been
                 studied heavily. However, more emphasis should be put
                 on the other challenges, such as test timing, dynamics,
                 privacy, quota constraints, and concurrency issues. (3)
                 Orchestration-based services have been largely studied,
                 while little attention has been paid to either
                 choreography-based services or semantic-based services.
                 (4) An appreciable amount of web service regression
                 testing techniques have been proposed, including 48
                 test case prioritization techniques, 10 test selection
                 techniques, two test suite minimization techniques, and
                 another collaborative technique. (5) Many regression
                 test techniques have not been theoretically proven or
                 experimentally analyzed, which limits their application
                 in large-scale systems. We believe that our survey has
                 identified gaps in current research work and reveals
                 new insights for the future work.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Boukerche:2014:ORW,
  author =       "Azzedine Boukerche and Amir Darehshoorzadeh",
  title =        "Opportunistic Routing in Wireless Networks: Models,
                 Algorithms, and Classifications",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "22:1--22:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2635675",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Opportunistic Routing (OR) is a new promising paradigm
                 that has been proposed for wireless networks. OR has
                 gained a lot of attention from the research communities
                 for its ability to increase the performance of wireless
                 networks. It benefits from the broadcast characteristic
                 of wireless mediums to improve network performance. The
                 basic function of OR is its ability to overhear the
                 transmitted packet and to coordinate among relaying
                 nodes. In OR, a candidate set is a potential group of
                 nodes that is selected as the next-hop forwarders.
                 Hence, each node in OR can use different potential
                 paths to send packets toward the destination. Any of
                 the candidates of a node that have received the
                 transmitted packet may forward it. The decision of
                 choosing the next forwarder is made by coordination
                 between candidates that have successfully received the
                 transmitted packet. In OR, by using a dynamic relay
                 node to forward the packet, the transmission
                 reliability and network throughput can be increased. In
                 this article, we explain the fundamental idea of OR and
                 its important issues by providing some examples. We
                 then categorize each of the important issues and
                 explain them in detail. Furthermore, we illustrate
                 different protocols from each category and compare
                 their benefits and drawbacks. Finally, some potential
                 directions for future research in OR is explained.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Laszka:2014:SII,
  author =       "Aron Laszka and Mark Felegyhazi and Levente Buttyan",
  title =        "A Survey of Interdependent Information Security
                 Games",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "23:1--23:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2635673",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Risks faced by information system operators and users
                 are not only determined by their own security posture,
                 but are also heavily affected by the security-related
                 decisions of others. This interdependence between
                 information system operators and users is a fundamental
                 property that shapes the efficiency of security defense
                 solutions. Game theory is the most appropriate method
                 to model the strategic interactions between these
                 participants. In this survey, we summarize
                 game-theoretic interdependence models, characterize the
                 emerging security inefficiencies, and present
                 mechanisms to improve the security decisions of the
                 participants. We focus our attention on games with
                 interdependent defenders and do not discuss two-player
                 attacker-defender games. Our goal is to distill the
                 main insights from the state of the art and to identify
                 the areas that need more attention from the research
                 community.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Newell:2014:NCR,
  author =       "Andrew Newell and Hongyi Yao and Alex Ryker and Tracey
                 Ho and Cristina Nita-Rotaru",
  title =        "Node-Capture Resilient Key Establishment in Sensor
                 Networks: Design Space and New Protocols",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "24:1--24:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2636344",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Key management is required for basic security services
                 of confidentiality, integrity, and data source
                 authentication. Wireless sensor networks (WSNs) are a
                 challenging environment to provide such services due to
                 the resource constraints and the increased likelihood
                 of nodes to be captured. Various key management
                 techniques were proposed that trade off resilience to
                 node capture and overhead in terms of communication and
                 memory. We identify the main factors influencing the
                 design space of key management protocols for sensor
                 networks and describe representative protocols that
                 trade off the number of links established,
                 communication overhead, and resilience to node capture.
                 These trade-offs are due to using direct, path-based,
                 or multipath-based communication to establish secure
                 links. We propose a new multipath protocol relying on
                 an encoding scheme tailored for WSNs and analyze the
                 effects of key pre-distribution on multipath key
                 establishment. We provide extensive simulations to
                 understand the trade-offs between resilience to node
                 compromise and communication overhead under numerous
                 network scenarios. This comparison highlights the
                 trade-offs between these vastly different key
                 management schemes. For the newer class of key
                 management schemes-multipath based-we quantify
                 experimentally the additional communication overhead
                 required for extra paths and the improvement in
                 resilience from using these paths.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Calabrese:2014:USU,
  author =       "Francesco Calabrese and Laura Ferrari and Vincent D.
                 Blondel",
  title =        "Urban Sensing Using Mobile Phone Network Data: a
                 Survey of Research",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "25:1--25:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2655691",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The recent development of telecommunication networks
                 is producing an unprecedented wealth of information
                 and, as a consequence, an increasing interest in
                 analyzing such data both from telecoms and from other
                 stakeholders' points of view. In particular, mobile
                 phone datasets offer access to insights into urban
                 dynamics and human activities at an unprecedented scale
                 and level of detail, representing a huge opportunity
                 for research and real-world applications. This article
                 surveys the new ideas and techniques related to the use
                 of telecommunication data for urban sensing. We outline
                 the data that can be collected from telecommunication
                 networks as well as their strengths and weaknesses with
                 a particular focus on urban sensing. We survey existing
                 filtering and processing techniques to extract insights
                 from this data and summarize them to provide
                 recommendations on which datasets and techniques to use
                 for specific urban sensing applications. Finally, we
                 discuss a number of challenges and open research areas
                 currently being faced in this field. We strongly
                 believe the material and recommendations presented here
                 will become increasingly important as mobile phone
                 network datasets are becoming more accessible to the
                 research community.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bonnin:2014:AGM,
  author =       "Geoffray Bonnin and Dietmar Jannach",
  title =        "Automated Generation of Music Playlists: Survey and
                 Experiments",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "26:1--26:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2652481",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Most of the time when we listen to music on the radio
                 or on our portable devices, the order in which the
                 tracks are played is governed by so-called playlists.
                 These playlists are basically sequences of tracks that
                 traditionally are designed manually and whose
                 organization is based on some underlying logic or
                 theme. With the digitalization of music and the
                 availability of various types of additional
                 track-related information on the Web, new opportunities
                 have emerged on how to automate the playlist creation
                 process. Correspondingly, a number of proposals for
                 automated playlist generation have been made in the
                 literature during the past decade. These approaches
                 vary both with respect to which kind of data they rely
                 on and which types of algorithms they use. In this
                 article, we review the literature on automated playlist
                 generation and categorize the existing approaches.
                 Furthermore, we discuss the evaluation designs that are
                 used today in research to assess the quality of the
                 generated playlists. Finally, we report the results of
                 a comparative evaluation of typical playlist generation
                 schemes based on historical data. Our results show that
                 track and artist popularity can play a dominant role
                 and that additional measures are required to better
                 characterize and compare the quality of automatically
                 generated playlists.",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jagadeesan:2014:SDN,
  author =       "Nachikethas A. Jagadeesan and Bhaskar Krishnamachari",
  title =        "Software-Defined Networking Paradigms in Wireless
                 Networks: a Survey",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "27:1--27:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2655690",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Software-defined networking (SDN) has generated
                 tremendous interest from both academia and industry.
                 SDN aims at simplifying network management while
                 enabling researchers to experiment with network
                 protocols on deployed networks. This article is a
                 distillation of the state of the art of SDN in the
                 context of wireless networks. We present an overview of
                 the major design trends and highlight key differences
                 between them.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Marasco:2014:SAS,
  author =       "Emanuela Marasco and Arun Ross",
  title =        "A Survey on Antispoofing Schemes for Fingerprint
                 Recognition Systems",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "28:1--28:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2617756",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Several issues related to the vulnerability of
                 fingerprint recognition systems to attacks have been
                 highlighted in the biometrics literature. One such
                 vulnerability involves the use of artificial fingers,
                 where materials such as Play-Doh, silicone, and gelatin
                 are inscribed with fingerprint ridges. Researchers have
                 demonstrated that some commercial fingerprint
                 recognition systems can be deceived when these
                 artificial fingers are placed on the sensor; that is,
                 the system successfully processes the ensuing
                 fingerprint images, thereby allowing an adversary to
                 spoof the fingerprints of another individual. However,
                 at the same time, several countermeasures that
                 discriminate between live fingerprints and spoof
                 artifacts have been proposed. While some of these
                 antispoofing schemes are hardware based, several
                 software-based approaches have been proposed as well.
                 In this article, we review the literature and present
                 the state of the art in fingerprint antispoofing.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ziaie:2014:MCD,
  author =       "Pujan Ziaie",
  title =        "A Model for Context in the Design of Open Production
                 Communities",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "29:1--29:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2661642",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Open production communities (OPCs) provide technical
                 features and social norms for a vast but dispersed and
                 diverse crowd to collectively accumulate content. In
                 OPCs, certain mechanisms, policies, and technologies
                 are provided for voluntary users to participate in
                 community-related activities including content
                 generation, evaluation, qualification, and distribution
                 and in some cases even community governance. Due to the
                 known complexities and dynamism of online communities,
                 designing a successful community is deemed more an art
                 than a science. Numerous studies have investigated
                 different aspects of certain types of OPCs. Most of
                 these studies, however, fall short of delivering a
                 general view or prescription due to their narrow focus
                 on a certain type of OPCs. In contribution to theories
                 on technology-mediated social participation (TMSP),
                 this study synthesizes the streams of research in the
                 particular area of OPCs and delivers a theoretical
                 framework as a baseline for adapting findings from one
                 specific type of community on another. This framework
                 consists of four primary dimensions, namely, platform
                 features, content, user, and community. The
                 corresponding attributes of these dimensions and the
                 existing interdependencies are discussed in detail.
                 Furthermore, a decision diagram for selecting features
                 and a design guideline for ``decontextualizing''
                 findings are introduced as possible applications of the
                 framework. The framework also provides a new and
                 reliable foundation on which future research can extend
                 its findings and prescriptions in a systematic way.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kong:2014:SGE,
  author =       "Fanxin Kong and Xue Liu",
  title =        "A Survey on Green-Energy-Aware Power Management for
                 Datacenters",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "30:1--30:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2642708",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Megawatt-scale datacenters have emerged to meet the
                 increasing demand for IT applications and services. The
                 hunger for power brings large electricity bills to
                 datacenter operators and causes significant impacts to
                 the environment. To reduce costs and environmental
                 impacts, modern datacenters, such as those of Google
                 and Apple, are beginning to integrate renewable or
                 green energy sources into their power supply. This
                 article investigates the green-energy-aware power
                 management problem for these datacenters and surveys
                 and classifies works that explicitly consider renewable
                 energy and/or carbon emission. Our aim is to give a
                 full view of this problem. Hence, we first provide some
                 basic knowledge on datacenters (including datacenter
                 components, power infrastructure, power load
                 estimation, and energy sources' operations), the
                 electrical grid (including dynamic pricing, power
                 outages, and emission factor), and the carbon market
                 (including cap-and-trade and carbon tax). Then, we
                 categorize existing research works according to their
                 basic approaches used, including workload scheduling,
                 virtual machine management, and energy capacity
                 planning. Each category's discussion includes the
                 description of the shared core idea, qualitative
                 analysis, and quantitative analysis among works of this
                 category.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cockburn:2014:SNE,
  author =       "Andy Cockburn and Carl Gutwin and Joey Scarr and
                 Sylvain Malacria",
  title =        "Supporting Novice to Expert Transitions in User
                 Interfaces",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "31:1--31:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2659796",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Interface design guidelines encourage designers to
                 provide high-performance mechanisms for expert users.
                 However, research shows that many expert interface
                 components are seldom used and that there is a tendency
                 for users to persistently fail to adopt faster methods
                 for completing their work. This article summarizes and
                 organizes research relevant to supporting users in
                 making successful transitions to expert levels of
                 performance. First, we provide a brief introduction to
                 the underlying human factors of skill acquisition
                 relevant to interaction with computer systems. We then
                 present our focus, which is a review of the state of
                 the art in user interfaces that promote expertise
                 development. The review of interface research is based
                 around four domains of performance improvement:
                 intramodal improvement that occurs as a factor of
                 repetition and practice with a single method of
                 interaction; intermodal improvement that occurs when
                 users switch from one method to another that has a
                 higher performance ceiling; vocabulary extension, in
                 which the user broadens his or her knowledge of the
                 range of functions available; and task mapping, which
                 examines the ways in which users perform their tasks.
                 The review emphasizes the relationship between
                 interface techniques and the human factors that explain
                 their relative success.",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Caceres-Cruz:2015:RVR,
  author =       "Jose Caceres-Cruz and Pol Arias and Daniel Guimarans
                 and Daniel Riera and Angel A. Juan",
  title =        "Rich Vehicle Routing Problem: Survey",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "32:1--32:??",
  month =        jan,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2666003",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jan 8 16:52:33 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The Vehicle Routing Problem (VRP) is a well-known
                 research line in the optimization research community.
                 Its different basic variants have been widely explored
                 in the literature. Even though it has been studied for
                 years, the research around it is still very active. The
                 new tendency is mainly focused on applying this study
                 case to real-life problems. Due to this trend, the Rich
                 VRP arises: combining multiple constraints for tackling
                 realistic problems. Nowadays, some studies have
                 considered specific combinations of real-life
                 constraints to define the emerging Rich VRP scopes.
                 This work surveys the state of the art in the field,
                 summarizing problem combinations, constraints defined,
                 and approaches found.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mastelic:2015:CCS,
  author =       "Toni Mastelic and Ariel Oleksiak and Holger Claussen
                 and Ivona Brandic and Jean-Marc Pierson and Athanasios
                 V. Vasilakos",
  title =        "Cloud Computing: Survey on Energy Efficiency",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "33:1--33:??",
  month =        jan,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2656204",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jan 8 16:52:33 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Cloud computing is today's most emphasized Information
                 and Communications Technology (ICT) paradigm that is
                 directly or indirectly used by almost every online
                 user. However, such great significance comes with the
                 support of a great infrastructure that includes large
                 data centers comprising thousands of server units and
                 other supporting equipment. Their share in power
                 consumption generates between 1.1\% and 1.5\% of the
                 total electricity use worldwide and is projected to
                 rise even more. Such alarming numbers demand rethinking
                 the energy efficiency of such infrastructures. However,
                 before making any changes to infrastructure, an
                 analysis of the current status is required. In this
                 article, we perform a comprehensive analysis of an
                 infrastructure supporting the cloud computing paradigm
                 with regards to energy efficiency. First, we define a
                 systematic approach for analyzing the energy efficiency
                 of most important data center domains, including server
                 and network equipment, as well as cloud management
                 systems and appliances consisting of a software
                 utilized by end users. Second, we utilize this approach
                 for analyzing available scientific and industrial
                 literature on state-of-the-art practices in data
                 centers and their equipment. Finally, we extract
                 existing challenges and highlight future research
                 directions.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Li:2015:CMO,
  author =       "Xin Li and S. S. Iyengar",
  title =        "On Computing Mapping of {$3$D} Objects: a Survey",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "34:1--34:??",
  month =        jan,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2668020",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jan 8 16:52:33 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We review the computation of 3D geometric data
                 mapping, which establishes one-to-one correspondence
                 between or among spatial/spatiotemporal objects.
                 Effective mapping benefits many scientific and
                 engineering tasks that involve the modeling and
                 processing of correlated geometric or image data. We
                 model mapping computation as an optimization problem
                 with certain geometric constraints and go through its
                 general solving pipeline. Different mapping algorithms
                 are discussed and compared according to their
                 formulations of objective functions, constraints, and
                 optimization strategies.",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Borrajo:2015:PCB,
  author =       "Daniel Borrajo and Anna Roub{\'\i}ckov{\'a} and Ivan
                 Serina",
  title =        "Progress in Case-Based Planning",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "35:1--35:??",
  month =        jan,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2674024",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jan 8 16:52:33 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Case-based planning (CBP) is an approach to automated
                 planning that tries to save computational effort by
                 reusing previously found solutions. In 2001, Spalazzi
                 published a survey of work in CBP; here, we present an
                 updated overview of systems that have contributed to
                 the evolution of the field or addressed some issues
                 related to planning by reuse in a novel way. The
                 article presents relevant planners so that readers gain
                 insight into the operation of these systems. This
                 analysis will allow readers to understand the
                 approaches both in the quality of the solutions and in
                 the complexity of finding them.",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhou:2015:LRM,
  author =       "Xiaowei Zhou and Can Yang and Hongyu Zhao and Weichuan
                 Yu",
  title =        "Low-Rank Modeling and Its Applications in Image
                 Analysis",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "36:1--36:??",
  month =        jan,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2674559",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jan 8 16:52:33 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Low-rank modeling generally refers to a class of
                 methods that solves problems by representing variables
                 of interest as low-rank matrices. It has achieved great
                 success in various fields including computer vision,
                 data mining, signal processing, and bioinformatics.
                 Recently, much progress has been made in theories,
                 algorithms, and applications of low-rank modeling, such
                 as exact low-rank matrix recovery via convex
                 programming and matrix completion applied to
                 collaborative filtering. These advances have brought
                 more and more attention to this topic. In this article,
                 we review the recent advances of low-rank modeling, the
                 state-of-the-art algorithms, and the related
                 applications in image analysis. We first give an
                 overview of the concept of low-rank modeling and the
                 challenging problems in this area. Then, we summarize
                 the models and algorithms for low-rank matrix recovery
                 and illustrate their advantages and limitations with
                 numerical experiments. Next, we introduce a few
                 applications of low-rank modeling in the context of
                 image analysis. Finally, we conclude this article with
                 some discussions.",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Siegle:2015:MRE,
  author =       "Felix Siegle and Tanya Vladimirova and J{\o}rgen
                 Ilstad and Omar Emam",
  title =        "Mitigation of Radiation Effects in {SRAM}-Based
                 {FPGAs} for Space Applications",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "37:1--37:??",
  month =        jan,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2671181",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jan 8 16:52:33 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The use of static random access memory (SRAM)-based
                 field programmable gate arrays (FPGAs) in harsh
                 radiation environments has grown in recent years. These
                 types of programmable devices require special
                 mitigation techniques targeting the configuration
                 memory, the user logic, and the embedded RAM blocks.
                 This article provides a comprehensive survey of the
                 literature published in this rich research field during
                 the past 10 years. Furthermore, it can also serve as a
                 tutorial for space engineers, scientists, and decision
                 makers who need an introduction to this topic.",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rodopoulos:2015:CFA,
  author =       "Dimitrios Rodopoulos and Georgia Psychou and Mohamed
                 M. Sabry and Francky Catthoor and Antonis Papanikolaou
                 and Dimitrios Soudris and Tobias G. Noll and David
                 Atienza",
  title =        "Classification Framework for Analysis and Modeling of
                 Physically Induced Reliability Violations",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "38:1--38:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2678276",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Technology downscaling is expected to amplify a
                 variety of reliability concerns in future digital
                 systems. A good understanding of reliability threats is
                 crucial for the creation of efficient mitigation
                 techniques. This survey performs a systematic
                 classification of the state of the art on the analysis
                 and modeling of such threats, which are caused by
                 physical mechanisms to digital systems. The purpose of
                 this article is to provide a classification tool that
                 can aid with the navigation across the entire landscape
                 of reliability analysis and modeling. A classification
                 framework is constructed in a top-down fashion from
                 complementary categories, each one addressing an
                 approach on reliability analysis and modeling. In
                 comparison to other classifications, the proposed
                 methodology approaches the target research domain in a
                 complete way, without suppressing hybrid works that
                 fall under multiple categories. To substantiate the
                 usability of the classification framework,
                 representative works from the state of the art are
                 mapped to each appropriate category and are briefly
                 analyzed. Thus, research trends and opportunities for
                 novel approaches can be identified.",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chaudhry:2015:TAS,
  author =       "Muhammad Tayyab Chaudhry and Teck Chaw Ling and Atif
                 Manzoor and Syed Asad Hussain and Jongwon Kim",
  title =        "Thermal-Aware Scheduling in Green Data Centers",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "39:1--39:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2678278",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Data centers can go green by saving electricity in two
                 major areas: computing and cooling. Servers in data
                 centers require a constant supply of cold air from
                 on-site cooling mechanisms for reliability. An
                 increased computational load makes servers dissipate
                 more power as heat and eventually amplifies the cooling
                 load. In thermal-aware scheduling, computations are
                 scheduled with the objective of reducing the
                 data-center-wide thermal gradient, hotspots, and
                 cooling magnitude. Complemented by heat modeling and
                 thermal-aware monitoring and profiling, this scheduling
                 is energy efficient and economical. A survey is
                 presented henceforth of thermal-ware scheduling and
                 associated techniques for green data centers.",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fabry:2015:TDS,
  author =       "Johan Fabry and Tom Dinkelaker and Jacques Noy{\'e}
                 and {\'E}ric Tanter",
  title =        "A Taxonomy of Domain-Specific Aspect Languages",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "40:1--40:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2685028",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Domain-Specific Aspect Languages (DSALs) are
                 Domain-Specific Languages (DSLs) designed to express
                 crosscutting concerns. Compared to DSLs, their
                 aspectual nature greatly amplifies the language design
                 space. We structure this space in order to shed light
                 on and compare the different domain-specific approaches
                 to deal with crosscutting concerns. We report on a
                 corpus of 36 DSALs covering the space, discuss a set of
                 design considerations, and provide a taxonomy of DSAL
                 implementation approaches. This work serves as a frame
                 of reference to DSAL and DSL researchers, enabling
                 further advances in the field, and to developers as a
                 guide for DSAL implementations.",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Roy:2015:SCP,
  author =       "Arpan Roy and Santonu Sarkar and Rajeshwari Ganesan
                 and Geetika Goel",
  title =        "Secure the Cloud: From the Perspective of a
                 Service-Oriented Organization",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "41:1--41:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2693841",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "In response to the revival of virtualized technology
                 by Rosenblum and Garfinkel [2005], NIST defined cloud
                 computing, a new paradigm in service computing
                 infrastructures. In cloud environments, the basic
                 security mechanism is ingrained in virtualization ---
                 that is, the execution of instructions at different
                 privilege levels. Despite its obvious benefits, the
                 caveat is that a crashed virtual machine (VM) is much
                 harder to recover than a crashed workstation. When
                 crashed, a VM is nothing but a giant corrupt binary
                 file and quite unrecoverable by standard disk-based
                 forensics. Therefore, VM crashes should be avoided at
                 all costs. Security is one of the major contributors to
                 such VM crashes. This includes compromising the
                 hypervisor, cloud storage, images of VMs used
                 infrequently, and remote cloud client used by the
                 customer as well as threat from malicious insiders.
                 Although using secure infrastructures such as private
                 clouds alleviate several of these security problems,
                 most cloud users end up using cheaper options such as
                 third-party infrastructures (i.e., private clouds),
                 thus a thorough discussion of all known security issues
                 is pertinent. Hence, in this article, we discuss
                 ongoing research in cloud security in order of the
                 attack scenarios exploited most often in the cloud
                 environment. We explore attack scenarios that call for
                 securing the hypervisor, exploiting co-residency of
                 VMs, VM image management, mitigating insider threats,
                 securing storage in clouds, abusing lightweight
                 software-as-a-service clients, and protecting data
                 propagation in clouds. Wearing a practitioner's
                 glasses, we explore the relevance of each attack
                 scenario to a service company like Infosys. At the same
                 time, we draw parallels between cloud security research
                 and implementation of security solutions in the form of
                 enterprise security suites for the cloud. We discuss
                 the state of practice in the form of enterprise
                 security suites that include cryptographic solutions,
                 access control policies in the cloud, new techniques
                 for attack detection, and security quality assurance in
                 clouds.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Renesse:2015:PMM,
  author =       "Robbert {Van Renesse} and Deniz Altinbuken",
  title =        "{Paxos} Made Moderately Complex",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "42:1--42:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2673577",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article explains the full reconfigurable
                 multidecree Paxos (or multi-Paxos) protocol. Paxos is
                 by no means a simple protocol, even though it is based
                 on relatively simple invariants. We provide pseudocode
                 and explain it guided by invariants. We initially avoid
                 optimizations that complicate comprehension. Next we
                 discuss liveness, list various optimizations that make
                 the protocol practical, and present variants of the
                 protocol.",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{DMello:2015:RMA,
  author =       "Sidney K. D'Mello and Jacqueline Kory",
  title =        "A Review and Meta-Analysis of Multimodal Affect
                 Detection Systems",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "43:1--43:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2682899",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Affect detection is an important pattern recognition
                 problem that has inspired researchers from several
                 areas. The field is in need of a systematic review due
                 to the recent influx of Multimodal (MM) affect
                 detection systems that differ in several respects and
                 sometimes yield incompatible results. This article
                 provides such a survey via a quantitative review and
                 meta-analysis of 90 peer-reviewed MM systems. The
                 review indicated that the state of the art mainly
                 consists of person-dependent models (62.2\% of systems)
                 that fuse audio and visual (55.6\%) information to
                 detect acted (52.2\%) expressions of basic emotions and
                 simple dimensions of arousal and valence (64.5\%) with
                 feature- (38.9\%) and decision-level (35.6\%) fusion
                 techniques. However, there were also person-independent
                 systems that considered additional modalities to detect
                 nonbasic emotions and complex dimensions using
                 model-level fusion techniques. The meta-analysis
                 revealed that MM systems were consistently (85\% of
                 systems) more accurate than their best unimodal
                 counterparts, with an average improvement of 9.83\%
                 (median of 6.60\%). However, improvements were three
                 times lower when systems were trained on natural
                 (4.59\%) versus acted data (12.7\%). Importantly, MM
                 accuracy could be accurately predicted (cross-validated
                 R$^2$ of 0.803) from unimodal accuracies and two
                 system-level factors. Theoretical and applied
                 implications and recommendations are discussed.",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Maglo:2015:MCS,
  author =       "Adrien Maglo and Guillaume Lavou{\'e} and Florent
                 Dupont and C{\'e}line Hudelot",
  title =        "{$3$D} Mesh Compression: Survey, Comparisons, and
                 Emerging Trends",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "44:1--44:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2693443",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  abstract =     "3D meshes are commonly used to represent virtual
                 surface and volumes. However, their raw data
                 representations take a large amount of space. Hence, 3D
                 mesh compression has been an active research topic
                 since the mid 1990s. In 2005, two very good review
                 articles describing the pioneering works were
                 published. Yet, new technologies have emerged since
                 then. In this article, we summarize the early works and
                 put the focus on these novel approaches. We classify
                 and describe the algorithms, evaluate their
                 performance, and provide synthetic comparisons. We also
                 outline the emerging trends for future research.",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Diez:2015:QRC,
  author =       "Yago D{\'\i}ez and Ferran Roure and Xavier Llad{\'o}
                 and Joaquim Salvi",
  title =        "A Qualitative Review on {$3$D} Coarse Registration
                 Methods",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "45:1--45:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2692160",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "3D registration or matching is a crucial step in 3D
                 model reconstruction. Registration applications span
                 along a variety of research fields, including
                 computational geometry, computer vision, and geometric
                 modeling. This variety of applications produces many
                 diverse approaches to the problem but at the same time
                 yields divergent notations and a lack of standardized
                 algorithms and guidelines to classify existing methods.
                 In this article, we review the state of the art of the
                 3D rigid registration topic (focused on Coarse
                 Matching) and offer qualitative comparison between the
                 most relevant approaches. Furthermore, we propose a
                 pipeline to classify the existing methods and define a
                 standard formal notation, offering a global point of
                 view of the literature. Our discussion, based on the
                 results presented in the analyzed papers, shows how,
                 although certain aspects of the registration process
                 still need to be tested further in real application
                 situations, the registration pipeline as a whole has
                 progressed steadily. As a result of this progress in
                 all registration aspects, it is now possible to put
                 together algorithms that are able to tackle new and
                 challenging problems with unprecedented data sizes and
                 meeting strict precision criteria.",
  acknowledgement = ack-nhfb,
  articleno =    "45",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ardito:2015:ILD,
  author =       "Carmelo Ardito and Paolo Buono and Maria Francesca
                 Costabile and Giuseppe Desolda",
  title =        "Interaction with Large Displays: a Survey",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "46:1--46:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2682623",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Large interactive displays are increasingly placed in
                 public (or semipublic) locations, including museums,
                 shops, various city settings, and offices. This article
                 discusses the evolution of such displays by looking at
                 their use and analyzing how they are changing the
                 concept of human-computer interaction through new
                 modalities. By surveying the literature on systems
                 using these displays, relevant features were identified
                 and used as classification dimensions. The analysis
                 provided may inform the design and development of
                 future installations. A discussion on research
                 challenges concludes the article.",
  acknowledgement = ack-nhfb,
  articleno =    "46",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pejovic:2015:AMC,
  author =       "Veljko Pejovic and Mirco Musolesi",
  title =        "Anticipatory Mobile Computing: a Survey of the State
                 of the Art and Research Challenges",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "47:1--47:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2693843",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Today's mobile phones are far from the mere
                 communication devices they were 10 years ago. Equipped
                 with sophisticated sensors and advanced computing
                 hardware, phones can be used to infer users' location,
                 activity, social setting, and more. As devices become
                 increasingly intelligent, their capabilities evolve
                 beyond inferring context to predicting it, and then
                 reasoning and acting upon the predicted context. This
                 article provides an overview of the current state of
                 the art in mobile sensing and context prediction paving
                 the way for full-fledged anticipatory mobile computing.
                 We present a survey of phenomena that mobile phones can
                 infer and predict, and offer a description of machine
                 learning techniques used for such predictions. We then
                 discuss proactive decision making and decision delivery
                 via the user-device feedback loop. Finally, we discuss
                 the challenges and opportunities of anticipatory mobile
                 computing.",
  acknowledgement = ack-nhfb,
  articleno =    "47",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zoidi:2015:GBL,
  author =       "Olga Zoidi and Eftychia Fotiadou and Nikos Nikolaidis
                 and Ioannis Pitas",
  title =        "Graph-Based Label Propagation in Digital Media: a
                 Review",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "48:1--48:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2700381",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The expansion of the Internet over the last decade and
                 the proliferation of online social communities, such as
                 Facebook, Google+, and Twitter, as well as multimedia
                 sharing sites, such as YouTube, Flickr, and Picasa, has
                 led to a vast increase of available information to the
                 user. In the case of multimedia data, such as images
                 and videos, fast querying and processing of the
                 available information requires the annotation of the
                 multimedia data with semantic descriptors, that is,
                 labels. However, only a small proportion of the
                 available data are labeled. The rest should undergo an
                 annotation-labeling process. The necessity for the
                 creation of automatic annotation algorithms gave birth
                 to label propagation and semi-supervised learning. In
                 this study, basic concepts in graph-based label
                 propagation methods are discussed. Methods for proper
                 graph construction based on the structure of the
                 available data and label inference methods for
                 spreading label information from a few labeled data to
                 a larger set of unlabeled data are reviewed.
                 Applications of label propagation algorithms in digital
                 media, as well as evaluation metrics for measuring
                 their performance, are presented.",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tiwari:2015:CFM,
  author =       "Nidhi Tiwari and Santonu Sarkar and Umesh Bellur and
                 Maria Indrawan",
  title =        "Classification Framework of {MapReduce} Scheduling
                 Algorithms",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "49:1--49:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2693315",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A MapReduce scheduling algorithm plays a critical role
                 in managing large clusters of hardware nodes and
                 meeting multiple quality requirements by controlling
                 the order and distribution of users, jobs, and tasks
                 execution. A comprehensive and structured survey of the
                 scheduling algorithms proposed so far is presented here
                 using a novel multidimensional classification
                 framework. These dimensions are (i) meeting quality
                 requirements, (ii) scheduling entities, and (iii)
                 adapting to dynamic environments; each dimension has
                 its own taxonomy. An empirical evaluation framework for
                 these algorithms is recommended. This survey identifies
                 various open issues and directions for future
                 research.",
  acknowledgement = ack-nhfb,
  articleno =    "49",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wendzel:2015:PBS,
  author =       "Steffen Wendzel and Sebastian Zander and Bernhard
                 Fechner and Christian Herdin",
  title =        "Pattern-Based Survey and Categorization of Network
                 Covert Channel Techniques",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "50:1--50:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2684195",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Network covert channels are used to hide communication
                 inside network protocols. Various techniques for covert
                 channels have arisen in the past few decades. We
                 surveyed and analyzed 109 techniques developed between
                 1987 and 2013 and show that these techniques can be
                 reduced to only 11 different patterns. Moreover, the
                 majority (69.7\%) of techniques can be categorized into
                 only four different patterns (i.e., most techniques we
                 surveyed are similar). We represent the patterns in a
                 hierarchical catalog using a pattern language. Our
                 pattern catalog will serve as a base for future covert
                 channel novelty evaluation. Furthermore, we apply the
                 concept of pattern variations to network covert
                 channels. With pattern variations, the context of a
                 pattern can change. For example, a channel developed
                 for IPv4 can automatically be adapted to other network
                 protocols. We also propose the pattern-based covert
                 channel optimizations pattern hopping and pattern
                 combination. Finally, we lay the foundation for
                 pattern-based countermeasures: whereas many current
                 countermeasures were developed for specific channels, a
                 pattern-oriented approach allows application of one
                 countermeasure to multiple channels. Hence, future
                 countermeasure development can focus on patterns, and
                 the development of real-world protection against covert
                 channels is greatly simplified.",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hani:2015:RSL,
  author =       "Ahmad Fadzil M. Hani and Irving Vitra Paputungan and
                 Mohd Fadzil Hassan",
  title =        "Renegotiation in Service Level Agreement Management
                 for a Cloud-Based System",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "51:1--51:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2716319",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Managing Service Level Agreement (SLA) within a
                 cloud-based system is important to maintain service
                 continuity and improve trust due to cloud flexibility
                 and scalability. We conduct a general review on
                 cloud-based systems to understand how service
                 continuity and trust are addressed in cloud SLA
                 management. The review shows that SLA renegotiation is
                 necessary to improve trust and maintain service
                 continuity; however, research on SLA renegotiation is
                 limited. Of the two key approaches in renegotiation,
                 namely bargaining-based negotiation and offer
                 generation--based negotiation, the latter approach is
                 the most promising due to its ability to generate
                 optimized multiple-offer SLA parameters within one
                 round during renegotiation.",
  acknowledgement = ack-nhfb,
  articleno =    "51",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gibaja:2015:TML,
  author =       "Eva Gibaja and Sebasti{\'a}n Ventura",
  title =        "A Tutorial on Multilabel Learning",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "52:1--52:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2716262",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Multilabel learning has become a relevant learning
                 paradigm in the past years due to the increasing number
                 of fields where it can be applied and also to the
                 emerging number of techniques that are being developed.
                 This article presents an up-to-date tutorial about
                 multilabel learning that introduces the paradigm and
                 describes the main contributions developed. Evaluation
                 measures, fields of application, trending topics, and
                 resources are also presented.",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sgora:2015:STS,
  author =       "Aggeliki Sgora and Dimitrios J. Vergados and Dimitrios
                 D. Vergados",
  title =        "A Survey of {TDMA} Scheduling Schemes in Wireless
                 Multihop Networks",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "53:1--53:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2677955",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "One of the major problems in wireless multihop
                 networks is the scheduling of transmissions in a fair
                 and efficient manner. Time Division Multiple Access
                 (TDMA) seems to be one of the dominant solutions to
                 achieve this goal since it is a simple scheme and can
                 prolong the devices' lifetime by allowing them to
                 transmit only a portion of the time during
                 conversation. For that reason, several TDMA scheduling
                 algorithms may be found in the literature. The scope of
                 this article is to classify the existing TDMA
                 scheduling algorithms based on several factors, such as
                 the entity that is scheduled, the network topology
                 information that is needed to produce or maintain the
                 schedule, and the entity or entities that perform the
                 computation that produces and maintains the schedules,
                 and to discuss the advantages and disadvantages of each
                 category.",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Yang:2015:MIL,
  author =       "Zheng Yang and Chenshu Wu and Zimu Zhou and Xinglin
                 Zhang and Xu Wang and Yunhao Liu",
  title =        "Mobility Increases Localizability: a Survey on
                 Wireless Indoor Localization using Inertial Sensors",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "54:1--54:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2676430",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Wireless indoor positioning has been extensively
                 studied for the past 2 decades and continuously
                 attracted growing research efforts in mobile computing
                 context. As the integration of multiple inertial
                 sensors (e.g., accelerometer, gyroscope, and
                 magnetometer) to nowadays smartphones in recent years,
                 human-centric mobility sensing is emerging and coming
                 into vogue. Mobility information, as a new dimension in
                 addition to wireless signals, can benefit localization
                 in a number of ways, since location and mobility are by
                 nature related in the physical world. In this article,
                 we survey this new trend of mobility enhancing
                 smartphone-based indoor localization. Specifically, we
                 first study how to measure human mobility: what types
                 of sensors we can use and what types of mobility
                 information we can acquire. Next, we discuss how
                 mobility assists localization with respect to enhancing
                 location accuracy, decreasing deployment cost, and
                 enriching location context. Moreover, considering the
                 quality and cost of smartphone built-in sensors,
                 handling measurement errors is essential and
                 accordingly investigated. Combining existing work and
                 our own working experiences, we emphasize the
                 principles and conduct comparative study of the
                 mainstream technologies. Finally, we conclude this
                 survey by addressing future research directions and
                 opportunities in this new and largely open area.",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Vasilomanolakis:2015:TSC,
  author =       "Emmanouil Vasilomanolakis and Shankar Karuppayah and
                 Max M{\"u}hlh{\"a}user and Mathias Fischer",
  title =        "Taxonomy and Survey of Collaborative Intrusion
                 Detection",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "55:1--55:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2716260",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The dependency of our society on networked computers
                 has become frightening: In the economy, all-digital
                 networks have turned from facilitators to drivers; as
                 cyber-physical systems are coming of age, computer
                 networks are now becoming the central nervous systems
                 of our physical world-even of highly critical
                 infrastructures such as the power grid. At the same
                 time, the 24/7 availability and correct functioning of
                 networked computers has become much more threatened:
                 The number of sophisticated and highly tailored attacks
                 on IT systems has significantly increased. Intrusion
                 Detection Systems (IDSs) are a key component of the
                 corresponding defense measures; they have been
                 extensively studied and utilized in the past. Since
                 conventional IDSs are not scalable to big company
                 networks and beyond, nor to massively parallel attacks,
                 Collaborative IDSs (CIDSs) have emerged. They consist
                 of several monitoring components that collect and
                 exchange data. Depending on the specific CIDS
                 architecture, central or distributed analysis
                 components mine the gathered data to identify attacks.
                 Resulting alerts are correlated among multiple monitors
                 in order to create a holistic view of the network
                 monitored. This article first determines relevant
                 requirements for CIDSs; it then differentiates distinct
                 building blocks as a basis for introducing a CIDS
                 design space and for discussing it with respect to
                 requirements. Based on this design space, attacks that
                 evade CIDSs and attacks on the availability of the
                 CIDSs themselves are discussed. The entire framework of
                 requirements, building blocks, and attacks as
                 introduced is then used for a comprehensive analysis of
                 the state of the art in collaborative intrusion
                 detection, including a detailed survey and comparison
                 of specific CIDS approaches.",
  acknowledgement = ack-nhfb,
  articleno =    "55",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Karimi:2015:TDM,
  author =       "Sarvnaz Karimi and Chen Wang and Alejandro
                 Metke-Jimenez and Raj Gaire and Cecile Paris",
  title =        "Text and Data Mining Techniques in Adverse Drug
                 Reaction Detection",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "56:1--56:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2719920",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We review data mining and related computer science
                 techniques that have been studied in the area of drug
                 safety to identify signals of adverse drug reactions
                 from different data sources, such as spontaneous
                 reporting databases, electronic health records, and
                 medical literature. Development of such techniques has
                 become more crucial for public heath, especially with
                 the growth of data repositories that include either
                 reports of adverse drug reactions, which require fast
                 processing for discovering signals of adverse
                 reactions, or data sources that may contain such
                 signals but require data or text mining techniques to
                 discover them. In order to highlight the importance of
                 contributions made by computer scientists in this area
                 so far, we categorize and review the existing
                 approaches, and most importantly, we identify areas
                 where more research should be undertaken.",
  acknowledgement = ack-nhfb,
  articleno =    "56",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shi:2015:SIR,
  author =       "Shu Shi and Cheng-Hsin Hsu",
  title =        "A Survey of Interactive Remote Rendering Systems",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "57:1--57:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2719921",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Remote rendering means rendering 3D graphics on a
                 computing device and displaying the results on another
                 computing device connected through a network. The
                 concept was originally developed for sharing computing
                 resources remotely. It has been receiving increasing
                 attention from researchers in both academia and
                 industry in recent years due to the proliferation of
                 cloud computing and mobile devices. In this article, we
                 survey the interactive remote rendering systems
                 proposed in the literature, analyze how to improve the
                 state of the art, and summarize the related
                 technologies. The readers of this article will
                 understand the history of remote rendering systems and
                 obtain some inspirations of the future research
                 directions in this area.",
  acknowledgement = ack-nhfb,
  articleno =    "57",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sufatrio:2015:SAS,
  author =       "Sufatrio and Darell J. J. Tan and Tong-Wei Chua and
                 Vrizlynn L. L. Thing",
  title =        "Securing {Android}: a Survey, Taxonomy, and
                 Challenges",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "58:1--58:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2733306",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Recent years have seen a global adoption of smart
                 mobile devices, particularly those based on Android.
                 However, Android's widespread adoption is marred with
                 increasingly rampant malware threats. This article
                 gives a survey and taxonomy of existing works that
                 secure Android devices. Based on Android app deployment
                 stages, the taxonomy enables us to analyze schemes that
                 share similar objective and approach and to inspect
                 their key differences. Additionally, this article
                 highlights the limitations of existing works and
                 current challenges. It thus distills the state of the
                 art in Android security research and identifies
                 potential research directions for safeguarding billions
                 (and keep counting) of Android-run devices.",
  acknowledgement = ack-nhfb,
  articleno =    "58",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{OCoileain:2015:AAC,
  author =       "Diarmuid {{\'O} Coile{\'a}in} and Donal O'Mahony",
  title =        "Accounting and Accountability in Content Distribution
                 Architectures: a Survey",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "59:1--59:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2723701",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Many content distribution architectures offer
                 desirable elements that lead to less bandwidth usage,
                 reduced network congestion, higher content
                 availability, and reduced costs. However, their level
                 of adoption and utilization in commercial environments
                 depends on the level of content accounting and
                 accountability they offer. Content accounting refers to
                 any information that a content distributor needs to
                 track relating to the delivery of content to its
                 intended consumers. In contrast, content accountability
                 refers to the willingness of the communicating
                 infrastructure to produce accurate and verifiable
                 information about the content distribution process.
                 This article surveys existing and proposed future
                 content delivery architectures detailing their
                 methodologies for providing efficient low-cost content
                 distribution, content accounting, and accountability
                 across trustworthy and untrustworthy infrastructures.
                 We use two methods to help identify the drawbacks and
                 merits of these architectures. The first is a taxonomy
                 for accounting information based on our analysis of
                 logging information gathered from the surveyed systems.
                 The second is a generic model for content distribution
                 based on a synthesis of desirable elements from the
                 surveyed architectures. These methods help highlight
                 key architectural elements required for efficient
                 low-cost content distribution. Finally, we identify
                 outstanding challenges related to establishing
                 accountability in accounting information produced for
                 content distributed across trusted and untrusted
                 infrastructures.",
  acknowledgement = ack-nhfb,
  articleno =    "59",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{deAraujo:2015:SIS,
  author =       "B. R. de Ara{\'u}jo and Daniel S. Lopes and Pauline
                 Jepp and Joaquim A. Jorge and Brian Wyvill",
  title =        "A Survey on Implicit Surface Polygonization",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "60:1--60:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2732197",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Implicit surfaces (IS) are commonly used in image
                 creation, modeling environments, modeling objects, and
                 scientific data visualization. In this article, we
                 present a survey of different techniques for fast
                 visualization of IS. The main classes of visualization
                 algorithms are identified along with the advantages of
                 each in the context of the different types of IS
                 commonly used in computer graphics. We focus closely on
                 polygonization methods, as they are the most suited to
                 fast visualization. Classification and comparison of
                 existing approaches are presented using criteria
                 extracted from current research. This enables the
                 identification of the best strategies according to the
                 number of specific requirements, such as speed,
                 accuracy, quality, or stylization.",
  acknowledgement = ack-nhfb,
  articleno =    "60",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mukhopadhyay:2015:SME,
  author =       "Anirban Mukhopadhyay and Ujjwal Maulik and Sanghamitra
                 Bandyopadhyay",
  title =        "A Survey of Multiobjective Evolutionary Clustering",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "61:1--61:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2742642",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Data clustering is a popular unsupervised data mining
                 tool that is used for partitioning a given dataset into
                 homogeneous groups based on some
                 similarity/dissimilarity metric. Traditional clustering
                 algorithms often make prior assumptions about the
                 cluster structure and adopt a corresponding suitable
                 objective function that is optimized either through
                 classical techniques or metaheuristic approaches. These
                 algorithms are known to perform poorly when the cluster
                 assumptions do not hold in the data. Multiobjective
                 clustering, in which multiple objective functions are
                 simultaneously optimized, has emerged as an attractive
                 and robust alternative in such situations. In
                 particular, application of multiobjective evolutionary
                 algorithms for clustering has become popular in the
                 past decade because of their population-based nature.
                 Here, we provide a comprehensive and critical survey of
                 the multitude of multiobjective evolutionary clustering
                 techniques existing in the literature. The techniques
                 are classified according to the encoding strategies
                 adopted, objective functions, evolutionary operators,
                 strategy for maintaining nondominated solutions, and
                 the method of selection of the final solution. The pros
                 and cons of the different approaches are mentioned.
                 Finally, we have discussed some real-life applications
                 of multiobjective clustering in the domains of image
                 segmentation, bioinformatics, web mining, and so
                 forth.",
  acknowledgement = ack-nhfb,
  articleno =    "61",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wael:2015:PGA,
  author =       "Mattias {De Wael} and Stefan Marr and Bruno {De
                 Fraine} and Tom {Van Cutsem} and Wolfgang {De Meuter}",
  title =        "Partitioned Global Address Space Languages",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "62:1--62:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2716320",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The Partitioned Global Address Space (PGAS) model is a
                 parallel programming model that aims to improve
                 programmer productivity while at the same time aiming
                 for high performance. The main premise of PGAS is that
                 a globally shared address space improves productivity,
                 but that a distinction between local and remote data
                 accesses is required to allow performance optimizations
                 and to support scalability on large-scale parallel
                 architectures. To this end, PGAS preserves the global
                 address space while embracing awareness of nonuniform
                 communication costs. Today, about a dozen languages
                 exist that adhere to the PGAS model. This survey
                 proposes a definition and a taxonomy along four axes:
                 how parallelism is introduced, how the address space is
                 partitioned, how data is distributed among the
                 partitions, and finally, how data is accessed across
                 partitions. Our taxonomy reveals that today's PGAS
                 languages focus on distributing regular data and
                 distinguish only between local and remote data access
                 cost, whereas the distribution of irregular data and
                 the adoption of richer data access cost models remain
                 open challenges.",
  acknowledgement = ack-nhfb,
  articleno =    "62",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhan:2015:CCR,
  author =       "Zhi-Hui Zhan and Xiao-Fang Liu and Yue-Jiao Gong and
                 Jun Zhang and Henry Shu-Hung Chung and Yun Li",
  title =        "Cloud Computing Resource Scheduling and a Survey of
                 Its Evolutionary Approaches",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "63:1--63:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2788397",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A disruptive technology fundamentally transforming the
                 way that computing services are delivered, cloud
                 computing offers information and communication
                 technology users a new dimension of convenience of
                 resources, as services via the Internet. Because cloud
                 provides a finite pool of virtualized on-demand
                 resources, optimally scheduling them has become an
                 essential and rewarding topic, where a trend of using
                 Evolutionary Computation (EC) algorithms is emerging
                 rapidly. Through analyzing the cloud computing
                 architecture, this survey first presents taxonomy at
                 two levels of scheduling cloud resources. It then
                 paints a landscape of the scheduling problem and
                 solutions. According to the taxonomy, a comprehensive
                 survey of state-of-the-art approaches is presented
                 systematically. Looking forward, challenges and
                 potential future research directions are investigated
                 and invited, including real-time scheduling, adaptive
                 dynamic scheduling, large-scale scheduling,
                 multiobjective scheduling, and distributed and parallel
                 scheduling. At the dawn of Industry 4.0, cloud
                 computing scheduling for cyber-physical integration
                 with the presence of big data is also discussed.
                 Research in this area is only in its infancy, but with
                 the rapid fusion of information and data technology,
                 more exciting and agenda-setting topics are likely to
                 emerge on the horizon.",
  acknowledgement = ack-nhfb,
  articleno =    "63",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Moghaddam:2015:EEN,
  author =       "Fahimeh Alizadeh Moghaddam and Patricia Lago and Paola
                 Grosso",
  title =        "Energy-Efficient Networking Solutions in Cloud-Based
                 Environments: a Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "64:1--64:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2764464",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The energy consumed by data centers hosting cloud
                 services is increasing enormously. This brings the need
                 to reduce energy consumption of different components in
                 data centers. In this work, we focus on energy
                 efficiency of the networking component. However, how
                 different networking solutions impact energy
                 consumption is still an open question. We investigate
                 the state of the art in energy-efficient networking
                 solutions in cloud-based environments. We follow a
                 systematic literature review method to select primary
                 studies. We create a metamodel based on the codes
                 extracted from our primary studies using the Coding
                 analytical method. Our findings show three abstraction
                 levels of the proposed networking solutions to achieve
                 energy efficiency in cloud-based environments:
                 Strategy, Solution, and Technology. We study the
                 historical trends in the investigated solutions and
                 conclude that the emerging and most widely adopted one
                 is the Decision framework.",
  acknowledgement = ack-nhfb,
  articleno =    "64",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sookhak:2015:RDA,
  author =       "Mehdi Sookhak and Abdullah Gani and Hamid Talebian and
                 Adnan Akhunzada and Samee U. Khan and Rajkumar Buyya
                 and Albert Y. Zomaya",
  title =        "Remote Data Auditing in Cloud Computing Environments:
                 a Survey, Taxonomy, and Open Issues",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "65:1--65:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2764465",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Cloud computing has emerged as a long-dreamt vision of
                 the utility computing paradigm that provides reliable
                 and resilient infrastructure for users to remotely
                 store data and use on-demand applications and services.
                 Currently, many individuals and organizations mitigate
                 the burden of local data storage and reduce the
                 maintenance cost by outsourcing data to the cloud.
                 However, the outsourced data is not always trustworthy
                 due to the loss of physical control and possession over
                 the data. As a result, many scholars have concentrated
                 on relieving the security threats of the outsourced
                 data by designing the Remote Data Auditing (RDA)
                 technique as a new concept to enable public
                 auditability for the stored data in the cloud. The RDA
                 is a useful technique to check the reliability and
                 integrity of data outsourced to a single or distributed
                 servers. This is because all of the RDA techniques for
                 single cloud servers are unable to support data
                 recovery; such techniques are complemented with
                 redundant storage mechanisms. The article also reviews
                 techniques of remote data auditing more comprehensively
                 in the domain of the distributed clouds in conjunction
                 with the presentation of classifying ongoing
                 developments within this specified area. The thematic
                 taxonomy of the distributed storage auditing is
                 presented based on significant parameters, such as
                 scheme nature, security pattern, objective functions,
                 auditing mode, update mode, cryptography model, and
                 dynamic data structure. The more recent remote auditing
                 approaches, which have not gained considerable
                 attention in distributed cloud environments, are also
                 critically analyzed and further categorized into three
                 different classes, namely, replication based, erasure
                 coding based, and network coding based, to present a
                 taxonomy. This survey also aims to investigate
                 similarities and differences of such a framework on the
                 basis of the thematic taxonomy to diagnose significant
                 and explore major outstanding issues.",
  acknowledgement = ack-nhfb,
  articleno =    "65",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kamisinski:2015:ASC,
  author =       "Andrzej Kamisi{\'n}ski and Piotr Cholda and Andrzej
                 Jajszczyk",
  title =        "Assessing the Structural Complexity of Computer and
                 Communication Networks",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "66:1--66:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2755621",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In this tutorial, 17 structural complexity indices are
                 presented and compared, each representing one of the
                 following categories: adjacency- and distance-based
                 metrics, Shannon entropy-based metrics, product
                 measures, subgraph-based metrics, and path- and
                 walk-based metrics. The applicability of these indices
                 to computer and communication networks is evaluated
                 with the aid of different elementary, specifically
                 designed, random, and real network topologies. On the
                 grounds of the evaluation study, advantages and
                 disadvantages of particular metrics are identified. In
                 addition, their general properties and runtimes are
                 assessed, and a general view on the structural network
                 complexity is presented.",
  acknowledgement = ack-nhfb,
  articleno =    "66",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Imran:2015:PSM,
  author =       "Muhammad Imran and Carlos Castillo and Fernando Diaz
                 and Sarah Vieweg",
  title =        "Processing Social Media Messages in Mass Emergency: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "67:1--67:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2771588",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Social media platforms provide active communication
                 channels during mass convergence and emergency events
                 such as disasters caused by natural hazards. As a
                 result, first responders, decision makers, and the
                 public can use this information to gain insight into
                 the situation as it unfolds. In particular, many social
                 media messages communicated during emergencies convey
                 timely, actionable information. Processing social media
                 messages to obtain such information, however, involves
                 solving multiple challenges including: parsing brief
                 and informal messages, handling information overload,
                 and prioritizing different types of information found
                 in messages. These challenges can be mapped to
                 classical information processing operations such as
                 filtering, classifying, ranking, aggregating,
                 extracting, and summarizing. We survey the state of the
                 art regarding computational methods to process social
                 media messages and highlight both their contributions
                 and shortcomings. In addition, we examine their
                 particularities, and methodically examine a series of
                 key subproblems ranging from the detection of events to
                 the creation of actionable and useful summaries.
                 Research thus far has, to a large extent, produced
                 methods to extract situational awareness information
                 from social media. In this survey, we cover these
                 various approaches, and highlight their benefits and
                 shortcomings. We conclude with research challenges that
                 go beyond situational awareness, and begin to look at
                 supporting decision making and coordinating
                 emergency-response actions.",
  acknowledgement = ack-nhfb,
  articleno =    "67",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Huang:2015:SPI,
  author =       "Wei Huang and Afshar Ganjali and Beom Heyn Kim and
                 Sukwon Oh and David Lie",
  title =        "The State of Public Infrastructure-as-a-Service Cloud
                 Security",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "68:1--68:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2767181",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The public Infrastructure-as-a-Service (IaaS) cloud
                 industry has reached a critical mass in the past few
                 years, with many cloud service providers fielding
                 competing services. Despite the competition, we find
                 some of the security mechanisms offered by the services
                 to be similar, indicating that the cloud industry has
                 established a number of ``best-practices,'' while other
                 security mechanisms vary widely, indicating that there
                 is also still room for innovation and experimentation.
                 We investigate these differences and possible
                 underlying reasons for it. We also contrast the
                 security mechanisms offered by public IaaS cloud
                 offerings and with security mechanisms proposed by
                 academia over the same period. Finally, we speculate on
                 how industry and academia might work together to solve
                 the pressing security problems in public IaaS clouds
                 going forward.",
  acknowledgement = ack-nhfb,
  articleno =    "68",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mittal:2015:SCG,
  author =       "Sparsh Mittal and Jeffrey S. Vetter",
  title =        "A Survey of {CPU--GPU} Heterogeneous Computing
                 Techniques",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "69:1--69:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2788396",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "As both CPUs and GPUs become employed in a wide range
                 of applications, it has been acknowledged that both of
                 these Processing Units (PUs) have their unique features
                 and strengths and hence, CPU-GPU collaboration is
                 inevitable to achieve high-performance computing. This
                 has motivated a significant amount of research on
                 heterogeneous computing techniques, along with the
                 design of CPU-GPU fused chips and petascale
                 heterogeneous supercomputers. In this article, we
                 survey Heterogeneous Computing Techniques (HCTs) such
                 as workload partitioning that enable utilizing both
                 CPUs and GPUs to improve performance and/or energy
                 efficiency. We review heterogeneous computing
                 approaches at runtime, algorithm, programming,
                 compiler, and application levels. Further, we review
                 both discrete and fused CPU-GPU systems and discuss
                 benchmark suites designed for evaluating Heterogeneous
                 Computing Systems (HCSs). We believe that this article
                 will provide insights into the workings and scope of
                 applications of HCTs to researchers and motivate them
                 to further harness the computational powers of CPUs and
                 GPUs to achieve the goal of exascale performance.",
  acknowledgement = ack-nhfb,
  articleno =    "69",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Xu:2015:SAT,
  author =       "Tianyin Xu and Yuanyuan Zhou",
  title =        "Systems Approaches to Tackling Configuration Errors: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "4",
  pages =        "70:1--70:??",
  month =        jul,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2791577",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:09:40 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In recent years, configuration errors (i.e.,
                 misconfigurations) have become one of the dominant
                 causes of system failures, resulting in many severe
                 service outages and downtime. Unfortunately, it is
                 notoriously difficult for system users (e.g.,
                 administrators and operators) to prevent, detect, and
                 troubleshoot configuration errors due to the complexity
                 of the configurations as well as the systems under
                 configuration. As a result, the cost of resolving
                 configuration errors is often tremendous from the
                 aspects of both compensating the service disruptions
                 and diagnosing, recovering from the failures. The
                 prevalence, severity, and cost have made configuration
                 errors one of the most thorny system problems that
                 desire to be addressed. This survey article provides a
                 holistic and structured overview of the systems
                 approaches that tackle configuration errors. To
                 understand the problem fundamentally, we first discuss
                 the characteristics of configuration errors and the
                 challenges of tackling such errors. Then, we discuss
                 the state-of-the-art systems approaches that address
                 different types of configuration errors in different
                 scenarios. Our primary goal is to equip the stakeholder
                 with a better understanding of configuration errors and
                 the potential solutions for resolving configuration
                 errors in the spectrum of system development and
                 management. To inspire follow-up research, we further
                 discuss the open problems with regard to system
                 configuration. To the best of our knowledge, this is
                 the first survey on the topic of tackling configuration
                 errors.",
  acknowledgement = ack-nhfb,
  articleno =    "70",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Meng:2015:CSS,
  author =       "Guozhu Meng and Yang Liu and Jie Zhang and Alexander
                 Pokluda and Raouf Boutaba",
  title =        "Collaborative Security: a Survey and Taxonomy",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "1:1--1:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2785733",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Security is oftentimes centrally managed. An
                 alternative trend of using collaboration in order to
                 improve security has gained momentum over the past few
                 years. Collaborative security is an abstract concept
                 that applies to a wide variety of systems and has been
                 used to solve security issues inherent in distributed
                 environments. Thus far, collaboration has been used in
                 many domains such as intrusion detection, spam
                 filtering, botnet resistance, and vulnerability
                 detection. In this survey, we focus on different
                 mechanisms of collaboration and defense in
                 collaborative security. We systematically investigate
                 numerous use cases of collaborative security by
                 covering six types of security systems. Aspects of
                 these systems are thoroughly studied, including their
                 technologies, standards, frameworks, strengths and
                 weaknesses. We then present a comprehensive study with
                 respect to their analysis target, timeliness of
                 analysis, architecture, network infrastructure,
                 initiative, shared information and interoperability. We
                 highlight five important topics in collaborative
                 security, and identify challenges and possible
                 directions for future research. Our work contributes
                 the following to the existing research on collaborative
                 security with the goal of helping to make collaborative
                 security systems more resilient and efficient. This
                 study (1) clarifies the scope of collaborative
                 security, (2) identifies the essential components of
                 collaborative security, (3) analyzes the multiple
                 mechanisms of collaborative security, and (4)
                 identifies challenges in the design of collaborative
                 security.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ardagna:2015:SAC,
  author =       "Claudio A. Ardagna and Rasool Asal and Ernesto Damiani
                 and Quang Hieu Vu",
  title =        "From Security to Assurance in the Cloud: a Survey",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "2:1--2:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2767005",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The cloud computing paradigm has become a mainstream
                 solution for the deployment of business processes and
                 applications. In the public cloud vision,
                 infrastructure, platform, and software services are
                 provisioned to tenants (i.e., customers and service
                 providers) on a pay-as-you-go basis. Cloud tenants can
                 use cloud resources at lower prices, and higher
                 performance and flexibility, than traditional
                 on-premises resources, without having to care about
                 infrastructure management. Still, cloud tenants remain
                 concerned with the cloud's level of service and the
                 nonfunctional properties their applications can count
                 on. In the last few years, the research community has
                 been focusing on the nonfunctional aspects of the cloud
                 paradigm, among which cloud security stands out.
                 Several approaches to security have been described and
                 summarized in general surveys on cloud security
                 techniques. The survey in this article focuses on the
                 interface between cloud security and cloud security
                 assurance. First, we provide an overview of the state
                 of the art on cloud security. Then, we introduce the
                 notion of cloud security assurance and analyze its
                 growing impact on cloud security approaches. Finally,
                 we present some recommendations for the development of
                 next-generation cloud security and assurance
                 solutions.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mitsch:2015:LBM,
  author =       "Stefan Mitsch and Andr{\'e} Platzer and Werner
                 Retschitzegger and Wieland Schwinger",
  title =        "Logic-Based Modeling Approaches for Qualitative and
                 Hybrid Reasoning in Dynamic Spatial Systems",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "3:1--3:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2764901",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Autonomous agents that operate as components of
                 dynamic spatial systems are becoming increasingly
                 popular and mainstream. Applications can be found in
                 consumer robotics, in road, rail, and air
                 transportation, manufacturing, and military operations.
                 Unfortunately, the approaches to modeling and analyzing
                 the behavior of dynamic spatial systems are just as
                 diverse as these application domains. In this article,
                 we discuss reasoning approaches for the medium-term
                 control of autonomous agents in dynamic spatial
                 systems, which requires a sufficiently detailed
                 description of the agent's behavior and environment but
                 may still be conducted in a qualitative manner. We
                 survey logic-based qualitative and hybrid modeling and
                 commonsense reasoning approaches with respect to their
                 features for describing and analyzing dynamic spatial
                 systems in general, and the actions of autonomous
                 agents operating therein in particular. We introduce a
                 conceptual reference model, which summarizes the
                 current understanding of the characteristics of dynamic
                 spatial systems based on a catalog of evaluation
                 criteria derived from the model. We assess the modeling
                 features provided by logic-based qualitative
                 commonsense and hybrid approaches for projection,
                 planning, simulation, and verification of dynamic
                 spatial systems. We provide a comparative summary of
                 the modeling features, discuss lessons learned, and
                 introduce a research roadmap for integrating different
                 approaches of dynamic spatial system analysis to
                 achieve coverage of all required features.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ibidunmoye:2015:PAD,
  author =       "Olumuyiwa Ibidunmoye and Francisco
                 Hern{\'a}ndez-Rodriguez and Erik Elmroth",
  title =        "Performance Anomaly Detection and Bottleneck
                 Identification",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "4:1--4:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2791120",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In order to meet stringent performance requirements,
                 system administrators must effectively detect
                 undesirable performance behaviours, identify potential
                 root causes, and take adequate corrective measures. The
                 problem of uncovering and understanding performance
                 anomalies and their causes (bottlenecks) in different
                 system and application domains is well studied. In
                 order to assess progress, research trends, and identify
                 open challenges, we have reviewed major contributions
                 in the area and present our findings in this survey.
                 Our approach provides an overview of anomaly detection
                 and bottleneck identification research as it relates to
                 the performance of computing systems. By identifying
                 fundamental elements of the problem, we are able to
                 categorize existing solutions based on multiple factors
                 such as the detection goals, nature of applications and
                 systems, system observability, and detection methods.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Alsalibi:2015:IBI,
  author =       "Bisan Alsalibi and Ibrahim Venkat and K. G.
                 Subramanian and Syaheerah Lebai Lutfi and Philippe {De
                 Wilde}",
  title =        "The Impact of Bio-Inspired Approaches Toward the
                 Advancement of Face Recognition",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "5:1--5:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2791121",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "An increased number of bio-inspired face recognition
                 systems have emerged in recent decades owing to their
                 intelligent problem-solving ability, flexibility,
                 scalability, and adaptive nature. Hence, this survey
                 aims to present a detailed overview of bio-inspired
                 approaches pertaining to the advancement of face
                 recognition. Based on a well-classified taxonomy,
                 relevant bio-inspired techniques and their merits and
                 demerits in countering potential problems vital to face
                 recognition are analyzed. A synthesis of various
                 approaches in terms of key governing principles and
                 their associated performance analysis are
                 systematically portrayed. Finally, some intuitive
                 future directions are suggested on how bio-inspired
                 approaches can contribute to the advancement of face
                 biometrics in the years to come.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Naveed:2015:PGE,
  author =       "Muhammad Naveed and Erman Ayday and Ellen W. Clayton
                 and Jacques Fellay and Carl A. Gunter and Jean-Pierre
                 Hubaux and Bradley A. Malin and Xiaofeng Wang",
  title =        "Privacy in the Genomic Era",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "6:1--6:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2767007",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Genome sequencing technology has advanced at a rapid
                 pace and it is now possible to generate highly-detailed
                 genotypes inexpensively. The collection and analysis of
                 such data has the potential to support various
                 applications, including personalized medical services.
                 While the benefits of the genomics revolution are
                 trumpeted by the biomedical community, the increased
                 availability of such data has major implications for
                 personal privacy; notably because the genome has
                 certain essential features, which include (but are not
                 limited to) (i) an association with traits and certain
                 diseases, (ii) identification capability (e.g.,
                 forensics), and (iii) revelation of family
                 relationships. Moreover, direct-to-consumer DNA testing
                 increases the likelihood that genome data will be made
                 available in less regulated environments, such as the
                 Internet and for-profit companies. The problem of
                 genome data privacy thus resides at the crossroads of
                 computer science, medicine, and public policy. While
                 the computer scientists have addressed data privacy for
                 various data types, there has been less attention
                 dedicated to genomic data. Thus, the goal of this paper
                 is to provide a systematization of knowledge for the
                 computer science community. In doing so, we address
                 some of the (sometimes erroneous) beliefs of this field
                 and we report on a survey we conducted about genome
                 data privacy with biomedical specialists. Then, after
                 characterizing the genome privacy problem, we review
                 the state-of-the-art regarding privacy attacks on
                 genomic data and strategies for mitigating such
                 attacks, as well as contextualizing these attacks from
                 the perspective of medicine and public policy. This
                 paper concludes with an enumeration of the challenges
                 for genome data privacy and presents a framework to
                 systematize the analysis of threats and the design of
                 countermeasures as the field moves forward.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Guo:2015:MCS,
  author =       "Bin Guo and Zhu Wang and Zhiwen Yu and Yu Wang and
                 Neil Y. Yen and Runhe Huang and Xingshe Zhou",
  title =        "Mobile Crowd Sensing and Computing: The Review of an
                 Emerging Human-Powered Sensing Paradigm",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "7:1--7:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2794400",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "With the surging of smartphone sensing, wireless
                 networking, and mobile social networking techniques,
                 Mobile Crowd Sensing and Computing (MCSC) has become a
                 promising paradigm for cross-space and large-scale
                 sensing. MCSC extends the vision of participatory
                 sensing by leveraging both participatory sensory data
                 from mobile devices (offline) and user-contributed data
                 from mobile social networking services (online).
                 Further, it explores the complementary roles and
                 presents the fusion/collaboration of machine and human
                 intelligence in the crowd sensing and computing
                 processes. This article characterizes the unique
                 features and novel application areas of MCSC and
                 proposes a reference framework for building
                 human-in-the-loop MCSC systems. We further clarify the
                 complementary nature of human and machine intelligence
                 and envision the potential of deep-fused human--machine
                 systems. We conclude by discussing the limitations,
                 open issues, and research opportunities of MCSC.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ruiz:2015:SBA,
  author =       "Patricia Ruiz and Pascal Bouvry",
  title =        "Survey on Broadcast Algorithms for Mobile Ad Hoc
                 Networks",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "8:1--8:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2786005",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Networking at any time and any place paves the way for
                 a large number of possible applications in ad hoc
                 networks, from disaster relief in remote areas to
                 network extension. Thus, for the past decades, many
                 works have been proposed trying to make ad hoc networks
                 a reality. The importance of broadcasting in networking
                 and the broadcast nature of the wireless medium have
                 encouraged researchers to join their efforts on
                 designing efficient dissemination algorithms for Mobile
                 Ad Hoc Networks (MANETs). The many different challenges
                 that MANETs face, such as limited network resources,
                 network partitions, or energy restrictions, gave rise
                 to many different approaches to overcome one or more of
                 those problems. Therefore, literature reveals a huge
                 variety of techniques that have been proposed for
                 efficient message dissemination. In this article, we
                 make an in-depth review of the existing
                 state-of-the-art techniques, as well as propose a new
                 taxonomy that provides a global overview of the most
                 relevant existing algorithms.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hong:2015:LRE,
  author =       "Hyejeong Hong and Jaeil Lim and Hyunyul Lim and Sungho
                 Kang",
  title =        "Lifetime Reliability Enhancement of Microprocessors:
                 Mitigating the Impact of Negative Bias Temperature
                 Instability",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "9:1--9:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2785988",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Ensuring lifetime reliability of microprocessors has
                 become more critical. Continuous scaling and increasing
                 temperatures due to growing power density are
                 threatening lifetime reliability. Negative bias
                 temperature instability (NBTI) has been known for
                 decades, but its impact has been insignificant compared
                 to other factors. Aggressive scaling, however, makes
                 NBTI the most serious threat to chip lifetime
                 reliability in today's and future process technologies.
                 The delay of microprocessors gradually increases as
                 time goes by, due to stress and recovery phases. The
                 delay eventually becomes higher than the value required
                 to meet design constraints, which results in failed
                 systems. In this article, the mechanism of NBTI and its
                 effects on lifetime reliability are presented, then
                 various techniques to mitigate NBTI degradation on
                 microprocessors are introduced. The mitigation can be
                 addressed at either the circuit level or architectural
                 level. Circuit-level techniques include design-time
                 techniques such as transistor sizing and NBTI-aware
                 synthesis. Forward body biasing, and adaptive voltage
                 scaling are adaptive techniques that can mitigate NBTI
                 degradation at the circuit level by controlling the
                 threshold voltage or supply voltage to hide the
                 lengthened delay caused by NBTI degradation.
                 Reliability has been regarded as something to be
                 addressed by chip manufacturers. However, there are
                 recent attempts to bring lifetime reliability problems
                 to the architectural level. Architectural techniques
                 can reduce the cost added by circuit-level techniques,
                 which are based on the worst-case degradation
                 estimation. Traditional low-power and thermal
                 management techniques can be successfully extended to
                 deal with reliability problems since aging is dependent
                 on power consumption and temperature. Self-repair is
                 another option to enhance the lifetime of
                 microprocessors using either core-level or lower-level
                 redundancy. With a growing thermal crisis and constant
                 scaling, lifetime reliability requires more intensive
                 research in conjunction with other design issues.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bauman:2015:SHB,
  author =       "Erick Bauman and Gbadebo Ayoade and Zhiqiang Lin",
  title =        "A Survey on Hypervisor-Based Monitoring: Approaches,
                 Applications, and Evolutions",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "10:1--10:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2775111",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "When designing computer monitoring systems, one goal
                 has always been to have a complete view of the
                 monitored target and at the same time stealthily
                 protect the monitor itself. One way to achieve this is
                 to use hypervisor-based, or more generally out of
                 virtual machine (VM)-based, monitoring. There are,
                 however, challenges that limit the use of this
                 mechanism; the most significant of these is the
                 semantic gap problem. Over the past decade, a
                 considerable amount of research has been carried out to
                 bridge the semantic gap and develop all kinds of
                 out-of-VM monitoring techniques and applications. By
                 tracing the evolution of out-of-VM security solutions,
                 this article examines and classifies different
                 approaches that have been proposed to overcome the
                 semantic gap-the fundamental challenge in
                 hypervisor-based monitoring-and how they have been used
                 to develop various security applications. In
                 particular, we review how the past approaches address
                 different constraints, such as practicality,
                 flexibility, coverage, and automation, while bridging
                 the semantic gap; how they have developed different
                 monitoring systems; and how the monitoring systems have
                 been applied and deployed. In addition to systematizing
                 all of the proposed techniques, we also discuss the
                 remaining research problems and shed light on the
                 future directions of hypervisor-based monitoring.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mann:2015:AVM,
  author =       "Zolt{\'a}n {\'A}d{\'a}m Mann",
  title =        "Allocation of Virtual Machines in Cloud Data Centers
                 --- A Survey of Problem Models and Optimization
                 Algorithms",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "11:1--11:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2797211",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Data centers in public, private, and hybrid cloud
                 settings make it possible to provision virtual machines
                 (VMs) with unprecedented flexibility. However,
                 purchasing, operating, and maintaining the underlying
                 physical resources incurs significant monetary costs
                 and environmental impact. Therefore, cloud providers
                 must optimize the use of physical resources by a
                 careful allocation of VMs to hosts, continuously
                 balancing between the conflicting requirements on
                 performance and operational costs. In recent years,
                 several algorithms have been proposed for this
                 important optimization problem. Unfortunately, the
                 proposed approaches are hardly comparable because of
                 subtle differences in the used problem models. This
                 article surveys the used problem formulations and
                 optimization algorithms, highlighting their strengths
                 and limitations, and pointing out areas that need
                 further research.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Milenkoski:2015:ECI,
  author =       "Aleksandar Milenkoski and Marco Vieira and Samuel
                 Kounev and Alberto Avritzer and Bryan D. Payne",
  title =        "Evaluating Computer Intrusion Detection Systems: a
                 Survey of Common Practices",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "12:1--12:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2808691",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The evaluation of computer intrusion detection systems
                 (which we refer to as intrusion detection systems) is
                 an active research area. In this article, we survey and
                 systematize common practices in the area of evaluation
                 of such systems. For this purpose, we define a design
                 space structured into three parts: workload, metrics,
                 and measurement methodology. We then provide an
                 overview of the common practices in evaluation of
                 intrusion detection systems by surveying evaluation
                 approaches and methods related to each part of the
                 design space. Finally, we discuss open issues and
                 challenges focusing on evaluation methodologies for
                 novel intrusion detection systems.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Li:2015:MOE,
  author =       "Bingdong Li and Jinlong Li and Ke Tang and Xin Yao",
  title =        "Many-Objective Evolutionary Algorithms: a Survey",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "13:1--13:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2792984",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Multiobjective evolutionary algorithms (MOEAs) have
                 been widely used in real-world applications. However,
                 most MOEAs based on Pareto-dominance handle
                 many-objective problems (MaOPs) poorly due to a high
                 proportion of incomparable and thus mutually
                 nondominated solutions. Recently, a number of
                 many-objective evolutionary algorithms (MaOEAs) have
                 been proposed to deal with this scalability issue. In
                 this article, a survey of MaOEAs is reported. According
                 to the key ideas used, MaOEAs are categorized into
                 seven classes: relaxed dominance based,
                 diversity-based, aggregation-based, indicator-based,
                 reference set based, preference-based, and
                 dimensionality reduction approaches. Several future
                 research directions in this field are also discussed.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Schoeffmann:2015:VIT,
  author =       "Klaus Schoeffmann and Marco A. Hudelist and Jochen
                 Huber",
  title =        "Video Interaction Tools: a Survey of Recent Work",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "14:1--14:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2808796",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Digital video enables manifold ways of multimedia
                 content interaction. Over the last decade, many
                 proposals for improving and enhancing video content
                 interaction were published. More recent work
                 particularly leverages on highly capable devices such
                 as smartphones and tablets that embrace novel
                 interaction paradigms, for example, touch,
                 gesture-based or physical content interaction. In this
                 article, we survey literature at the intersection of
                 Human-Computer Interaction and Multimedia. We integrate
                 literature from video browsing and navigation, direct
                 video manipulation, video content visualization, as
                 well as interactive video summarization and interactive
                 video retrieval. We classify the reviewed works by the
                 underlying interaction method and discuss the achieved
                 improvements so far. We also depict a set of open
                 problems that the video interaction community should
                 address in future.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Edwards:2015:SSO,
  author =       "Matthew Edwards and Awais Rashid and Paul Rayson",
  title =        "A Systematic Survey of Online Data Mining Technology
                 Intended for Law Enforcement",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "15:1--15:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2811403",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "As an increasing amount of crime takes on a digital
                 aspect, law enforcement bodies must tackle an online
                 environment generating huge volumes of data. With
                 manual inspections becoming increasingly infeasible,
                 law enforcement bodies are optimising online
                 investigations through data-mining technologies. Such
                 technologies must be well designed and rigorously
                 grounded, yet no survey of the online data-mining
                 literature exists which examines their techniques,
                 applications and rigour. This article remedies this gap
                 through a systematic mapping study describing online
                 data-mining literature which visibly targets law
                 enforcement applications, using evidence-based
                 practices in survey making to produce a replicable
                 analysis which can be methodologically examined for
                 deficiencies.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Baudry:2015:MFS,
  author =       "Benoit Baudry and Martin Monperrus",
  title =        "The Multiple Facets of Software Diversity: Recent
                 Developments in Year 2000 and Beyond",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "1",
  pages =        "16:1--16:??",
  month =        sep,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2807593",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Sep 30 17:08:21 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Early experiments with software diversity in the mid
                 1970s investigated N-version programming and recovery
                 blocks to increase the reliability of embedded systems.
                 Four decades later, the literature about software
                 diversity has expanded in multiple directions: goals
                 (fault tolerance, security, software engineering),
                 means (managed or automated diversity), and analytical
                 studies (quantification of diversity and its impact).
                 Our article contributes to the field of software
                 diversity as the first work that adopts an inclusive
                 vision of the area, with an emphasis on the most recent
                 advances in the field. This survey includes classical
                 work about design and data diversity for fault
                 tolerance, as well as the cybersecurity literature that
                 investigates randomization at different system levels.
                 It broadens this standard scope of diversity to include
                 the study and exploitation of natural diversity and the
                 management of diverse software products. Our survey
                 includes the most recent works, with an emphasis from
                 2000 to the present. The targeted audience is
                 researchers and practitioners in one of the surveyed
                 fields who miss the big picture of software diversity.
                 Assembling the multiple facets of this fascinating
                 topic sheds a new light on the field.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chen:2015:DRS,
  author =       "Yunji Chen and Shijin Zhang and Qi Guo and Ling Li and
                 Ruiyang Wu and Tianshi Chen",
  title =        "Deterministic Replay: a Survey",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "17:1--17:47",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2790077",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Deterministic replay is a type of emerging technique
                 dedicated to providing deterministic executions of
                 computer programs in the presence of nondeterministic
                 factors. The application scopes of deterministic replay
                 are very broad, making it an important research topic
                 in domains such as computer architecture, operating
                 systems, parallel computing, distributed computing,
                 programming languages, verification, and hardware
                 testing. In this survey, we comprehensively review
                 existing studies on deterministic replay by introducing
                 a taxonomy. Basically, existing deterministic replay
                 schemes can be classified into two categories,
                 single-processor (SP) schemes and multiprocessor (MP)
                 schemes. By reviewing the details of these two
                 categories of schemes respectively, we summarize and
                 compare how existing schemes address technical issues
                 such as log size, record slowdown, replay slowdown,
                 implementation cost, and probe effect, which may shed
                 some light on future studies on deterministic replay.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nielsen:2015:SSE,
  author =       "Claus Ballegaard Nielsen and Peter Gorm Larsen and
                 John Fitzgerald and Jim Woodcock and Jan Peleska",
  title =        "Systems of Systems Engineering: Basic Concepts,
                 Model-Based Techniques, and Research Directions",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "18:1--18:41",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2794381",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The term ``System of Systems'' (SoS) has been used
                 since the 1950s to describe systems that are composed
                 of independent constituent systems, which act jointly
                 towards a common goal through the synergism between
                 them. Examples of SoS arise in areas such as power grid
                 technology, transport, production, and military
                 enterprises. SoS engineering is challenged by the
                 independence, heterogeneity, evolution, and emergence
                 properties found in SoS. This article focuses on the
                 role of model-based techniques within the SoS
                 engineering field. A review of existing attempts to
                 define and classify SoS is used to identify several
                 dimensions that characterise SoS applications. The SoS
                 field is exemplified by a series of representative
                 systems selected from the literature on SoS
                 applications. Within the area of model-based techniques
                 the survey specifically reviews the state of the art
                 for SoS modelling, architectural description,
                 simulation, verification, and testing. Finally, the
                 identified dimensions of SoS characteristics are used
                 to identify research challenges and future research
                 areas of model-based SoS engineering.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dongol:2015:VLC,
  author =       "Brijesh Dongol and John Derrick",
  title =        "Verifying Linearisability: a Comparative Survey",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "19:1--19:43",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2796550",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Linearisability is a key correctness criterion for
                 concurrent data structures, ensuring that each history
                 of the concurrent object under consideration is
                 consistent with respect to a history of the
                 corresponding abstract data structure. Linearisability
                 allows concurrent (i.e., overlapping) operation calls
                 to take effect in any order, but requires the real-time
                 order of nonoverlapping to be preserved. The
                 sophisticated nature of concurrent objects means that
                 linearisability is difficult to judge, and hence, over
                 the years, numerous techniques for verifying
                 lineasizability have been developed using a variety of
                 formal foundations such as data refinement, shape
                 analysis, reduction, etc. However, because the
                 underlying framework, nomenclature, and terminology for
                 each method is different, it has become difficult for
                 practitioners to evaluate the differences between each
                 approach, and hence, evaluate the methodology most
                 appropriate for verifying the data structure at hand.
                 In this article, we compare the major of methods for
                 verifying linearisability, describe the main
                 contribution of each method, and compare their
                 advantages and limitations.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hassan:2015:IPU,
  author =       "Naveed {Ul Hassan} and Aqsa Naeem and Muhammad Adeel
                 Pasha and Tariq Jadoon and Chau Yuen",
  title =        "Indoor Positioning Using Visible {LED} Lights: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "20:1--20:32",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2835376",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Visible light LEDs, due to their numerous advantages,
                 are expected to become the dominant indoor lighting
                 technology. These lights can also be switched ON/OFF at
                 high frequency, enabling their additional use for
                 wireless communication and indoor positioning. In this
                 article, visible LED light--based indoor positioning
                 systems are surveyed and classified into two broad
                 categories based on the receiver structure. The basic
                 principle and architecture of each design category,
                 along with various position computation algorithms, are
                 discussed and compared. Finally, several new research,
                 implementation, commercialization, and standardization
                 challenges are identified and highlighted for this
                 relatively novel and interesting indoor localization
                 technology.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Velloso:2015:FHC,
  author =       "Eduardo Velloso and Dominik Schmidt and Jason
                 Alexander and Hans Gellersen and Andreas Bulling",
  title =        "The Feet in Human--Computer Interaction: a Survey of
                 Foot-Based Interaction",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "21:1--21:35",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2816455",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Foot-operated computer interfaces have been studied
                 since the inception of human--computer interaction.
                 Thanks to the miniaturisation and decreasing cost of
                 sensing technology, there is an increasing interest
                 exploring this alternative input modality, but no
                 comprehensive overview of its research landscape. In
                 this survey, we review the literature on interfaces
                 operated by the lower limbs. We investigate the
                 characteristics of users and how they affect the design
                 of such interfaces. Next, we describe and analyse
                 foot-based research prototypes and commercial systems
                 in how they capture input and provide feedback. We then
                 analyse the interactions between users and systems from
                 the perspective of the actions performed in these
                 interactions. Finally, we discuss our findings and use
                 them to identify open questions and directions for
                 future research.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kaur:2015:EET,
  author =       "Tarandeep Kaur and Inderveer Chana",
  title =        "Energy Efficiency Techniques in Cloud Computing: a
                 Survey and Taxonomy",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "22:1--22:46",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2742488",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The increase in energy consumption is the most
                 critical problem worldwide. The growth and development
                 of complex data-intensive applications have promulgated
                 the creation of huge data centers that have heightened
                 the energy demand. In this article, the need for energy
                 efficiency is emphasized by discussing the dual role of
                 cloud computing as a major contributor to increasing
                 energy consumption and as a method to reduce energy
                 wastage. This article comprehensively and comparatively
                 studies existing energy efficiency techniques in cloud
                 computing and provides the taxonomies for the
                 classification and evaluation of the existing studies.
                 The article concludes with a summary providing valuable
                 suggestions for future enhancements.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Guo:2015:NTP,
  author =       "Mingming Guo and Xinyu Jin and Niki Pissinou and
                 Sebastian Zanlongo and Bogdan Carbunar and S. S.
                 Iyengar",
  title =        "In-Network Trajectory Privacy Preservation",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "23:1--23:29",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2818183",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Recent advances in mobile device, wireless networking,
                 and positional technologies have helped location-aware
                 applications become pervasive. However, location
                 trajectory privacy concerns hinder the adoptability of
                 such applications. In this article, we survey existing
                 trajectory privacy work in the context of wireless
                 sensor networks, location-based services, and geosocial
                 networks. In each context, we categorize and summarize
                 the main techniques according to their own feathers.
                 Furthermore, we discuss future trajectory privacy
                 research challenges and directions.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Illiano:2015:DMD,
  author =       "Vittorio P. Illiano and Emil C. Lupu",
  title =        "Detecting Malicious Data Injections in Wireless Sensor
                 Networks: a Survey",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "24:1--24:33",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2818184",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Wireless Sensor Networks are widely advocated to
                 monitor environmental parameters, structural integrity
                 of the built environment and use of urban spaces,
                 services and utilities. However, embedded sensors are
                 vulnerable to compromise by external actors through
                 malware but also through their wireless and physical
                 interfaces. Compromised sensors can be made to report
                 false measurements with the aim to produce
                 inappropriate and potentially dangerous responses. Such
                 malicious data injections can be particularly difficult
                 to detect if multiple sensors have been compromised as
                 they could emulate plausible sensor behaviour such as
                 failures or detection of events where none occur. This
                 survey reviews the related work on malicious data
                 injection in wireless sensor networks, derives general
                 principles and a classification of approaches within
                 this domain, compares related studies and identifies
                 areas that require further investigation.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{McCune:2015:TLV,
  author =       "Robert Ryan McCune and Tim Weninger and Greg Madey",
  title =        "Thinking Like a Vertex: a Survey of Vertex-Centric
                 Frameworks for Large-Scale Distributed Graph
                 Processing",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "25:1--25:39",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2818185",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The vertex-centric programming model is an established
                 computational paradigm recently incorporated into
                 distributed processing frameworks to address challenges
                 in large-scale graph processing. Billion-node graphs
                 that exceed the memory capacity of commodity machines
                 are not well supported by popular Big Data tools like
                 MapReduce, which are notoriously poor performing for
                 iterative graph algorithms such as PageRank. In
                 response, a new type of framework challenges one to
                 ``think like a vertex'' (TLAV) and implements
                 user-defined programs from the perspective of a vertex
                 rather than a graph. Such an approach improves
                 locality, demonstrates linear scalability, and provides
                 a natural way to express and compute many iterative
                 graph algorithms. These frameworks are simple to
                 program and widely applicable but, like an operating
                 system, are composed of several intricate,
                 interdependent components, of which a thorough
                 understanding is necessary in order to elicit top
                 performance at scale. To this end, the first
                 comprehensive survey of TLAV frameworks is presented.
                 In this survey, the vertex-centric approach to graph
                 processing is overviewed, TLAV frameworks are
                 deconstructed into four main components and
                 respectively analyzed, and TLAV implementations are
                 reviewed and categorized.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Delvaux:2015:SLE,
  author =       "Jeroen Delvaux and Roel Peeters and Dawu Gu and Ingrid
                 Verbauwhede",
  title =        "A Survey on Lightweight Entity Authentication with
                 Strong {PUFs}",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "26:1--26:42",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2818186",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Physically unclonable functions (PUFs) exploit the
                 unavoidable manufacturing variations of an Integrated
                 Circuit (IC). Their input-output behavior serves as a
                 unique IC ``fingerprint.'' Therefore, they have been
                 envisioned as an IC authentication mechanism, in
                 particular the subclass of so-called strong PUFs. The
                 protocol proposals are typically accompanied with two
                 PUF promises: lightweight and an increased resistance
                 against physical attacks. In this work, we review 19
                 proposals in chronological order: from the original
                 strong PUF proposal (2001) to the more complicated
                 noise bifurcation and system of PUF proposals (2014).
                 The assessment is aided by a unified notation and a
                 transparent framework of PUF protocol requirements.",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Granatyr:2015:TRM,
  author =       "Jones Granatyr and Vanderson Botelho and Otto Robert
                 Lessing and Edson Em{\'\i}lio Scalabrin and Jean-Paul
                 Barth{\`e}s and Fabr{\'\i}cio Enembreck",
  title =        "Trust and Reputation Models for Multiagent Systems",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "27:1--27:42",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2816826",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Finding reliable partners to interact with in open
                 environments is a challenging task for software agents,
                 and trust and reputation mechanisms are used to handle
                 this issue. From this viewpoint, we can observe the
                 growing body of research on this subject, which
                 indicates that these mechanisms can be considered key
                 elements to design multiagent systems (MASs). Based on
                 that, this article presents an extensive but not
                 exhaustive review about the most significant trust and
                 reputation models published over the past two decades,
                 and hundreds of models were analyzed using two
                 perspectives. The first one is a combination of trust
                 dimensions and principles proposed by some relevant
                 authors in the field, and the models are discussed
                 using an MAS perspective. The second one is the
                 discussion of these dimensions taking into account some
                 types of interaction found in MASs, such as coalition,
                 argumentation, negotiation, and recommendation. By
                 these analyses, we aim to find significant relations
                 between trust dimensions and types of interaction so it
                 would be possible to construct MASs using the most
                 relevant dimensions according to the types of
                 interaction, which may help developers in the design of
                 MASs.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cho:2015:STM,
  author =       "Jin-Hee Cho and Kevin Chan and Sibel Adali",
  title =        "A Survey on Trust Modeling",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "28:1--28:40",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2815595",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The concept of trust and/or trust management has
                 received considerable attention in engineering research
                 communities as trust is perceived as the basis for
                 decision making in many contexts and the motivation for
                 maintaining long-term relationships based on
                 cooperation and collaboration. Even if substantial
                 research effort has been dedicated to addressing
                 trust-based mechanisms or trust metrics (or
                 computation) in diverse contexts, prior work has not
                 clearly solved the issue of how to model and quantify
                 trust with sufficient detail and context-based
                 adequateness. The issue of trust quantification has
                 become more complicated as we have the need to derive
                 trust from complex, composite networks that may involve
                 four distinct layers of communication protocols,
                 information exchange, social interactions, and
                 cognitive motivations. In addition, the diverse
                 application domains require different aspects of trust
                 for decision making such as emotional, logical, and
                 relational trust. This survey aims to outline the
                 foundations of trust models for applications in these
                 contexts in terms of the concept of trust, trust
                 assessment, trust constructs, trust scales, trust
                 properties, trust formulation, and applications of
                 trust. We discuss how different components of trust can
                 be mapped to different layers of a complex, composite
                 network; applicability of trust metrics and models;
                 research challenges; and future work directions.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Saini:2015:HCW,
  author =       "Mukesh Saini and Abdulhameed Alelaiwi and Abdulmotaleb
                 {El Saddik}",
  title =        "How Close are We to Realizing a Pragmatic {VANET}
                 Solution? {A} Meta-Survey",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "29:1--29:40",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2817552",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Vehicular Ad-hoc Networks (VANETs) are seen as the key
                 enabling technology of Intelligent Transportation
                 Systems (ITS). In addition to safety, VANETs also
                 provide a cost-effective platform for numerous comfort
                 and entertainment applications. A pragmatic solution of
                 VANETs requires synergistic efforts in
                 multidisciplinary areas of communication standards,
                 routings, security and trust. Furthermore, a realistic
                 VANET simulator is required for performance evaluation.
                 There have been many research efforts in these areas,
                 and consequently, a number of surveys have been
                 published on various aspects. In this article, we first
                 explain the key characteristics of VANETs, then provide
                 a meta-survey of research works. We take a tutorial
                 approach to introducing VANETs and gradually discuss
                 intricate details. Extensive listings of existing
                 surveys and research projects have been provided to
                 assess development efforts. The article is useful for
                 researchers to look at the big picture and channel
                 their efforts in an effective way.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shilkrot:2015:DDC,
  author =       "Roy Shilkrot and Jochen Huber and J{\"u}rgen Steimle
                 and Suranga Nanayakkara and Pattie Maes",
  title =        "Digital Digits: a Comprehensive Survey of Finger
                 Augmentation Devices",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "30:1--30:29",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2828993",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Finger augmentation devices, those that are worn and
                 operated by fingers, are a rapidly growing field in the
                 human--computer interaction domain. This field is
                 rooted in ancient history; however, still the academic
                 research arena is booming with new finger augmentations
                 every year. This article strives to survey the entire
                 body of work on finger augmentation devices and uncover
                 the trends and the underexplored territories. We
                 contribute a methodical classification of over 150
                 pieces of academic, product, patent, and concept work.
                 We discuss the underlying sensing and feedback
                 modalities and provide a definition, taxonomy, and
                 reference for researchers of finger augmentation
                 devices.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Souza:2015:MQT,
  author =       "Ramon Hugo {De Souza} and M{\'a}rio Ant{\^o}nio
                 {Ribeiro Dantas}",
  title =        "Mapping {QoE} through {QoS} in an Approach to {DDB}
                 Architectures: Research Analysis and
                 Conceptualization",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "31:1--31:41",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2828994",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In the context of distributed databases (DDBs), the
                 absence of mathematically well defined equations to
                 evaluate quality of service (QoS), especially with
                 statistical models, seems to have taken database
                 community attention from the possible performance
                 guarantees that could be handled by concepts related to
                 quality of experience (QoE). In this article, we
                 targeted the definition of QoE based on completeness of
                 QoS to deal with decisions concerning with performance
                 correction in a system level. This study also presents
                 a statistical bibliometric analysis before the proposed
                 model. The idea was to show the origin of first studies
                 with correlated focus, which also have initial
                 conceptualizations, and then propose a new model. This
                 model concerns concise QoS definitions, grouped to
                 provide a basis for QoE analysis. Afterward, it is
                 foreseen that a DDB system will be able to autoevaluate
                 and be aware of recovering situations before they
                 happen.",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gracioli:2015:SCM,
  author =       "Giovani Gracioli and Ahmed Alhammad and Renato Mancuso
                 and Ant{\^o}nio Augusto Fr{\"o}hlich and Rodolfo
                 Pellizzoni",
  title =        "A Survey on Cache Management Mechanisms for Real-Time
                 Embedded Systems",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "2",
  pages =        "32:1--32:36",
  month =        nov,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2830555",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Nov 25 15:50:15 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Multicore processors are being extensively used by
                 real-time systems, mainly because of their demand for
                 increased computing power. However, multicore
                 processors have shared resources that affect the
                 predictability of real-time systems, which is the key
                 to correctly estimate the worst-case execution time of
                 tasks. One of the main factors for unpredictability in
                 a multicore processor is the cache memory hierarchy.
                 Recently, many research works have proposed different
                 techniques to deal with caches in multicore processors
                 in the context of real-time systems. Nevertheless, a
                 review and categorization of these techniques is still
                 an open topic and would be very useful for the
                 real-time community. In this article, we present a
                 survey of cache management techniques for real-time
                 embedded systems, from the first studies of the field
                 in 1990 up to the latest research published in 2014. We
                 categorize the main research works and provide a
                 detailed comparison in terms of similarities and
                 differences. We also identify key challenges and
                 discuss future research directions.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lemos:2016:WSC,
  author =       "Angel Lagares Lemos and Florian Daniel and Boualem
                 Benatallah",
  title =        "{Web} Service Composition: a Survey of Techniques and
                 Tools",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "33:1--33:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2831270",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Web services are a consolidated reality of the modern
                 Web with tremendous, increasing impact on everyday
                 computing tasks. They turned the Web into the largest,
                 most accepted, and most vivid distributed computing
                 platform ever. Yet, the use and integration of Web
                 services into composite services or applications, which
                 is a highly sensible and conceptually non-trivial task,
                 is still not unleashing its full magnitude of power. A
                 consolidated analysis framework that advances the
                 fundamental understanding of Web service composition
                 building blocks in terms of concepts, models,
                 languages, productivity support techniques, and tools
                 is required. This framework is necessary to enable
                 effective exploration, understanding, assessing,
                 comparing, and selecting service composition models,
                 languages, techniques, platforms, and tools. This
                 article establishes such a framework and reviews the
                 state of the art in service composition from an
                 unprecedented, holistic perspective.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Benmansour:2016:MAR,
  author =       "Asma Benmansour and Abdelhamid Bouchachia and Mohammed
                 Feham",
  title =        "Multioccupant Activity Recognition in Pervasive Smart
                 Home Environments",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "34:1--34:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2835372",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Human activity recognition in ambient intelligent
                 environments like homes, offices, and classrooms has
                 been the center of a lot of research for many years
                 now. The aim is to recognize the sequence of actions by
                 a specific person using sensor readings. Most of the
                 research has been devoted to activity recognition of
                 single occupants in the environment. However, living
                 environments are usually inhabited by more than one
                 person and possibly with pets. Hence, human activity
                 recognition in the context of multioccupancy is more
                 general, but also more challenging. The difficulty
                 comes from mainly two aspects: resident identification,
                 known as data association, and diversity of human
                 activities. The present survey article provides an
                 overview of existing approaches and current practices
                 for activity recognition in multioccupant smart homes.
                 It presents the latest developments and highlights the
                 open issues in this field.",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Koutrouli:2016:RSE,
  author =       "Eleni Koutrouli and Aphrodite Tsalgatidou",
  title =        "Reputation Systems Evaluation Survey",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "35:1--35:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2835373",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Various reputation systems have been proposed for a
                 broad range of distributed applications, such as
                 peer-to-peer, ad-hoc, and multiagent systems. Their
                 evaluation has been mostly based on proprietary methods
                 due to the lack of widely acceptable evaluation
                 measures and methodologies. Differentiating factors in
                 various evaluation approaches include the evaluation
                 metrics, the consideration of the dynamic behavior of
                 peers, the use of social networks, or the study of
                 resilience to specific threat scenarios. The lack of a
                 generally accepted common evaluation framework hinders
                 the objective evaluation and comparison of different
                 reputation systems. Aiming at narrowing the gap in the
                 research area of objective evaluation of reputation
                 systems, in this article, we study the various
                 approaches to evaluating and comparing reputation
                 systems, present them in a taxonomy, and analyze their
                 strengths and limitations, with special focus on works
                 suggesting a Common Evaluation Framework (CEF). We
                 identify the challenges for a widely accepted CEF that
                 enables testing and benchmarking of reputation systems,
                 and we present the required properties for such a CEF;
                 we also present an analysis of current CEF-related
                 works in the context of the identified properties and
                 our related proposals.",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Brienza:2016:SEE,
  author =       "Simone Brienza and Sena Efsun Cebeci and Seyed Saeid
                 Masoumzadeh and Helmut Hlavacs and {\"O}znur
                 {\"O}zkasap and Giuseppe Anastasi",
  title =        "A Survey on Energy Efficiency in {P2P} Systems: File
                 Distribution, Content Streaming, and Epidemics",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "36:1--36:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2835374",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Several Peer-to-Peer (P2P) protocols and applications
                 have been developed to allow file distribution/sharing,
                 video and music streaming, and data and information
                 dissemination. These P2P systems are regularly used by
                 a large number of users, both in desktop and mobile
                 environments, and they generate a remarkable portion of
                 the overall Internet traffic. However, many common P2P
                 protocols and applications were designed neglecting the
                 energy problem. In fact, they often require always-on
                 devices in order to work properly, thus producing
                 significant energy waste. The problem is even more
                 relevant in the mobile context, since the battery
                 lifetime of mobile devices is limited. Therefore,
                 energy efficiency in P2P systems is a highly debated
                 topic in the literature. New P2P approaches-more energy
                 efficient than traditional client/server solutions-have
                 been proposed. In addition, several improvements to
                 existing P2P protocols have been introduced to reduce
                 their energy consumption. In this article, we present a
                 general taxonomy to classify state-of-the-art
                 approaches to the energy problem in P2P systems and
                 applications. Then, we survey the main solutions
                 available in the literature, focusing on three relevant
                 classes of P2P systems and applications: file
                 sharing/distribution, content streaming, and epidemics.
                 Furthermore, we outline open issues and provide future
                 research guidelines for each class of P2P systems.",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Heartfield:2016:TAS,
  author =       "Ryan Heartfield and George Loukas",
  title =        "A Taxonomy of Attacks and a Survey of Defence
                 Mechanisms for Semantic Social Engineering Attacks",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "37:1--37:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2835375",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Social engineering is used as an umbrella term for a
                 broad spectrum of computer exploitations that employ a
                 variety of attack vectors and strategies to
                 psychologically manipulate a user. Semantic attacks are
                 the specific type of social engineering attacks that
                 bypass technical defences by actively manipulating
                 object characteristics, such as platform or system
                 applications, to deceive rather than directly attack
                 the user. Commonly observed examples include obfuscated
                 URLs, phishing emails, drive-by downloads, spoofed
                 websites and scareware to name a few. This article
                 presents a taxonomy of semantic attacks, as well as a
                 survey of applicable defences. By contrasting the
                 threat landscape and the associated mitigation
                 techniques in a single comparative matrix, we identify
                 the areas where further research can be particularly
                 beneficial.",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hess:2016:DDH,
  author =       "Andrea Hess and Karin Anna Hummel and Wilfried N.
                 Gansterer and G{\"u}nter Haring",
  title =        "Data-driven Human Mobility Modeling: a Survey and
                 Engineering Guidance for Mobile Networking",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "38:1--38:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2840722",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Over the last decades, modeling of user mobility has
                 become increasingly important in mobile networking
                 research and development. This has led to the adoption
                 of modeling techniques from other disciplines such as
                 kinetic theory or urban planning. Yet these techniques
                 generate movement behavior that is often perceived as
                 not ``realistic'' for humans or provides only a
                 macroscopic view on mobility. More recent approaches
                 infer mobility models from real traces provided by
                 positioning technologies or by the marks the mobile
                 users leave in the wireless network. However, there is
                 no common framework for assessing and comparing
                 mobility models. In an attempt to provide a solid
                 foundation for realistic mobility modeling in mobile
                 networking research, we take an engineering approach
                 and thoroughly discuss the required steps of model
                 creation and validation. In this context, we survey how
                 and to what extent existing mobility modeling
                 approaches implement the proposed steps. This also
                 summarizes helpful information for readers who do not
                 want to develop a new model, but rather intend to
                 choose among existing ones.",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hoque:2016:MPD,
  author =       "Mohammad Ashraful Hoque and Matti Siekkinen and Kashif
                 Nizam Khan and Yu Xiao and Sasu Tarkoma",
  title =        "Modeling, Profiling, and Debugging the Energy
                 Consumption of Mobile Devices",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "39:1--39:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2840723",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Software energy profilers are the tools to measure the
                 energy consumption of mobile devices, applications
                 running on those devices, and various hardware
                 components. They adopt different modeling and
                 measurement techniques. In this article, we aim to
                 review a wide range of such energy profilers for mobile
                 devices. First, we introduce the terminologies and
                 describe the power modeling and measurement
                 methodologies applied in model-based energy profiling.
                 Next, we classify the profilers according to their
                 implementation and deployment strategies, and compare
                 the profiling capabilities and performance between
                 different types. Finally, we point out their
                 limitations and the corresponding challenges.",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Narayan:2016:SAP,
  author =       "John Narayan and Sandeep K. Shukla and T. Charles
                 Clancy",
  title =        "A Survey of Automatic Protocol Reverse Engineering
                 Tools",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "40:1--40:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2840724",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Computer network protocols define the rules in which
                 two entities communicate over a network of unique
                 hosts. Many protocol specifications are unknown,
                 unavailable, or minimally documented, which prevents
                 thorough analysis of the protocol for security
                 purposes. For example, modern botnets often use
                 undocumented and unique application-layer communication
                 protocols to maintain command and control over numerous
                 distributed hosts. Inferring the specification of
                 closed protocols has numerous advantages, such as
                 intelligent deep packet inspection, enhanced intrusion
                 detection system algorithms for communications, and
                 integration with legacy software packages. The
                 multitude of closed protocols coupled with existing
                 time-intensive reverse engineering methodologies has
                 spawned investigation into automated approaches for
                 reverse engineering of closed protocols. This article
                 summarizes and organizes previously presented automatic
                 protocol reverse engineering tools by approach.
                 Approaches that focus on reverse engineering the finite
                 state machine of a target protocol are separated from
                 those that focus on reverse engineering the protocol
                 format.",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Momeni:2016:SAR,
  author =       "Elaheh Momeni and Claire Cardie and Nicholas
                 Diakopoulos",
  title =        "A Survey on Assessment and Ranking Methodologies for
                 User-Generated Content on the {Web}",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "41:1--41:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2811282",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "User-generated content (UGC) on the Web, especially on
                 social media platforms, facilitates the association of
                 additional information with digital resources; thus, it
                 can provide valuable supplementary content. However,
                 UGC varies in quality and, consequently, raises the
                 challenge of how to maximize its utility for a variety
                 of end-users. This study aims to provide researchers
                 and Web data curators with comprehensive answers to the
                 following questions: What are the existing approaches
                 and methods for assessing and ranking UGC? What
                 features and metrics have been used successfully to
                 assess and predict UGC value across a range of
                 application domains? What methods can be effectively
                 employed to maximize that value? This survey is
                 composed of a systematic review of approaches for
                 assessing and ranking UGC: results are obtained by
                 identifying and comparing methodologies within the
                 context of short text-based UGC on the Web. Existing
                 assessment and ranking approaches adopt one of four
                 framework types: the community-based framework takes
                 into consideration the value assigned to content by a
                 crowd of humans, the end-user--based framework adapts
                 and personalizes the assessment and ranking process
                 with respect to a single end-user, the designer-based
                 framework encodes the software designer's values in the
                 assessment and ranking method, and the hybrid framework
                 employs methods from more than one of these types. This
                 survey suggests a need for further experimentation and
                 encourages the development of new approaches for the
                 assessment and ranking of UGC.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Singh:2016:QAA,
  author =       "Sukhpal Singh and Inderveer Chana",
  title =        "{QoS}-Aware Autonomic Resource Management in Cloud
                 Computing: a Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "42:1--42:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2843889",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "As computing infrastructure expands, resource
                 management in a large, heterogeneous, and distributed
                 environment becomes a challenging task. In a cloud
                 environment, with uncertainty and dispersion of
                 resources, one encounters problems of allocation of
                 resources, which is caused by things such as
                 heterogeneity, dynamism, and failures. Unfortunately,
                 existing resource management techniques, frameworks,
                 and mechanisms are insufficient to handle these
                 environments, applications, and resource behaviors. To
                 provide efficient performance of workloads and
                 applications, the aforementioned characteristics should
                 be addressed effectively. This research depicts a broad
                 methodical literature analysis of autonomic resource
                 management in the area of the cloud in general and QoS
                 (Quality of Service)-aware autonomic resource
                 management specifically. The current status of
                 autonomic resource management in cloud computing is
                 distributed into various categories. Methodical
                 analysis of autonomic resource management in cloud
                 computing and its techniques are described as developed
                 by various industry and academic groups. Further,
                 taxonomy of autonomic resource management in the cloud
                 has been presented. This research work will help
                 researchers find the important characteristics of
                 autonomic resource management and will also help to
                 select the most suitable technique for autonomic
                 resource management in a specific application along
                 with significant future research directions.",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Faniyi:2016:SRS,
  author =       "Funmilade Faniyi and Rami Bahsoon",
  title =        "A Systematic Review of Service Level Management in the
                 Cloud",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "43:1--43:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2843890",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Cloud computing make it possible to flexibly procure,
                 scale, and release computational resources on demand in
                 response to workload changes. Stakeholders in business
                 and academia are increasingly exploring cloud
                 deployment options for their critical applications. One
                 open problem is that service level agreements (SLAs) in
                 the cloud ecosystem are yet to mature to a state where
                 critical applications can be reliably deployed in
                 clouds. This article systematically surveys the
                 landscape of SLA-based cloud research to understand the
                 state of the art and identify open problems. The survey
                 is particularly aimed at the resource allocation phase
                 of the SLA life cycle while highlighting implications
                 on other phases. Results indicate that (i) minimal
                 number of SLA parameters are accounted for in most
                 studies; (ii) heuristics, policies, and optimisation
                 are the most commonly used techniques for resource
                 allocation; and (iii) the monitor-analysis-plan-execute
                 (MAPE) architecture style is predominant in autonomic
                 cloud systems. The results contribute to the
                 fundamentals of engineering cloud SLA and their
                 autonomic management, motivating further research and
                 industrial-oriented solutions.",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Natella:2016:ADS,
  author =       "Roberto Natella and Domenico Cotroneo and Henrique S.
                 Madeira",
  title =        "Assessing Dependability with Software Fault Injection:
                 a Survey",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "44:1--44:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2841425",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "With the rise of software complexity, software-related
                 accidents represent a significant threat for
                 computer-based systems. Software Fault Injection is a
                 method to anticipate worst-case scenarios caused by
                 faulty software through the deliberate injection of
                 software faults. This survey provides a comprehensive
                 overview of the state of the art on Software Fault
                 Injection to support researchers and practitioners in
                 the selection of the approach that best fits their
                 dependability assessment goals, and it discusses how
                 these approaches have evolved to achieve fault
                 representativeness, efficiency, and usability. The
                 survey includes a description of relevant applications
                 of Software Fault Injection in the context of
                 fault-tolerant systems.",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mittal:2016:STAa,
  author =       "Sparsh Mittal",
  title =        "A Survey of Techniques for Architecting and Managing
                 Asymmetric Multicore Processors",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "45:1--45:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2856125",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "To meet the needs of a diverse range of workloads,
                 asymmetric multicore processors (AMPs) have been
                 proposed, which feature cores of different
                 microarchitecture or ISAs. However, given the diversity
                 inherent in their design and application scenarios,
                 several challenges need to be addressed to effectively
                 architect AMPs and leverage their potential in
                 optimizing both sequential and parallel performance.
                 Several recent techniques address these challenges. In
                 this article, we present a survey of architectural and
                 system-level techniques proposed for designing and
                 managing AMPs. By classifying the techniques on several
                 key characteristics, we underscore their similarities
                 and differences. We clarify the terminology used in
                 this research field and identify challenges that are
                 worthy of future investigation. We hope that more than
                 just synthesizing the existing work on AMPs, the
                 contribution of this survey will be to spark novel
                 ideas for architecting future AMPs that can make a
                 definite impact on the landscape of next-generation
                 computing systems.",
  acknowledgement = ack-nhfb,
  articleno =    "45",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sgandurra:2016:EAT,
  author =       "Daniele Sgandurra and Emil Lupu",
  title =        "Evolution of Attacks, Threat Models, and Solutions for
                 Virtualized Systems",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "46:1--46:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2856126",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Virtualization technology enables Cloud providers to
                 efficiently use their computing services and resources.
                 Even if the benefits in terms of performance,
                 maintenance, and cost are evident, however,
                 virtualization has also been exploited by attackers to
                 devise new ways to compromise a system. To address
                 these problems, research security solutions have
                 evolved considerably over the years to cope with new
                 attacks and threat models. In this work, we review the
                 protection strategies proposed in the literature and
                 show how some of the solutions have been invalidated by
                 new attacks, or threat models, that were previously not
                 considered. The goal is to show the evolution of the
                 threats, and of the related security and trust
                 assumptions, in virtualized systems that have given
                 rise to complex threat models and the corresponding
                 sophistication of protection strategies to deal with
                 such attacks. We also categorize threat models,
                 security and trust assumptions, and attacks against a
                 virtualized system at the different layers-in
                 particular, hardware, virtualization, OS, and
                 application.",
  acknowledgement = ack-nhfb,
  articleno =    "46",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Avoine:2016:SSP,
  author =       "Gildas Avoine and Antonin Beaujeant and Julio
                 Hernandez-Castro and Louis Demay and Philippe Teuwen",
  title =        "A Survey of Security and Privacy Issues in {ePassport}
                 Protocols",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "47:1--47:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2825026",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "This article examines in great detail the most
                 relevant security and privacy issues affecting the
                 protocols used by contactless chips integrated in
                 ePassports, and presents all relevant literature
                 together with some new attacks and insights that could
                 help in improving future standards and the next
                 generations of ePassports.",
  acknowledgement = ack-nhfb,
  articleno =    "47",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Calzarossa:2016:WCS,
  author =       "Maria Carla Calzarossa and Luisa Massari and Daniele
                 Tessera",
  title =        "Workload Characterization: a Survey Revisited",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "48:1--48:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2856127",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Workload characterization is a well-established
                 discipline that plays a key role in many performance
                 engineering studies. The large-scale social behavior
                 inherent in the applications and services being
                 deployed nowadays leads to rapid changes in workload
                 intensity and characteristics and opens new challenging
                 management and performance issues. A deep understanding
                 of user behavior and workload properties and patterns
                 is therefore compelling. This article presents a
                 comprehensive survey of the state of the art of
                 workload characterization by addressing its
                 exploitation in some popular application domains. In
                 particular, we focus on conventional web workloads as
                 well as on the workloads associated with online social
                 networks, video services, mobile apps, and cloud
                 computing infrastructures. We discuss the peculiarities
                 of these workloads and present the methodological
                 approaches and modeling techniques applied for their
                 characterization. The role of workload models in
                 various scenarios (e.g., performance evaluation,
                 capacity planning, content distribution, resource
                 provisioning) is also analyzed.",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ren:2016:SMO,
  author =       "Yi Ren and Ling Liu and Qi Zhang and Qingbo Wu and
                 Jianbo Guan and Jinzhu Kong and Huadong Dai and Lisong
                 Shao",
  title =        "Shared-Memory Optimizations for Inter-Virtual-Machine
                 Communication",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "49:1--49:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2847562",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Virtual machines (VMs) and virtualization are one of
                 the core computing technologies today. Inter-VM
                 communication is not only prevalent but also one of the
                 leading costs for data-intensive systems and
                 applications in most data centers and cloud computing
                 environments. One way to improve inter-VM communication
                 efficiency is to support coresident VM communication
                 using shared-memory-based methods and resort to the
                 traditional TCP/IP for communications between VMs that
                 are located on different physical machines. In recent
                 years, several independent kernel development efforts
                 have been dedicated to improving communication
                 efficiency between coresident VMs using shared-memory
                 channels, and the development efforts differ from one
                 another in terms of where and how the shared-memory
                 channel is established. In this article, we provide a
                 comprehensive overview of the design choices and
                 techniques for performance optimization of coresident
                 inter-VM communication. We examine the key issues for
                 improving inter-VM communication using
                 shared-memory-based mechanisms, such as implementation
                 choices in the software stack, seamless agility for
                 dynamic addition or removal of coresident VMs, and
                 multilevel transparency, as well as advanced
                 requirements in reliability, security, and stability.
                 An in-depth comparison of state-of-the-art research
                 efforts, implementation techniques, evaluation methods,
                 and performance is conducted. We conjecture that this
                 comprehensive survey will not only provide the
                 foundation for developing the next generation of
                 inter-VM communication optimization mechanisms but also
                 offers opportunities to both cloud infrastructure
                 providers and cloud service providers and consumers for
                 improving communication efficiency between coresident
                 VMs in virtualized computing platforms.",
  acknowledgement = ack-nhfb,
  articleno =    "49",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mitra:2016:SRM,
  author =       "Barsha Mitra and Shamik Sural and Jaideep Vaidya and
                 Vijayalakshmi Atluri",
  title =        "A Survey of Role Mining",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "50:1--50:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2871148",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Role-Based Access Control (RBAC) is the most widely
                 used model for advanced access control deployed in
                 diverse enterprises of all sizes. RBAC critically
                 depends on defining roles, which are a functional
                 intermediate between users and permissions. Thus, for
                 RBAC to be effective, an appropriate set of roles needs
                 to be identified. Since many organizations already have
                 user-permission assignments defined in some form, it
                 makes sense to identify roles from this existing
                 information. This process, known as role mining, is one
                 of the critical steps for successful RBAC adoption in
                 any enterprise. In recent years, numerous role mining
                 techniques have been developed, which take into account
                 the characteristics of the core RBAC model, as well as
                 its various extended features. In this article, we
                 comprehensively study and classify the basic problem of
                 role mining along with its several variants and the
                 corresponding solution strategies. Categorization is
                 done on the basis of the nature of the target RBAC
                 system, the objective of role mining, and the type of
                 solution. We then discuss the limitations of existing
                 work and identify new areas of research that can lead
                 to further enrichment of this field.",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Farias:2016:SRS,
  author =       "Claudio M. De Farias and Wei Li and Fl{\'a}via C.
                 Delicato and Luci Pirmez and Albert Y. Zomaya and Paulo
                 F. Pires and Jos{\'e} N. {De Souza}",
  title =        "A Systematic Review of Shared Sensor Networks",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "51:1--51:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2851510",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "While Wireless Sensor Networks (WSNs) have been
                 traditionally tasked with single applications, in
                 recent years we have witnessed the emergence of Shared
                 Sensor Networks (SSNs) as integrated cyber-physical
                 system infrastructures for a multitude of applications.
                 Instead of assuming an application-specific network
                 design, SSNs allow the underlying infrastructure to be
                 shared among multiple applications that can potentially
                 belong to different users. On one hand, a potential
                 benefit of such a design approach is to increase the
                 utilization of sensing and communication resources,
                 whenever the underlying network infrastructure covers
                 the same geographic area and the sensor nodes monitor
                 the same physical variables of common interest for
                 different applications. On the other hand, compared
                 with the existing application-specific design, the SSNs
                 approach poses several research challenges with regard
                 to different aspects of WSNs. In this article, we
                 present a systematic literature survey on SSNs. The
                 main goal of the article is to provide the reader with
                 the opportunity to understand what has been done and
                 what remains as open issues in this field, as well as
                 which are the pivotal factors of this evolutionary
                 design and how this kind of design can be exploited by
                 a wide range of WSN applications.",
  acknowledgement = ack-nhfb,
  articleno =    "51",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Crocco:2016:ASS,
  author =       "Marco Crocco and Marco Cristani and Andrea Trucco and
                 Vittorio Murino",
  title =        "Audio Surveillance: a Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "52:1--52:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2871183",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Despite surveillance systems becoming increasingly
                 ubiquitous in our living environment, automated
                 surveillance, currently based on video sensory modality
                 and machine intelligence, lacks most of the time the
                 robustness and reliability required in several real
                 applications. To tackle this issue, audio sensory
                 devices have been incorporated, both alone or in
                 combination with video, giving birth in the past
                 decade, to a considerable amount of research. In this
                 article, audio-based automated surveillance methods are
                 organized into a comprehensive survey: A general
                 taxonomy, inspired by the more widespread video
                 surveillance field, is proposed to systematically
                 describe the methods covering background subtraction,
                 event classification, object tracking, and situation
                 analysis. For each of these tasks, all the significant
                 works are reviewed, detailing their pros and cons and
                 the context for which they have been proposed.
                 Moreover, a specific section is devoted to audio
                 features, discussing their expressiveness and their
                 employment in the above-described tasks. Differing from
                 other surveys on audio processing and analysis, the
                 present one is specifically targeted to automated
                 surveillance, highlighting the target applications of
                 each described method and providing the reader with a
                 systematic and schematic view useful for retrieving the
                 most suited algorithms for each specific requirement.",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Maghdid:2016:SOI,
  author =       "Halgurd S. Maghdid and Ihsan Alshahib Lami and Kayhan
                 Zrar Ghafoor and Jaime Lloret",
  title =        "Seamless Outdoors-Indoors Localization Solutions on
                 Smartphones: Implementation and Challenges",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "53:1--53:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2871166",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The demand for more sophisticated Location-Based
                 Services (LBS) in terms of applications variety and
                 accuracy is tripling every year since the emergence of
                 the smartphone a few years ago. Equally, smartphone
                 manufacturers are mounting several wireless
                 communication and localization technologies, inertial
                 sensors as well as powerful processing capability, to
                 cater to such LBS applications. A hybrid of wireless
                 technologies is needed to provide seamless localization
                 solutions and to improve accuracy, to reduce time to
                 fix, and to reduce power consumption. The review of
                 localization techniques/technologies of this emerging
                 field is therefore important. This article reviews the
                 recent research-oriented and commercial localization
                 solutions on smartphones. The focus of this article is
                 on the implementation challenges associated with
                 utilizing these positioning solutions on Android-based
                 smartphones. Furthermore, the taxonomy of
                 smartphone-location techniques is highlighted with a
                 special focus on the detail of each technique and its
                 hybridization. The article compares the indoor
                 localization techniques based on accuracy, utilized
                 wireless technology, overhead, and localization
                 technique used. The pursuit of achieving ubiquitous
                 localization outdoors and indoors for critical LBS
                 applications such as security and safety shall dominate
                 future research efforts.",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mittal:2016:SAT,
  author =       "Sparsh Mittal",
  title =        "A Survey of Architectural Techniques for Managing
                 Process Variation",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "54:1--54:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2871167",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Process variation-deviation in parameters from their
                 nominal specifications-threatens to slow down and even
                 pause technological scaling, and mitigation of it is
                 the way to continue the benefits of chip
                 miniaturization. In this article, we present a survey
                 of architectural techniques for managing process
                 variation (PV) in modern processors. We also classify
                 these techniques based on several important parameters
                 to bring out their similarities and differences. The
                 aim of this article is to provide insights to
                 researchers into the state of the art in PV management
                 techniques and motivate them to further improve these
                 techniques for designing PV-resilient processors of
                 tomorrow.",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Stahl:2016:ECS,
  author =       "Bernd Carsten Stahl and Job Timmermans and Brent
                 Daniel Mittelstadt",
  title =        "The Ethics of Computing: a Survey of the
                 Computing-Oriented Literature",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "55:1--55:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2871196",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Computing technologies and artifacts are increasingly
                 integrated into most aspects of our professional,
                 social, and private lives. One consequence of this
                 growing ubiquity of computing is that it can have
                 significant ethical implications that computing
                 professionals need to be aware of. The relationship
                 between ethics and computing has long been discussed.
                 However, this is the first comprehensive survey of the
                 mainstream academic literature of the topic. Based on a
                 detailed qualitative analysis of the literature, the
                 article discusses ethical issues, technologies that
                 they are related to, and ethical theories, as well as
                 the methodologies that the literature employs, its
                 academic contribution, and resulting recommendations.
                 The article discusses general trends and argues that
                 the time has come for a transition to responsible
                 research and innovation to ensure that ethical
                 reflection of computing has practical and manifest
                 consequences.",
  acknowledgement = ack-nhfb,
  articleno =    "55",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Murray:2016:OEM,
  author =       "Niall Murray and Brian Lee and Yuansong Qiao and
                 Gabriel-Miro Muntean",
  title =        "Olfaction-Enhanced Multimedia: a Survey of Application
                 Domains, Displays, and Research Challenges",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "56:1--56:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2816454",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Recently, the concept of olfaction-enhanced multimedia
                 applications has gained traction as a step toward
                 further enhancing user quality of experience. The next
                 generation of rich media services will be immersive and
                 multisensory, with olfaction playing a key role. This
                 survey reviews current olfactory-related research from
                 a number of perspectives. It introduces and explains
                 relevant olfactory psychophysical terminology,
                 knowledge of which is necessary for working with
                 olfaction as a media component. In addition, it reviews
                 and highlights the use of, and potential for, olfaction
                 across a number of application domains, namely health,
                 tourism, education, and training. A taxonomy of
                 research and development of olfactory displays is
                 provided in terms of display type, scent generation
                 mechanism, application area, and strengths/weaknesses.
                 State of the art research works involving olfaction are
                 discussed and associated research challenges are
                 proposed.",
  acknowledgement = ack-nhfb,
  articleno =    "56",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Palaghias:2016:SMS,
  author =       "Niklas Palaghias and Seyed Amir Hoseinitabatabaei and
                 Michele Nati and Alexander Gluhak and Klaus Moessner",
  title =        "A Survey on Mobile Social Signal Processing",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "57:1--57:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2893487",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Understanding human behavior in an automatic but
                 nonintrusive manner is an important area for various
                 applications. This requires the collaboration of
                 information technology with human sciences to transfer
                 existing knowledge of human behavior into self-acting
                 tools. These tools will reduce human error that is
                 introduced by current obtrusive methods such as
                 questionnaires. To achieve unobtrusiveness, we focus on
                 exploiting the pervasive and ubiquitous character of
                 mobile devices. In this article, a survey of existing
                 techniques for extracting social behavior through
                 mobile devices is provided. Initially, we expose the
                 terminology used in the area and introduce a concrete
                 architecture for social signal processing applications
                 on mobile phones, constituted by sensing, social
                 interaction detection, behavioral cues extraction,
                 social signal inference, and social behavior
                 understanding. Furthermore, we present state-of-the-art
                 techniques applied to each stage of the process.
                 Finally, potential applications are shown while arguing
                 about the main challenges of the area.",
  acknowledgement = ack-nhfb,
  articleno =    "57",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Harrison:2016:RED,
  author =       "David C. Harrison and Winston K. G. Seah and Ramesh
                 Rayudu",
  title =        "Rare Event Detection and Propagation in Wireless
                 Sensor Networks",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "58:1--58:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2885508",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Rarely occurring events present unique challenges to
                 energy constrained systems designed for long term
                 sensing of their occurrence or effect. Unlike periodic
                 sampling or query based sensing systems, longevity
                 cannot be achieved simply by adjusting the sensing
                 nodes' duty cycle until an equitable balance between
                 data density and network lifetime is established. The
                 low probability of occurrence and random nature of rare
                 events makes it difficult to guarantee duty cycled
                 battery powered sensing nodes will be energised when
                 events occur. Equally, it is usually considered
                 impractical to leave the sensing nodes energised at all
                 times if the network is to have an acceptably long
                 operational life. In the past decade and a half,
                 wireless sensor network research has addressed this
                 aspect of rare event sensing by investigating
                 techniques including synchronised duty cycling of
                 redundant nodes, passive sensing, duplicate message
                 suppression, and energy efficient network protocols.
                 Researchers have also demonstrated the efficacy of
                 harvesting energy from the environment to extend
                 operational life. Here we survey existing rare event
                 detection and propagation techniques, and suggest areas
                 suitable for continued research.",
  acknowledgement = ack-nhfb,
  articleno =    "58",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Werner:2016:SDA,
  author =       "Sebastian Werner and Javier Navaridas and Mikel
                 Luj{\'a}n",
  title =        "A Survey on Design Approaches to Circumvent Permanent
                 Faults in Networks-on-Chip",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "59:1--59:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2886781",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Increasing fault rates in current and future
                 technology nodes coupled with on-chip components in the
                 hundreds calls for robust and fault-tolerant
                 Network-on-Chip (NoC) designs. Given the central role
                 of NoCs in today's many-core chips, permanent faults
                 impeding their original functionality may significantly
                 influence performance, energy consumption, and correct
                 operation of the entire system. As a result,
                 fault-tolerant NoC design gained much attention in
                 recent years. In this article, we review the vast
                 research efforts regarding a NoC's components, namely,
                 topology, routing algorithm, router microarchitecture,
                 as well as system-level approaches combined with
                 reconfiguration; discuss the proposed architectures;
                 and identify outstanding research questions.",
  acknowledgement = ack-nhfb,
  articleno =    "59",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hu:2016:CLG,
  author =       "Liang Hu and Xilong Che and Si-Qing Zheng",
  title =        "A Closer Look at {GPGPU}",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "60:1--60:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2873053",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The lack of detailed white box illustration leaves a
                 gap in the field of GPGPU (General-Purpose Computing on
                 the Graphic Processing Unit), thus hindering users and
                 researchers from exploring hardware potential while
                 improving application performance. This article bridges
                 the gap by demystifying the micro-architecture and
                 operating mechanism of GPGPU. We propose a descriptive
                 model that addresses key issues of most concerns,
                 including task organization, hardware structure,
                 scheduling mechanism, execution mechanism, and memory
                 access. We also validate the effectiveness of our model
                 by interpreting the software/hardware cooperation of
                 CUDA.",
  acknowledgement = ack-nhfb,
  articleno =    "60",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Platania:2016:CSC,
  author =       "Marco Platania and Daniel Obenshain and Thomas
                 Tantillo and Yair Amir and Neeraj Suri",
  title =        "On Choosing Server- or Client-Side Solutions for
                 {BFT}",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "61:1--61:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2886780",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Byzantine Fault Tolerant (BFT) protocols have the
                 ability to work correctly even when up to a threshold f
                 of system servers are compromised. This makes them
                 appealing for the construction of critical systems
                 connected to the Internet, which are constantly a
                 target for cyber attacks. BFT protocols differ based on
                 the kind of application, deployment settings,
                 performance, access control mechanisms, number of
                 servers in the system, and protocol implementation. The
                 large number of protocols present in the literature and
                 their differences make it difficult for a system
                 builder to choose the solution that best satisfies the
                 requirements of the system that he wants to build. In
                 particular, the main difference among BFT protocols
                 lies in their system models: server-side versus
                 client-side. In the server-side model each client
                 relies on the system to consistently order and
                 replicate updates, while in the client-side model each
                 client actively participates in the protocol. In this
                 article, we classify BFT protocols as server-side or
                 client-side. We analyze the trade-offs between the two
                 models, describe systems that use these models and the
                 trade-offs they choose, highlight the research gaps,
                 and provide guidelines to system builders in order to
                 choose the solution that best satisfies their needs.",
  acknowledgement = ack-nhfb,
  articleno =    "61",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mittal:2016:STAb,
  author =       "Sparsh Mittal",
  title =        "A Survey of Techniques for Approximate Computing",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "62:1--62:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2893356",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Approximate computing trades off computation quality
                 with effort expended, and as rising performance demands
                 confront plateauing resource budgets, approximate
                 computing has become not merely attractive, but even
                 imperative. In this article, we present a survey of
                 techniques for approximate computing (AC). We discuss
                 strategies for finding approximable program portions
                 and monitoring output quality, techniques for using AC
                 in different processing units (e.g., CPU, GPU, and
                 FPGA), processor components, memory technologies, and
                 so forth, as well as programming frameworks for AC. We
                 classify these techniques based on several key
                 characteristics to emphasize their similarities and
                 differences. The aim of this article is to provide
                 insights to researchers into working of AC techniques
                 and inspire more efforts in this area to make AC the
                 mainstream computing approach in future systems.",
  acknowledgement = ack-nhfb,
  articleno =    "62",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{DeOliveiraSandes:2016:POP,
  author =       "Edans Flavius {De Oliveira Sandes} and Azzedine
                 Boukerche and Alba Cristina {Magalhaes Alves De Melo}",
  title =        "Parallel Optimal Pairwise Biological Sequence
                 Comparison: Algorithms, Platforms, and Classification",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "63:1--63:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2893488",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Many bioinformatics applications, such as the optimal
                 pairwise biological sequence comparison, demand a great
                 quantity of computing resource, thus are excellent
                 candidates to run in high-performance computing (HPC)
                 platforms. In the last two decades, a large number of
                 HPC-based solutions were proposed for this problem that
                 run in different platforms, targeting different types
                 of comparisons with slightly different algorithms and
                 making the comparative analysis of these approaches
                 very difficult. This article proposes a classification
                 of parallel optimal pairwise sequence comparison
                 solutions, in order to highlight their main
                 characteristics in a unified way. We then discuss
                 several HPC-based solutions, including clusters of
                 multicores and accelerators such as Cell Broadband
                 Engines (CellBEs), Field-Programmable Gate Arrays
                 (FPGAs), Graphics Processing Units (GPUs) and Intel
                 Xeon Phi, as well as hybrid solutions, which combine
                 two or more platforms, providing the actual landscape
                 of the main proposals in this area. Finally, we present
                 open questions and perspectives in this research
                 field.",
  acknowledgement = ack-nhfb,
  articleno =    "63",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Schmidt:2016:SAG,
  author =       "Desmond Schmidt and Kenneth Radke and Seyit Camtepe
                 and Ernest Foo and Michal Ren",
  title =        "A Survey and Analysis of the {GNSS} Spoofing Threat
                 and Countermeasures",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "64:1--64:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2897166",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Detection and prevention of global navigation
                 satellite system (GNSS) ``spoofing'' attacks, or the
                 broadcast of false global navigation satellite system
                 services, has recently attracted much research
                 interest. This survey aims to fill three gaps in the
                 literature: first, to assess in detail the exact nature
                 of threat scenarios posed by spoofing against the most
                 commonly cited targets; second, to investigate the many
                 practical impediments, often underplayed, to carrying
                 out GNSS spoofing attacks in the field; and third, to
                 survey and assess the effectiveness of a wide range of
                 proposed defences against GNSS spoofing. Our conclusion
                 lists promising areas of future research.",
  acknowledgement = ack-nhfb,
  articleno =    "64",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Caballero:2016:TIE,
  author =       "Juan Caballero and Zhiqiang Lin",
  title =        "Type Inference on Executables",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "4",
  pages =        "65:1--65:??",
  month =        may,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2896499",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon May 2 16:19:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In many applications, source code and debugging
                 symbols of a target program are not available, and the
                 only thing that we can access is the program
                 executable. A fundamental challenge with executables is
                 that, during compilation, critical information such as
                 variables and types is lost. Given that typed variables
                 provide fundamental semantics of a program, for the
                 last 16 years, a large amount of research has been
                 carried out on binary code type inference, a
                 challenging task that aims to infer typed variables
                 from executables (also referred to as binary code). In
                 this article, we systematize the area of binary code
                 type inference according to its most important
                 dimensions: the applications that motivate its
                 importance, the approaches used, the types that those
                 approaches infer, the implementation of those
                 approaches, and how the inference results are
                 evaluated. We also discuss limitations, underdeveloped
                 problems and open challenges, and propose further
                 applications.",
  acknowledgement = ack-nhfb,
  articleno =    "65",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shuja:2016:SMD,
  author =       "Junaid Shuja and Abdullah Gani and Kashif Bilal and
                 Atta Ur Rehman Khan and Sajjad A. Madani and Samee U.
                 Khan and Albert Y. Zomaya",
  title =        "A Survey of Mobile Device Virtualization: Taxonomy and
                 State of the Art",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "1:1--1:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2897164",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Recent growth in the processing and memory resources
                 of mobile devices has fueled research within the field
                 of mobile virtualization. Mobile virtualization enables
                 multiple persona on a single mobile device by hosting
                 heterogeneous operating systems (OSs) concurrently.
                 However, adding a virtualization layer to
                 resource-constrained mobile devices with real-time
                 requirements can lead to intolerable performance
                 overheads. Hardware virtualization extensions that
                 support efficient virtualization have been incorporated
                 in recent mobile processors. Prior to hardware
                 virtualization extensions, virtualization techniques
                 that are enabled by performance prohibitive and
                 resource consuming software were adopted for mobile
                 devices. Moreover, mobile virtualization solutions lack
                 standard procedures for device component sharing and
                 interfacing between multiple OSSs. The objective of
                 this article is to survey software- and hardware-based
                 mobile virtualization techniques in light of the recent
                 advancements fueled by the hardware support for mobile
                 virtualization. Challenges and issues faced in
                 virtualization of CPU, memory, I/O, interrupt, and
                 network interfaces are highlighted. Moreover, various
                 performance parameters are presented in a detailed
                 comparative analysis to quantify the efficiency of
                 mobile virtualization techniques and solutions.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Alam:2016:CMR,
  author =       "Muhammad Raisul Alam and Marc St-Hilaire and Thomas
                 Kunz",
  title =        "Computational Methods for Residential Energy Cost
                 Optimization in Smart Grids: a Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "2:1--2:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2897165",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A smart power grid transforms the traditional electric
                 grid into a user-centric, intelligent power network.
                 The cost-saving potential of smart homes is an
                 excellent motivating factor to involve users in smart
                 grid operations. To that end, this survey explores the
                 contemporary cost-saving strategies for smart grids
                 from the users' perspective. The study shows that
                 optimization methods are the most popular cost-saving
                 techniques reported in the literature. These methods
                 are used to plan scheduling and power utilization
                 schemes of household appliances, energy storages,
                 renewables, and other energy generation devices. The
                 survey shows that trading energy among neighborhoods is
                 one of the effective methods for cost optimization. It
                 also identifies the prediction methods that are used to
                 forecast energy price, generation, and consumption
                 profiles, which are required to optimize energy cost in
                 advance. The contributions of this article are
                 threefold. First, it discusses the computational
                 methods reported in the literature with their
                 significance and limitations. Second, it identifies the
                 components and their characteristics that may reduce
                 energy cost. Finally, it proposes a unified cost
                 optimization framework and addresses the challenges
                 that may influence the overall residential energy cost
                 optimization problem in smart grids.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Huttel:2016:FST,
  author =       "Hans H{\"u}ttel and Ivan Lanese and Vasco T.
                 Vasconcelos and Lu{\'\i}s Caires and Marco Carbone and
                 Pierre-Malo Deni{\'e}lou and Dimitris Mostrous and Luca
                 Padovani and Ant{\'o}nio Ravara and Emilio Tuosto and
                 Hugo Torres Vieira and Gianluigi Zavattaro",
  title =        "Foundations of Session Types and Behavioural
                 Contracts",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "3:1--3:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2873052",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Behavioural type systems, usually associated to
                 concurrent or distributed computations, encompass
                 concepts such as interfaces, communication protocols,
                 and contracts, in addition to the traditional
                 input/output operations. The behavioural type of a
                 software component specifies its expected patterns of
                 interaction using expressive type languages, so types
                 can be used to determine automatically whether the
                 component interacts correctly with other components.
                 Two related important notions of behavioural types are
                 those of session types and behavioural contracts. This
                 article surveys the main accomplishments of the last 20
                 years within these two approaches.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Schrittwieser:2016:PST,
  author =       "Sebastian Schrittwieser and Stefan Katzenbeisser and
                 Johannes Kinder and Georg Merzdovnik and Edgar Weippl",
  title =        "Protecting Software through Obfuscation: Can It Keep
                 Pace with Progress in Code Analysis?",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "4:1--4:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2886012",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Software obfuscation has always been a controversially
                 discussed research area. While theoretical results
                 indicate that provably secure obfuscation in general is
                 impossible, its widespread application in malware and
                 commercial software shows that it is nevertheless
                 popular in practice. Still, it remains largely
                 unexplored to what extent today's software obfuscations
                 keep up with state-of-the-art code analysis and where
                 we stand in the arms race between software developers
                 and code analysts. The main goal of this survey is to
                 analyze the effectiveness of different classes of
                 software obfuscation against the continuously improving
                 deobfuscation techniques and off-the-shelf code
                 analysis tools. The answer very much depends on the
                 goals of the analyst and the available resources. On
                 the one hand, many forms of lightweight static analysis
                 have difficulties with even basic obfuscation schemes,
                 which explains the unbroken popularity of obfuscation
                 among malware writers. On the other hand, more
                 expensive analysis techniques, in particular when used
                 interactively by a human analyst, can easily defeat
                 many obfuscations. As a result, software obfuscation
                 for the purpose of intellectual property protection
                 remains highly challenging.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ao:2016:PBD,
  author =       "Buke Ao and Yongcai Wang and Lu Yu and Richard R.
                 Brooks and S. S. Iyengar",
  title =        "On Precision Bound of Distributed Fault-Tolerant
                 Sensor Fusion Algorithms",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "5:1--5:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2898984",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Sensors have limited precision and accuracy. They
                 extract data from the physical environment, which
                 contains noise. The goal of sensor fusion is to make
                 the final decision robust, minimizing the influence of
                 noise and system errors. One problem that has not been
                 adequately addressed is establishing the bounds of
                 fusion result precision. Precision is the maximum range
                 of disagreement that can be introduced by one or more
                 faulty inputs. This definition of precision is
                 consistent both with Lamport's Byzantine Generals
                 problem and the mini-max criteria commonly found in
                 game theory. This article considers the precision
                 bounds of several fault-tolerant information fusion
                 approaches, including Byzantine agreement, Marzullo's
                 interval-based approach, and the Brooks-Iyengar fusion
                 algorithm. We derive precision bounds for these fusion
                 algorithms. The analysis provides insight into the
                 limits imposed by fault tolerance and guidance for
                 applying fusion approaches to applications.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Liu:2016:RAC,
  author =       "Junbin Liu and Sridha Sridharan and Clinton Fookes",
  title =        "Recent Advances in Camera Planning for Large Area
                 Surveillance: a Comprehensive Review",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "6:1--6:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2906148",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "With recent advances in consumer electronics and the
                 increasingly urgent need for public security, camera
                 networks have evolved from their early role of
                 providing simple and static monitoring to current
                 complex systems capable of obtaining extensive video
                 information for intelligent processing, such as target
                 localization, identification, and tracking. In all
                 cases, it is of vital importance that the optimal
                 camera configuration (i.e., optimal location,
                 orientation, etc.) is determined before cameras are
                 deployed as a suboptimal placement solution will
                 adversely affect intelligent video surveillance and
                 video analytic algorithms. The optimal configuration
                 may also provide substantial savings on the total
                 number of cameras required to achieve the same level of
                 utility. In this article, we examine most, if not all,
                 of the recent approaches (post 2000) addressing camera
                 placement in a structured manner. We believe that our
                 work can serve as a first point of entry for readers
                 wishing to start researching into this area or
                 engineers who need to design a camera system in
                 practice. To this end, we attempt to provide a complete
                 study of relevant formulation strategies and brief
                 introductions to most commonly used optimization
                 techniques by researchers in this field. We hope our
                 work to be inspirational to spark new ideas in the
                 field.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Khan:2016:CLF,
  author =       "Suleman Khan and Abdullah Gani and Ainuddin Wahid
                 Abdul Wahab and Mustapha Aminu Bagiwa and Muhammad
                 Shiraz and Samee U. Khan and Rajkumar Buyya and Albert
                 Y. Zomaya",
  title =        "Cloud Log Forensics: Foundations, State of the Art,
                 and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "7:1--7:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2906149",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Cloud log forensics (CLF) mitigates the investigation
                 process by identifying the malicious behavior of
                 attackers through profound cloud log analysis. However,
                 the accessibility attributes of cloud logs obstruct
                 accomplishment of the goal to investigate cloud logs
                 for various susceptibilities. Accessibility involves
                 the issues of cloud log access, selection of proper
                 cloud log file, cloud log data integrity, and
                 trustworthiness of cloud logs. Therefore, forensic
                 investigators of cloud log files are dependent on cloud
                 service providers (CSPs) to get access of different
                 cloud logs. Accessing cloud logs from outside the cloud
                 without depending on the CSP is a challenging research
                 area, whereas the increase in cloud attacks has
                 increased the need for CLF to investigate the malicious
                 activities of attackers. This paper reviews the state
                 of the art of CLF and highlights different challenges
                 and issues involved in investigating cloud log data.
                 The logging mode, the importance of CLF, and cloud
                 log-as-a-service are introduced. Moreover, case studies
                 related to CLF are explained to highlight the practical
                 implementation of cloud log investigation for analyzing
                 malicious behaviors. The CLF security requirements,
                 vulnerability points, and challenges are identified to
                 tolerate different cloud log susceptibilities. We
                 identify and introduce challenges and future directions
                 to highlight open research areas of CLF for motivating
                 investigators, academicians, and researchers to
                 investigate them.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gbenga:2016:ULP,
  author =       "Dada Emmanuel Gbenga and Effirul Ikhwan Ramlan",
  title =        "Understanding the Limitations of Particle Swarm
                 Algorithm for Dynamic Optimization Tasks: a Survey
                 Towards the Singularity of {PSO} for Swarm Robotic
                 Applications",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "8:1--8:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2906150",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "One of the most widely used biomimicry algorithms is
                 the Particle Swarm Optimization (PSO). Since its
                 introduction in 1995, it has caught the attention of
                 both researchers and academicians as a way of solving
                 various optimization problems, such as in the fields of
                 engineering and medicine, to computer image processing
                 and mission critical operations. PSO has been widely
                 applied in the field of swarm robotics, however, the
                 trend of creating a new variant PSO for each swarm
                 robotic project is alarming. We investigate the basic
                 properties of PSO algorithms relevant to the
                 implementation of swarm robotics and characterize the
                 limitations that promote this trend to manifest.
                 Experiments were conducted to investigate the
                 convergence properties of three PSO variants (original
                 PSO, SPSO and APSO) and the global optimum and local
                 optimal of these PSO algorithms were determined. We
                 were able to validate the existence of premature
                 convergence in these PSO variants by comparing 16
                 functions implemented alongside the PSO variant. This
                 highlighted the fundamental flaws in most variant PSOs,
                 and signifies the importance of developing a more
                 generalized PSO algorithm to support the implementation
                 of swarm robotics. This is critical in curbing the
                 influx of custom PSO and theoretically addresses the
                 fundamental flaws of the existing PSO algorithm.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zuo:2016:SSA,
  author =       "Xiang Zuo and Adriana Iamnitchi",
  title =        "A Survey of Socially Aware Peer-to-Peer Systems",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "9:1--9:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2894761",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Peer-to-peer technologies have proven their strength
                 in large-scale resource sharing and data transfer. Such
                 systems, however, still need to address a variety of
                 issues, including efficient routing, security, quality
                 of service, incentives, and reputation. Recent research
                 started leveraging social information to develop new
                 and effective techniques to improve the performance of
                 peer-to-peer systems. However, using social information
                 is a double-edged sword, which can bring benefits as
                 well as new challenges. This survey presents and
                 classifies the types of social information that have
                 been used so far in the design of peer-to-peer systems,
                 how the social fabric has been used to facilitate
                 transactions in the system, and some challenges caused
                 by using social information.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jiang:2016:UGB,
  author =       "Wenjun Jiang and Guojun Wang and Md Zakirul Alam
                 Bhuiyan and Jie Wu",
  title =        "Understanding Graph-Based Trust Evaluation in Online
                 Social Networks: Methodologies and Challenges",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "10:1--10:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2906151",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Online Social Networks (OSNs) are becoming a popular
                 method of meeting people and keeping in touch with
                 friends. OSNs resort to trust evaluation models and
                 algorithms to improve service quality and enhance user
                 experiences. Much research has been done to evaluate
                 trust and predict the trustworthiness of a target,
                 usually from the view of a source. Graph-based
                 approaches make up a major portion of the existing
                 works, in which the trust value is calculated through a
                 trusted graph (or trusted network, web of trust, or
                 multiple trust chains). In this article, we focus on
                 graph-based trust evaluation models in OSNs,
                 particularly in the computer science literature. We
                 first summarize the features of OSNs and the properties
                 of trust. Then we comparatively review two categories
                 of graph-simplification-based and graph-analogy-based
                 approaches and discuss their individual problems and
                 challenges. We also analyze the common challenges of
                 all graph-based models. To provide an integrated view
                 of trust evaluation, we conduct a brief review of its
                 pre- and postprocesses (i.e., the preparation and
                 validation of trust models, including information
                 collection, performance evaluation, and related
                 applications). Finally, we identify some open
                 challenges that all trust models are facing.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Silva:2016:VNN,
  author =       "Fabr{\'\i}cio A. Silva and Azzedine Boukerche and
                 Thais R. M. Braga Silva and Linnyer B. Ruiz and Eduardo
                 Cerqueira and Antonio A. F. Loureiro",
  title =        "Vehicular Networks: a New Challenge for
                 Content-Delivery-Based Applications",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "11:1--11:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2903745",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A significant number of promising applications for
                 vehicular ad hoc networks (VANETs) are becoming a
                 reality. Most of these applications require a variety
                 of heterogeneous content to be delivered to vehicles
                 and to their on-board users. However, the task of
                 content delivery in such dynamic and large-scale
                 networks is easier said than done. In this article, we
                 propose a classification of content delivery solutions
                 applied to VANETs while highlighting their new
                 characteristics and describing their underlying
                 architectural design. First, the two fundamental
                 building blocks that are part of an entire content
                 delivery system are identified: replica allocation and
                 content delivery. The related solutions are then
                 classified according to their architectural definition.
                 Within each category, solutions are described based on
                 the techniques and strategies that have been adopted.
                 As result, we present an in-depth discussion on the
                 architecture, techniques, and strategies adopted by
                 studies in the literature that tackle problems related
                 to vehicular content delivery networks.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fang:2016:CHI,
  author =       "Ruogu Fang and Samira Pouyanfar and Yimin Yang and
                 Shu-Ching Chen and S. S. Iyengar",
  title =        "Computational Health Informatics in the Big Data Age:
                 a Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "12:1--12:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2932707",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The explosive growth and widespread accessibility of
                 digital health data have led to a surge of research
                 activity in the healthcare and data sciences fields.
                 The conventional approaches for health data management
                 have achieved limited success as they are incapable of
                 handling the huge amount of complex data with high
                 volume, high velocity, and high variety. This article
                 presents a comprehensive overview of the existing
                 challenges, techniques, and future directions for
                 computational health informatics in the big data age,
                 with a structured analysis of the historical and
                 state-of-the-art methods. We have summarized the
                 challenges into four Vs (i.e., volume, velocity,
                 variety, and veracity) and proposed a systematic
                 data-processing pipeline for generic big data in health
                 informatics, covering data capturing, storing, sharing,
                 analyzing, searching, and decision support.
                 Specifically, numerous techniques and algorithms in
                 machine learning are categorized and compared. On the
                 basis of this material, we identify and discuss the
                 essential prospects lying ahead for computational
                 health informatics in this big data age.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tang:2016:ESP,
  author =       "Jun Tang and Yong Cui and Qi Li and Kui Ren and
                 Jiangchuan Liu and Rajkumar Buyya",
  title =        "Ensuring Security and Privacy Preservation for Cloud
                 Data Services",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "13:1--13:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2906153",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "With the rapid development of cloud computing, more
                 and more enterprises/individuals are starting to
                 outsource local data to the cloud servers. However,
                 under open networks and not fully trusted cloud
                 environments, they face enormous security and privacy
                 risks (e.g., data leakage or disclosure, data
                 corruption or loss, and user privacy breach) when
                 outsourcing their data to a public cloud or using their
                 outsourced data. Recently, several studies were
                 conducted to address these risks, and a series of
                 solutions were proposed to enable data and privacy
                 protection in untrusted cloud environments. To fully
                 understand the advances and discover the research
                 trends of this area, this survey summarizes and
                 analyzes the state-of-the-art protection technologies.
                 We first present security threats and requirements of
                 an outsourcing data service to a cloud, and follow that
                 with a high-level overview of the corresponding
                 security technologies. We then dwell on existing
                 protection solutions to achieve secure, dependable, and
                 privacy-assured cloud data services including data
                 search, data computation, data sharing, data storage,
                 and data access. Finally, we propose open challenges
                 and potential research directions in each category of
                 solutions.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Li:2016:SSG,
  author =       "Xirong Li and Tiberio Uricchio and Lamberto Ballan and
                 Marco Bertini and Cees G. M. Snoek and Alberto Del
                 Bimbo",
  title =        "Socializing the Semantic Gap: a Comparative Survey on
                 Image Tag Assignment, Refinement, and Retrieval",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "14:1--14:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2906152",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Where previous reviews on content-based image
                 retrieval emphasize what can be seen in an image to
                 bridge the semantic gap, this survey considers what
                 people tag about an image. A comprehensive treatise of
                 three closely linked problems (i.e., image tag
                 assignment, refinement, and tag-based image retrieval)
                 is presented. While existing works vary in terms of
                 their targeted tasks and methodology, they rely on the
                 key functionality of tag relevance, that is, estimating
                 the relevance of a specific tag with respect to the
                 visual content of a given image and its social context.
                 By analyzing what information a specific method
                 exploits to construct its tag relevance function and
                 how such information is exploited, this article
                 introduces a two-dimensional taxonomy to structure the
                 growing literature, understand the ingredients of the
                 main works, clarify their connections and difference,
                 and recognize their merits and limitations. For a
                 head-to-head comparison with the state of the art, a
                 new experimental protocol is presented, with training
                 sets containing 10,000, 100,000, and 1 million images,
                 and an evaluation on three test sets, contributed by
                 various research groups. Eleven representative works
                 are implemented and evaluated. Putting all this
                 together, the survey aims to provide an overview of the
                 past and foster progress for the near future.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Silva:2016:SCS,
  author =       "Nadia Felix F. Da Silva and Luiz F. S. Coletta and
                 Eduardo R. Hruschka",
  title =        "A Survey and Comparative Study of Tweet Sentiment
                 Analysis via Semi-Supervised Learning",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "15:1--15:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2932708",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Twitter is a microblogging platform in which users can
                 post status messages, called ``tweets,'' to their
                 friends. It has provided an enormous dataset of the
                 so-called sentiments, whose classification can take
                 place through supervised learning. To build supervised
                 learning models, classification algorithms require a
                 set of representative labeled data. However, labeled
                 data are usually difficult and expensive to obtain,
                 which motivates the interest in semi-supervised
                 learning. This type of learning uses unlabeled data to
                 complement the information provided by the labeled data
                 in the training process; therefore, it is particularly
                 useful in applications including tweet sentiment
                 analysis, where a huge quantity of unlabeled data is
                 accessible. Semi-supervised learning for tweet
                 sentiment analysis, although appealing, is relatively
                 new. We provide a comprehensive survey of
                 semi-supervised approaches applied to tweet
                 classification. Such approaches consist of graph-based,
                 wrapper-based, and topic-based methods. A comparative
                 study of algorithms based on self-training,
                 co-training, topic modeling, and distant supervision
                 highlights their biases and sheds light on aspects that
                 the practitioner should consider in real-world
                 applications.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Samant:2016:HBS,
  author =       "Durgesh Samant and Umesh Bellur",
  title =        "Handling Boot Storms in Virtualized Data Centers --- A
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "16:1--16:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2932709",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Large-scale virtual machine (VM) deployment in
                 virtualized data centers is a very slow process. This
                 is primarily due to the resource bottlenecks that are
                 created at the storage, network, and host physical
                 machines when a large number of VMs are requested
                 simultaneously. For companies that provide virtual
                 desktops to their employees, it is common to encounter
                 such requests each day, when their employees turn up
                 for work. In addition, a large number of VMs are often
                 required to be deployed instantly, in order to absorb a
                 spike in the workload, at online e-commerce websites.
                 In such scenarios, long deployment times are
                 unacceptable, and reducing them is of paramount
                 importance. In this article, we first abstract out the
                 key techniques suggested in the literature to speed up
                 this deployment process. We follow this with a
                 classification of these techniques into a taxonomy and
                 propose a framework that can be used to compare them.
                 Finally, we identify problem areas that warrant further
                 research and bring out the shortcomings of the current
                 state-of-the-art solutions.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hassani:2016:VNL,
  author =       "Kaveh Hassani and Won-Sook Lee",
  title =        "Visualizing Natural Language Descriptions: a Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "17:1--17:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2932710",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A natural language interface exploits the conceptual
                 simplicity and naturalness of the language to create a
                 high-level user-friendly communication channel between
                 humans and machines. One of the promising applications
                 of such interfaces is generating visual interpretations
                 of semantic content of a given natural language that
                 can be then visualized either as a static scene or a
                 dynamic animation. This survey discusses requirements
                 and challenges of developing such systems and reports
                 26 graphical systems that exploit natural language
                 interfaces and addresses both artificial intelligence
                 and visualization aspects. This work serves as a frame
                 of reference to researchers and to enable further
                 advances in the field.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dan:2016:MPS,
  author =       "Ovidiu Dan and Brian D. Davison",
  title =        "Measuring and Predicting Search Engine Users'
                 Satisfaction",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "18:1--18:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2893486",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Search satisfaction is defined as the fulfillment of a
                 user's information need. Characterizing and predicting
                 the satisfaction of search engine users is vital for
                 improving ranking models, increasing user retention
                 rates, and growing market share. This article provides
                 an overview of the research areas related to user
                 satisfaction. First, we show that whenever users choose
                 to defect from one search engine to another they do so
                 mostly due to dissatisfaction with the search results.
                 We also describe several search engine switching
                 prediction methods, which could help search engines
                 retain more users. Second, we discuss research on the
                 difference between good and bad abandonment, which
                 shows that in approximately 30\% of all abandoned
                 searches the users are in fact satisfied with the
                 results. Third, we catalog techniques to determine
                 queries and groups of queries that are underperforming
                 in terms of user satisfaction. This can help improve
                 search engines by developing specialized rankers for
                 these query patterns. Fourth, we detail how task
                 difficulty affects user behavior and how task
                 difficulty can be predicted. Fifth, we characterize
                 satisfaction and we compare major satisfaction
                 prediction algorithms.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Viotti:2016:CNT,
  author =       "Paolo Viotti and Marko Vukoli{\'c}",
  title =        "Consistency in Non-Transactional Distributed Storage
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "19:1--19:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2926965",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Over the years, different meanings have been
                 associated with the word consistency in the distributed
                 systems community. While in the '80s ``consistency''
                 typically meant strong consistency, later defined also
                 as linearizability, in recent years, with the advent of
                 highly available and scalable systems, the notion of
                 ``consistency'' has been at the same time both weakened
                 and blurred. In this article, we aim to fill the void
                 in the literature by providing a structured and
                 comprehensive overview of different consistency notions
                 that appeared in distributed systems, and in particular
                 storage systems research, in the last four decades. We
                 overview more than 50 different consistency notions,
                 ranging from linearizability to eventual and weak
                 consistency, defining precisely many of these, in
                 particular where the previous definitions were
                 ambiguous. We further provide a partial order among
                 different consistency predicates, ordering them by
                 their semantic ``strength,'' which we believe will be
                 useful in future research. Finally, we map the
                 consistency semantics to different practical systems
                 and research prototypes. The scope of this article is
                 restricted to non-transactional semantics, that is,
                 those that apply to single storage object operations.
                 As such, our article complements the existing surveys
                 done in the context of transactional, database
                 consistency semantics.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Liang:2016:DIM,
  author =       "Junbin Liang and Jiannong Cao and Rui Liu and Tao Li",
  title =        "Distributed Intelligent {MEMS}: a Survey and a
                 Real-Time Programming Framework",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "20:1--20:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2926964",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In recent years, distributed intelligent
                 microelectromechanical systems (DiMEMSs) have appeared
                 as a new form of distributed embedded systems. DiMEMSs
                 contain thousands or millions of removable autonomous
                 devices, which will collaborate with each other to
                 achieve the final target of the whole system.
                 Programming such systems is becoming an extremely
                 difficult problem. The difficulty is due not only to
                 their inherent nature of distributed collaboration,
                 mobility, large scale, and limited resources of their
                 devices (e.g., in terms of energy, memory,
                 communication, and computation) but also to the
                 requirements of real-time control and tolerance for
                 uncertainties such as inaccurate actuation and
                 unreliable communications. As a result, existing
                 programming languages for traditional distributed and
                 embedded systems are not suitable for DiMEMSs. In this
                 article, we first introduce the origin and
                 characteristics of DiMEMSs and then survey typical
                 implementations of DiMEMSs and related research
                 hotspots. Finally, we propose a real-time programming
                 framework that can be used to design new real-time
                 programming languages for DiMEMSs. The framework is
                 composed of three layers: a real-time programming model
                 layer, a compilation layer, and a runtime system layer.
                 The design challenges and requirements of these layers
                 are investigated. The framework is then discussed in
                 further detail and suggestions for future research are
                 given.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Khwaja:2016:SSD,
  author =       "Salman Khwaja and Mohammad Alshayeb",
  title =        "Survey On Software Design-Pattern Specification
                 Languages",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "1",
  pages =        "21:1--21:??",
  month =        jul,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2926966",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:55 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A design pattern is a well-defined solution to a
                 recurrent problem. Over the years, the number of
                 patterns and domains of design patterns have expanded,
                 as the patterns are the experiences of the experts of
                 the domain captured in a higher-level abstraction. This
                 led others to work on languages for design patterns to
                 systematically document abstraction detailed in the
                 design pattern rather than capture algorithms and data.
                 These design-pattern specification languages come in
                 different flavors, targeting different aspects of
                 design patterns. Some design-pattern specification
                 languages tried to capture the description of the
                 design pattern in graphical or textual format, others
                 tried to discover design patterns in code or design
                 diagrams, and still other design-pattern specification
                 languages have other objectives. However, so far, no
                 effort has been made to compare these design-pattern
                 specification languages and identify their strengths
                 and weaknesses. This article provides a survey and a
                 comparison between existing design-pattern
                 specification languages using a design-pattern
                 specification language evaluation framework. Analysis
                 is done by grouping the design-pattern specification
                 languages into different categories. In addition, a
                 brief description is provided regarding the tools
                 available for the design-pattern specification
                 languages. Finally, we identify some open research
                 issues that still need to be resolved.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Estebanez:2016:STL,
  author =       "Alvaro Estebanez and Diego R. Llanos and Arturo
                 Gonzalez-Escribano",
  title =        "A Survey on Thread-Level Speculation Techniques",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "22:1--22:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2938369",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Thread-Level Speculation (TLS) is a promising
                 technique that allows the parallel execution of
                 sequential code without relying on a prior,
                 compile-time-dependence analysis. In this work, we
                 introduce the technique, present a taxonomy of TLS
                 solutions, and summarize and put into perspective the
                 most relevant advances in this field.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Carrara:2016:BCC,
  author =       "Brent Carrara and Carlisle Adams",
  title =        "Out-of-Band Covert Channels --- A Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "23:1--23:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2938370",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A novel class of covert channel, out-of-band covert
                 channels, is presented by extending Simmons' prisoners'
                 problem. This new class of covert channel is
                 established by surveying the existing covert channel,
                 device-pairing, and side-channel research. Terminology
                 as well as a taxonomy for out-of-band covert channels
                 is also given. Additionally, a more comprehensive
                 adversarial model based on a knowledgeable passive
                 adversary and a capable active adversary is proposed in
                 place of the current adversarial model, which relies on
                 an oblivious passive adversary. Last, general
                 protection mechanisms are presented, and an argument
                 for a general measure of ``covertness'' to effectively
                 compare covert channels is given.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Labati:2016:BRA,
  author =       "Ruggero Donida Labati and Angelo Genovese and Enrique
                 Mu{\~n}oz and Vincenzo Piuri and Fabio Scotti and
                 Gianluca Sforza",
  title =        "Biometric Recognition in Automated Border Control: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "24:1--24:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2933241",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The increasing demand for traveler clearance at
                 international border crossing points (BCPs) has
                 motivated research for finding more efficient
                 solutions. Automated border control (ABC) is emerging
                 as a solution to enhance the convenience of travelers,
                 the throughput of BCPs, and national security. This is
                 the first comprehensive survey on the biometric
                 techniques and systems that enable automatic identity
                 verification in ABC. We survey the biometric literature
                 relevant to identity verification and summarize the
                 best practices and biometric techniques applicable to
                 ABC, relying on real experience collected in the field.
                 Furthermore, we select some of the major biometric
                 issues raised and highlight the open research areas.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Xiao:2016:SWI,
  author =       "Jiang Xiao and Zimu Zhou and Youwen Yi and Lionel M.
                 Ni",
  title =        "A Survey on Wireless Indoor Localization from the
                 Device Perspective",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "25:1--25:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2933232",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "With the marvelous development of wireless techniques
                 and ubiquitous deployment of wireless systems indoors,
                 myriad indoor location-based services (ILBSs) have
                 permeated into numerous aspects of modern life. The
                 most fundamental functionality is to pinpoint the
                 location of the target via wireless devices. According
                 to how wireless devices interact with the target,
                 wireless indoor localization schemes roughly fall into
                 two categories: device based and device free. In
                 device-based localization, a wireless device (e.g., a
                 smartphone) is attached to the target and computes its
                 location through cooperation with other deployed
                 wireless devices. In device-free localization, the
                 target carries no wireless devices, while the wireless
                 infrastructure deployed in the environment determines
                 the target's location by analyzing its impact on
                 wireless signals. This article is intended to offer a
                 comprehensive state-of-the-art survey on wireless
                 indoor localization from the device perspective. In
                 this survey, we review the recent advances in both
                 modes by elaborating on the underlying wireless
                 modalities, basic localization principles, and data
                 fusion techniques, with special emphasis on emerging
                 trends in (1) leveraging smartphones to integrate
                 wireless and sensor capabilities and extend to the
                 social context for device-based localization, and (2)
                 extracting specific wireless features to trigger novel
                 human-centric device-free localization. We
                 comprehensively compare each scheme in terms of
                 accuracy, cost, scalability, and energy efficiency.
                 Furthermore, we take a first look at intrinsic
                 technical challenges in both categories and identify
                 several open research issues associated with these new
                 challenges.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kokkinos:2016:SLM,
  author =       "Panagiotis Kokkinos and Dimitris Kalogeras and Anna
                 Levin and Emmanouel Varvarigos",
  title =        "Survey: Live Migration and Disaster Recovery over
                 Long-Distance Networks",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "26:1--26:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2940295",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We study the virtual machine live migration (LM) and
                 disaster recovery (DR) from a networking perspective,
                 considering long-distance networks, for example,
                 between data centers. These networks are usually
                 constrained by limited available bandwidth, increased
                 latency and congestion, or high cost of use when
                 dedicated network resources are used, while their exact
                 characteristics cannot be controlled. LM and DR present
                 several challenges due to the large amounts of data
                 that need to be transferred over long-distance
                 networks, which increase with the number of migrated or
                 protected resources. In this context, our work presents
                 the way LM and DR are currently being performed and
                 their operation in long-distance networking
                 environments, discussing related issues and bottlenecks
                 and surveying other works. We also present the way
                 networks are evolving today and the new technologies
                 and protocols (e.g., software-defined networking, or
                 SDN, and flexible optical networks) that can be used to
                 boost the efficiency of LM and DR over long distances.
                 Traffic redirection in a long-distance environment is
                 also an important part of the whole equation, since it
                 directly affects the transparency of LM and DR. Related
                 works and solutions both from academia and the industry
                 are presented.",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Onica:2016:CPP,
  author =       "Emanuel Onica and Pascal Felber and Hugues Mercier and
                 Etienne Rivi{\`e}re",
  title =        "Confidentiality-Preserving Publish\slash Subscribe: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "27:1--27:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2940296",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Publish/subscribe (pub/sub) is an attractive
                 communication paradigm for large-scale distributed
                 applications running across multiple administrative
                 domains. Pub/sub allows event-based information
                 dissemination based on constraints on the nature of the
                 data rather than on pre-established communication
                 channels. It is a natural fit for deployment in
                 untrusted environments such as public clouds linking
                 applications across multiple sites. However, pub/sub in
                 untrusted environments leads to major confidentiality
                 concerns stemming from the content-centric nature of
                 the communications. This survey classifies and analyzes
                 different approaches to confidentiality preservation
                 for pub/sub, from applications of trust and access
                 control models to novel encryption techniques. It
                 provides an overview of the current challenges posed by
                 confidentiality concerns and points to future research
                 directions in this promising field.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Giachanou:2016:LIS,
  author =       "Anastasia Giachanou and Fabio Crestani",
  title =        "Like It or Not: a Survey of {Twitter} Sentiment
                 Analysis Methods",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "28:1--28:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2938640",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Sentiment analysis in Twitter is a field that has
                 recently attracted research interest. Twitter is one of
                 the most popular microblog platforms on which users can
                 publish their thoughts and opinions. Sentiment analysis
                 in Twitter tackles the problem of analyzing the tweets
                 in terms of the opinion they express. This survey
                 provides an overview of the topic by investigating and
                 briefly describing the algorithms that have been
                 proposed for sentiment analysis in Twitter. The
                 presented studies are categorized according to the
                 approach they follow. In addition, we discuss fields
                 related to sentiment analysis in Twitter including
                 Twitter opinion retrieval, tracking sentiments over
                 time, irony detection, emotion detection, and tweet
                 sentiment quantification, tasks that have recently
                 attracted increasing attention. Resources that have
                 been used in the Twitter sentiment analysis literature
                 are also briefly presented. The main contributions of
                 this survey include the presentation of the proposed
                 approaches for sentiment analysis in Twitter, their
                 categorization according to the technique they use, and
                 the discussion of recent research trends of the topic
                 and its related fields.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kanvar:2016:HAS,
  author =       "Vini Kanvar and Uday P. Khedker",
  title =        "Heap Abstractions for Static Analysis",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "29:1--29:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2931098",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Heap data is potentially unbounded and seemingly
                 arbitrary. Hence, unlike stack and static data, heap
                 data cannot be abstracted in terms of a fixed set of
                 program variables. This makes it an interesting topic
                 of study and there is an abundance of literature
                 employing heap abstractions. Although most studies have
                 addressed similar concerns, insights gained in one
                 description of heap abstraction may not directly carry
                 over to some other description. In our search of a
                 unified theme, we view heap abstraction as consisting
                 of two steps: (a) heap modelling, which is the process
                 of representing a heap memory (i.e., an unbounded set
                 of concrete locations) as a heap model (i.e., an
                 unbounded set of abstract locations), and (b)
                 summarization, which is the process of bounding the
                 heap model by merging multiple abstract locations into
                 summary locations. We classify the heap models as
                 storeless, store based, and hybrid. We describe various
                 summarization techniques based on $k$-limiting,
                 allocation sites, patterns, variables, other generic
                 instrumentation predicates, and higher-order logics.
                 This approach allows us to compare the insights of a
                 large number of seemingly dissimilar heap abstractions
                 and also paves the way for creating new abstractions by
                 mix and match of models and summarization techniques.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Souza:2016:TTS,
  author =       "{\'E}fren L. Souza and Eduardo F. Nakamura and Richard
                 W. Pazzi",
  title =        "Target Tracking for Sensor Networks: a Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "30:1--30:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2938639",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Target-tracking algorithms typically organize the
                 network into a logical structure (e.g., tree, cluster,
                 or faces) to enable data fusion and reduce
                 communication costs. These algorithms often predict the
                 target's future position. In addition to using position
                 forecasts for decision making, we can also use such
                 information to save energy by activating only the set
                 of sensors nearby the target's trajectory. In this
                 work, we survey of the state of the art of
                 target-tracking techniques in sensor networks. We
                 identify three different formulations for the
                 target-tracking problem and classify the
                 target-tracking algorithms based on common
                 characteristics. Furthermore, for the sake of a better
                 understanding of the target-tracking process, we
                 organize this process in six components: target
                 detection, node cooperation, position computation,
                 future-position estimation, energy management, and
                 target recovery. Each component has different solutions
                 that affect the target-tracking performance.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Branco:2016:SPM,
  author =       "Paula Branco and Lu{\'\i}s Torgo and Rita P. Ribeiro",
  title =        "A Survey of Predictive Modeling on Imbalanced
                 Domains",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "31:1--31:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2907070",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Many real-world data-mining applications involve
                 obtaining predictive models using datasets with
                 strongly imbalanced distributions of the target
                 variable. Frequently, the least-common values of this
                 target variable are associated with events that are
                 highly relevant for end users (e.g., fraud detection,
                 unusual returns on stock markets, anticipation of
                 catastrophes, etc.). Moreover, the events may have
                 different costs and benefits, which, when associated
                 with the rarity of some of them on the available
                 training data, creates serious problems to predictive
                 modeling techniques. This article presents a survey of
                 existing techniques for handling these important
                 applications of predictive analytics. Although most of
                 the existing work addresses classification tasks
                 (nominal target variables), we also describe methods
                 designed to handle similar problems within regression
                 tasks (numeric target variables). In this survey, we
                 discuss the main challenges raised by imbalanced
                 domains, propose a definition of the problem, describe
                 the main approaches to these tasks, propose a taxonomy
                 of the methods, summarize the conclusions of existing
                 comparative studies as well as some theoretical
                 analyses of some methods, and refer to some related
                 problems within predictive modeling.",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Alsabah:2016:PSI,
  author =       "Mashael Alsabah and Ian Goldberg",
  title =        "Performance and Security Improvements for {Tor}: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "32:1--32:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2946802",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Tor [Dingledine et al. 2004] is the most widely used
                 anonymity network today, serving millions of users on a
                 daily basis using a growing number of volunteer-run
                 routers. Since its deployment in 2003, there have been
                 more than three dozen proposals that aim to improve its
                 performance, security, and unobservability. Given the
                 significance of this research area, our goal is to
                 provide the reader with the state of current research
                 directions and challenges in anonymous communication
                 systems, focusing on the Tor network. We shed light on
                 the design weaknesses and challenges facing the network
                 and point out unresolved issues.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Khalifa:2016:SPB,
  author =       "Shadi Khalifa and Yehia Elshater and Kiran
                 Sundaravarathan and Aparna Bhat and Patrick Martin and
                 Fahim Imam and Dan Rope and Mike Mcroberts and Craig
                 Statchuk",
  title =        "The Six Pillars for Building Big Data Analytics
                 Ecosystems",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "33:1--33:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2963143",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "With almost everything now online, organizations look
                 at the Big Data collected to gain insights for
                 improving their services. In the analytics process,
                 derivation of such insights requires experimenting-with
                 and integrating different analytics techniques, while
                 handling the Big Data high arrival velocity and large
                 volumes. Existing solutions cover bits-and-pieces of
                 the analytics process, leaving it to organizations to
                 assemble their own ecosystem or buy an off-the-shelf
                 ecosystem that can have unnecessary components to them.
                 We build on this point by dividing the Big Data
                 Analytics problem into six main pillars. We
                 characterize and show examples of solutions designed
                 for each of these pillars. We then integrate these six
                 pillars into a taxonomy to provide an overview of the
                 possible state-of-the-art analytics ecosystems. In the
                 process, we highlight a number of ecosystems to meet
                 organizations different needs. Finally, we identify
                 possible areas of research for building future Big Data
                 Analytics Ecosystems.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mittal:2016:SRP,
  author =       "Sparsh Mittal",
  title =        "A Survey of Recent Prefetching Techniques for
                 Processor Caches",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "35:1--35:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2907071",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "As the trends of process scaling make memory systems
                 an even more crucial bottleneck, the importance of
                 latency hiding techniques such as prefetching grows
                 further. However, naively using prefetching can harm
                 performance and energy efficiency and, hence, several
                 factors and parameters need to be taken into account to
                 fully realize its potential. In this article, we survey
                 several recent techniques that aim to improve the
                 implementation and effectiveness of prefetching. We
                 characterize the techniques on several parameters to
                 highlight their similarities and differences. The aim
                 of this survey is to provide insights to researchers
                 into working of prefetching techniques and spark
                 interesting future work for improving the performance
                 advantages of prefetching even further.",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kofler:2016:UIM,
  author =       "Christoph Kofler and Martha Larson and Alan Hanjalic",
  title =        "User Intent in Multimedia Search: a Survey of the
                 State of the Art and Future Challenges",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "36:1--36:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2954930",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Today's multimedia search engines are expected to
                 respond to queries reflecting a wide variety of
                 information needs from users with different goals. The
                 topical dimension (``what'' the user is searching for)
                 of these information needs is well studied; however,
                 the intent dimension (``why'' the user is searching)
                 has received relatively less attention. Specifically,
                 intent is the ``immediate reason, purpose, or goal''
                 that motivates a user to query a search engine. We
                 present a thorough survey of multimedia information
                 retrieval research directed at the problem of enabling
                 search engines to respond to user intent. The survey
                 begins by defining intent, including a differentiation
                 from related, often-confused concepts. It then presents
                 the key conceptual models of search intent. The core is
                 an overview of intent-aware approaches that operate at
                 each stage of the multimedia search engine pipeline
                 (i.e., indexing, query processing, ranking). We discuss
                 intent in conventional text-based search wherever it
                 provides insight into multimedia search intent or
                 intent-aware approaches. Finally, we identify and
                 discuss the most important future challenges for
                 intent-aware multimedia search engines. Facing these
                 challenges will allow multimedia information retrieval
                 to recognize and respond to user intent and, as a
                 result, fully satisfy the information needs of users.",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Karydi:2016:PDC,
  author =       "Efthalia Karydi and Konstantinos Margaritis",
  title =        "Parallel and Distributed Collaborative Filtering: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "37:1--37:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2951952",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Collaborative filtering is among the most preferred
                 techniques when implementing recommender systems.
                 Recently, great interest has turned toward parallel and
                 distributed implementations of collaborative filtering
                 algorithms. This work is a survey of parallel and
                 distributed collaborative filtering implementations,
                 aiming to not only provide a comprehensive presentation
                 of the field's development but also offer future
                 research directions by highlighting the issues that
                 need to be developed further.",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Xu:2016:TES,
  author =       "Meng Xu and Chengyu Song and Yang Ji and Ming-Wei Shih
                 and Kangjie Lu and Cong Zheng and Ruian Duan and
                 Yeongjin Jang and Byoungyoung Lee and Chenxiong Qian
                 and Sangho Lee and Taesoo Kim",
  title =        "Toward Engineering a Secure {Android} Ecosystem: a
                 Survey of Existing Techniques",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "38:1--38:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2963145",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The openness and extensibility of Android have made it
                 a popular platform for mobile devices and a strong
                 candidate to drive the Internet-of-Things.
                 Unfortunately, these properties also leave Android
                 vulnerable, attracting attacks for profit or fun. To
                 mitigate these threats, numerous issue-specific
                 solutions have been proposed. With the increasing
                 number and complexity of security problems and
                 solutions, we believe this is the right moment to step
                 back and systematically re-evaluate the Android
                 security architecture and security practices in the
                 ecosystem. We organize the most recent security
                 research on the Android platform into two categories:
                 the software stack and the ecosystem. For each
                 category, we provide a comprehensive narrative of the
                 problem space, highlight the limitations of the
                 proposed solutions, and identify open problems for
                 future research. Based on our collection of knowledge,
                 we envision a blueprint for engineering a secure,
                 next-generation Android ecosystem.",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Xavier:2016:SMM,
  author =       "Emerson M. A. Xavier and Francisco J. Ariza-L{\'o}pez
                 and Manuel A. Ure{\~n}a-C{\'a}mara",
  title =        "A Survey of Measures and Methods for Matching
                 Geospatial Vector Datasets",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "39:1--39:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2963147",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The field of Geographical Information Systems (GIS)
                 has experienced a rapid and ongoing growth of available
                 sources for geospatial data. This growth has demanded
                 more data integration in order to explore the benefits
                 of these data further. However, many data providers
                 implies many points of view for the same phenomena:
                 geospatial features. We need sophisticated procedures
                 aiming to find the correspondences between two vector
                 datasets, a process named geospatial data matching.
                 Similarity measures are key-tools for matching methods,
                 so it is interesting to review these concepts together.
                 This article provides a survey of 30 years of research
                 into the measures and methods facing geospatial data
                 matching. Our survey presents related work and develops
                 a common taxonomy that permits us to compare measures
                 and methods. This study points out relevant issues that
                 may help to discover the potential of these approaches
                 in many applications, like data integration,
                 conflation, quality evaluation, and data management.",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Maqsood:2016:SIO,
  author =       "Tahir Maqsood and Osman Khalid and Rizwana Irfan and
                 Sajjad A. Madani and Samee U. Khan",
  title =        "Scalability Issues in Online Social Networks",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "40:1--40:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2968216",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The last decade witnessed a tremendous increase in
                 popularity and usage of social network services, such
                 as Facebook, Twitter, and YouTube. Moreover, advances
                 in Web technologies coupled with social networks has
                 enabled users to not only access, but also generate,
                 content in many forms. The overwhelming amount of
                 produced content and resulting network traffic gives
                 rise to precarious scalability issues for social
                 networks, such as handling a large number of users,
                 infrastructure management, internal network traffic,
                 content dissemination, and data storage. There are few
                 surveys conducted to explore the different dimensions
                 of social networks, such as security, privacy, and data
                 acquisition. Most of the surveys focus on privacy or
                 security-related issues and do not specifically address
                 scalability challenges faced by social networks. In
                 this survey, we provide a comprehensive study of social
                 networks along with their significant characteristics
                 and categorize social network architectures into three
                 broad categories: (a) centralized, (b) decentralized,
                 and (c) hybrid. We also highlight various scalability
                 issues faced by social network architectures. Finally,
                 a qualitative comparison of presented architectures is
                 provided, which is based on various scalability
                 metrics, such as availability, latency, interserver
                 communication, cost of resources, and energy
                 consumption, just to name a few.",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bridges:2016:UGP,
  author =       "Robert A. Bridges and Neena Imam and Tiffany M.
                 Mintz",
  title =        "Understanding {GPU} Power: a Survey of Profiling,
                 Modeling, and Simulation Methods",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "41:1--41:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2962131",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Modern graphics processing units (GPUs) have complex
                 architectures that admit exceptional performance and
                 energy efficiency for high-throughput applications.
                 Although GPUs consume large amounts of power, their use
                 for high-throughput applications facilitate
                 state-of-the-art energy efficiency and performance.
                 Consequently, continued development relies on
                 understanding their power consumption. This work is a
                 survey of GPU power modeling and profiling methods with
                 increased detail on noteworthy efforts. As direct
                 measurement of GPU power is necessary for model
                 evaluation and parameter initiation, internal and
                 external power sensors are discussed. Hardware
                 counters, which are low-level tallies of hardware
                 events, share strong correlation to power use and
                 performance. Statistical correlation between power and
                 performance counters has yielded worthwhile GPU power
                 models, yet the complexity inherent to GPU
                 architectures presents new hurdles for power modeling.
                 Developments and challenges of counter-based GPU power
                 modeling are discussed. Often building on the
                 counter-based models, research efforts for GPU power
                 simulation, which make power predictions from input
                 code and hardware knowledge, provide opportunities for
                 optimization in programming or architectural design.
                 Noteworthy strides in power simulations for GPUs are
                 included along with their performance or functional
                 simulator counterparts when appropriate. Last, possible
                 directions for future research are discussed.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tang:2016:SSN,
  author =       "Jiliang Tang and Yi Chang and Charu Aggarwal and Huan
                 Liu",
  title =        "A Survey of Signed Network Mining in Social Media",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "42:1--42:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2956185",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Many real-world relations can be represented by signed
                 networks with positive and negative links, as a result
                 of which signed network analysis has attracted
                 increasing attention from multiple disciplines. With
                 the increasing prevalence of social media networks,
                 signed network analysis has evolved from developing and
                 measuring theories to mining tasks. In this article, we
                 present a review of mining signed networks in the
                 context of social media and discuss some promising
                 research directions and new frontiers. We begin by
                 giving basic concepts and unique properties and
                 principles of signed networks. Then we classify and
                 review tasks of signed network mining with
                 representative algorithms. We also delineate some tasks
                 that have not been extensively studied with formal
                 definitions and also propose research directions to
                 expand the field of signed network mining.",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Blasco:2016:SWB,
  author =       "Jorge Blasco and Thomas M. Chen and Juan Tapiador and
                 Pedro Peris-Lopez",
  title =        "A Survey of Wearable Biometric Recognition Systems",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "43:1--43:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2968215",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The growing popularity of wearable devices is leading
                 to new ways to interact with the environment, with
                 other smart devices, and with other people. Wearables
                 equipped with an array of sensors are able to capture
                 the owner's physiological and behavioural traits, thus
                 are well suited for biometric authentication to control
                 other devices or access digital services. However,
                 wearable biometrics have substantial differences from
                 traditional biometrics for computer systems, such as
                 fingerprints, eye features, or voice. In this article,
                 we discuss these differences and analyse how
                 researchers are approaching the wearable biometrics
                 field. We review and provide a categorization of
                 wearable sensors useful for capturing biometric
                 signals. We analyse the computational cost of the
                 different signal processing techniques, an important
                 practical factor in constrained devices such as
                 wearables. Finally, we review and classify the most
                 recent proposals in the field of wearable biometrics in
                 terms of the structure of the biometric system
                 proposed, their experimental setup, and their results.
                 We also present a critique of experimental issues such
                 as evaluation and feasibility aspects, and offer some
                 final thoughts on research directions that need
                 attention in future work.",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Trobec:2016:INP,
  author =       "Roman Trobec and Radivoje Vasiljevi{\'c} and Milo
                 Tomasevi{\'c} and Veljko Milutinovi{\'c} and Ramon
                 Beivide and Mateo Valero",
  title =        "Interconnection Networks in Petascale Computer
                 Systems: a Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "44:1--44:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2983387",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article provides background information about
                 interconnection networks, an analysis of previous
                 developments, and an overview of the state of the art.
                 The main contribution of this article is to highlight
                 the importance of the interpolation and extrapolation
                 of technological changes and physical constraints in
                 order to predict the optimum future interconnection
                 network. The technological changes are related to three
                 of the most important attributes of interconnection
                 networks: topology, routing, and flow-control
                 algorithms. On the other hand, the physical
                 constraints, that is, port counts, number of
                 communication nodes, and communication speed, determine
                 the realistic properties of the network. We present the
                 state-of-the-art technology for the most commonly used
                 interconnection networks and some background related to
                 often-used network topologies. The interconnection
                 networks of the best-performing petascale parallel
                 computers from past and present Top500 lists are
                 analyzed. The lessons learned from this analysis
                 indicate that computer networks need better performance
                 in future exascale computers. Such an approach leads to
                 the conclusion that a high-radix topology with optical
                 connections for longer links is set to become the
                 optimum interconnect for a number of relevant
                 application domains.",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Singh:2016:TSA,
  author =       "Jasmeet Singh and Vishal Gupta",
  title =        "Text Stemming: Approaches, Applications, and
                 Challenges",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "45:1--45:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2975608",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Stemming is a process in which the variant word forms
                 are mapped to their base form. It is among the basic
                 text pre-processing approaches used in Language
                 Modeling, Natural Language Processing, and Information
                 Retrieval applications. In this article, we present a
                 comprehensive survey of text stemming techniques,
                 evaluation mechanisms, and application domains. The
                 main objective of this survey is to distill the main
                 insights and present a detailed assessment of the
                 current state of the art. The performance of some
                 well-known rule-based and statistical stemming
                 algorithms in different scenarios has been analyzed. In
                 the end, we highlighted some open issues and challenges
                 related to unsupervised statistical text stemming. This
                 research work will help the researchers to select the
                 most suitable text stemming technique in a specific
                 application and will also serve as a guide to identify
                 the areas that need attention from the research
                 community.",
  acknowledgement = ack-nhfb,
  articleno =    "45",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Coppola:2016:CCT,
  author =       "Riccardo Coppola and Maurizio Morisio",
  title =        "Connected Car: Technologies, Issues, Future Trends",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "46:1--46:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2971482",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The connected car --- a vehicle capable of accessing
                 to the Internet, of communicating with smart devices as
                 well as other cars and road infrastructures, and of
                 collecting real-time data from multiple sources --- is
                 likely to play a fundamental role in the foreseeable
                 Internet of Things. In a context ruled by very strong
                 competitive forces, a significant amount of car
                 manufacturers and software and hardware developers have
                 already embraced the challenge of providing innovative
                 solutions for new-generation vehicles. Today's cars are
                 asked to relieve drivers from the most stressful
                 operations needed for driving, providing them with
                 interesting and updated entertainment functions. In the
                 meantime, they have to comply with the increasingly
                 stringent standards about safety and reliability. The
                 aim of this article is to provide an overview of the
                 possibilities offered by connected functionalities on
                 cars and the associated technological issues and
                 problems, as well as to enumerate the currently
                 available hardware and software solutions and their
                 main features.",
  acknowledgement = ack-nhfb,
  articleno =    "46",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cho:2016:SRA,
  author =       "Keewon Cho and Wooheon Kang and Hyungjun Cho and
                 Changwook Lee and Sungho Kang",
  title =        "A Survey of Repair Analysis Algorithms for Memories",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "47:1--47:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2971481",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Current rapid advancements in deep submicron
                 technologies have enabled the implementation of very
                 large memory devices and embedded memories. However,
                 the memory growth increases the number of defects,
                 reducing the yield and reliability of such devices.
                 Faulty cells are commonly repaired by using redundant
                 cells, which are embedded in memory arrays by adding
                 spare rows and columns. The repair process requires an
                 efficient redundancy analysis (RA) algorithm. Spare
                 architectures for the repair of faulty memory include
                 one-dimensional (1D) spare architectures,
                 two-dimensional (2D) spare architectures, and
                 configurable spare architectures. Of these types, 2D
                 spare architectures, which prepare extra rows and
                 columns for repair, are popular because of their better
                 repairing efficiency than 1D spare architectures and
                 easier implementation than configurable spare
                 architectures. However, because the complexity of the
                 RA is NP-complete, the RA algorithm should consider
                 various factors in order to determine a repair
                 solution. The performance depends on three factors:
                 analysis time, repair rate, and area overhead. In this
                 article, we survey RA algorithms for memory devices as
                 well as built-in repair algorithms for improving these
                 performance factors. Built-in redundancy analysis
                 techniques for emergent three-dimensional integrated
                 circuits are also discussed. Based on this analysis, we
                 then discuss future research challenges for
                 faulty-memory repair studies.",
  acknowledgement = ack-nhfb,
  articleno =    "47",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ribeiro:2016:TDU,
  author =       "Mateus L. Ribeiro and Henrique Manoel Lederman and
                 Simone Elias and F{\'a}tima L. S. Nunes",
  title =        "Techniques and Devices Used in Palpation Simulation
                 with Haptic Feedback",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "48:1--48:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2962723",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Palpation exam is a procedure in which a healthcare
                 professional presses a specific region of a patient's
                 body with the fingers in order to detect the presence
                 of features and abnormalities under the skin. A
                 simulator that aids the training of this procedure may
                 contribute to the learning of the technique and the
                 improvement of its implementation in real patients.
                 This article presents a systematic review conducted in
                 order to assess the state of the art of the simulation
                 of the palpation procedure, providing a categorization
                 of techniques and approaches used in systems with
                 haptic feedback. The results indicate that there are
                 existing gaps concerning the accessibility of the
                 haptic devices, innovative methods to calculate force
                 feedback and deformation caused by haptic devices, and
                 user experience improvement, since most of the studies
                 consider only one point of contact, which can limit the
                 simulation realism.",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pietri:2016:MVM,
  author =       "Ilia Pietri and Rizos Sakellariou",
  title =        "Mapping Virtual Machines onto Physical Machines in
                 Cloud Computing: a Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "49:1--49:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2983575",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Cloud computing enables users to provision resources
                 on demand and execute applications in a way that meets
                 their requirements by choosing virtual resources that
                 fit their application resource needs. Then, it becomes
                 the task of cloud resource providers to accommodate
                 these virtual resources onto physical resources. This
                 problem is a fundamental challenge in cloud computing
                 as resource providers need to map virtual resources
                 onto physical resources in a way that takes into
                 account the providers' optimization objectives. This
                 article surveys the relevant body of literature that
                 deals with this mapping problem and how it can be
                 addressed in different scenarios and through different
                 objectives and optimization techniques. The evaluation
                 aspects of different solutions are also considered. The
                 article aims at both identifying and classifying
                 research done in the area adopting a categorization
                 that can enhance understanding of the problem.",
  acknowledgement = ack-nhfb,
  articleno =    "49",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shu:2016:SSI,
  author =       "Rui Shu and Peipei Wang and Sigmund A. {Gorski III}
                 and Benjamin Andow and Adwait Nadkarni and Luke
                 Deshotels and Jason Gionta and William Enck and Xiaohui
                 Gu",
  title =        "A Study of Security Isolation Techniques",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "50:1--50:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2988545",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Security isolation is a foundation of computing
                 systems that enables resilience to different forms of
                 attacks. This article seeks to understand existing
                 security isolation techniques by systematically
                 classifying different approaches and analyzing their
                 properties. We provide a hierarchical classification
                 structure for grouping different security isolation
                 techniques. At the top level, we consider two principal
                 aspects: mechanism and policy. Each aspect is broken
                 down into salient dimensions that describe key
                 properties. We break the mechanism into two dimensions,
                 enforcement location and isolation granularity, and
                 break the policy aspect down into three dimensions:
                 policy generation, policy configurability, and policy
                 lifetime. We apply our classification to a set of
                 representative articles that cover a breadth of
                 security isolation techniques and discuss tradeoffs
                 among different design choices and limitations of
                 existing approaches.",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Steiner:2016:AWS,
  author =       "Rodrigo Vieira Steiner and Emil Lupu",
  title =        "Attestation in Wireless Sensor Networks: a Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "51:1--51:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2988546",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Attestation is a mechanism used by a trusted entity to
                 validate the software integrity of an untrusted
                 platform. Over the past few years, several attestation
                 techniques have been proposed. While they all use
                 variants of a challenge-response protocol, they make
                 different assumptions about what an attacker can and
                 cannot do. Thus, they propose intrinsically divergent
                 validation approaches. We survey in this article the
                 different approaches to attestation, focusing in
                 particular on those aimed at Wireless Sensor Networks.
                 We discuss the motivations, challenges, assumptions,
                 and attacks of each approach. We then organise them
                 into a taxonomy and discuss the state of the art,
                 carefully analysing the advantages and disadvantages of
                 each proposal. We also point towards the open research
                 problems and give directions on how to address them.",
  acknowledgement = ack-nhfb,
  articleno =    "51",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Abreu:2016:PBC,
  author =       "Pedro Henriques Abreu and Miriam Seoane Santos and
                 Miguel Henriques Abreu and Bruno Andrade and Daniel
                 Castro Silva",
  title =        "Predicting Breast Cancer Recurrence Using Machine
                 Learning Techniques: a Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "52:1--52:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2988544",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Background: Recurrence is an important cornerstone in
                 breast cancer behavior, intrinsically related to
                 mortality. In spite of its relevance, it is rarely
                 recorded in the majority of breast cancer datasets,
                 which makes research in its prediction more difficult.
                 Objectives: To evaluate the performance of machine
                 learning techniques applied to the prediction of breast
                 cancer recurrence. Material and Methods: Revision of
                 published works that used machine learning techniques
                 in local and open source databases between 1997 and
                 2014. Results: The revision showed that it is difficult
                 to obtain a representative dataset for breast cancer
                 recurrence and there is no consensus on the best set of
                 predictors for this disease. High accuracy results are
                 often achieved, yet compromising sensitivity. The
                 missing data and class imbalance problems are rarely
                 addressed and most often the chosen performance metrics
                 are inappropriate for the context. Discussion and
                 Conclusions: Although different techniques have been
                 used, prediction of breast cancer recurrence is still
                 an open problem. The combination of different machine
                 learning techniques, along with the definition of
                 standard predictors for breast cancer recurrence seem
                 to be the main future directions to obtain better
                 results.",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Malik:2016:GRN,
  author =       "Jamshaid Sarwar Malik and Ahmed Hemani",
  title =        "{Gaussian} Random Number Generation: a Survey on
                 Hardware Architectures",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "53:1--53:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2980052",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "Some excellent surveys of the Gaussian random number
                 generators (GRNGs) from the algorithmic perspective
                 exist in the published literature to date (e.g., Thomas
                 et al. [2007]). In the last decade, however,
                 advancements in digital hardware have resulted in an
                 ever-decreasing hardware cost and increased design
                 flexibility. Additionally, recent advances in
                 applications like gaming, weather forecasting, and
                 simulations in physics and astronomy require faster,
                 cheaper, and statistically accurate GRNGs. These two
                 trends have contributed toward the development of a
                 number of novel GRNG architectures optimized for
                 hardware design. A detailed comparative study of these
                 hardware architectures has been somewhat missing in the
                 published literature. This work provides the potential
                 user a capsulization of the published hardware GRNG
                 architectures. We have provided the method and theory,
                 pros and cons, and a comparative summary of the speed,
                 statistical accuracy, and hardware resource utilization
                 of these architectures. Finally, we have complemented
                 this work by describing two novel hardware GRNG
                 architectures, namely, the CLT-inversion and the
                 multihat algorithm, respectively. These new
                 architectures provide high tail accuracy ($ 6 \sigma $
                 and $ 8 \sigma $, respectively) at a low hardware
                 cost.",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Brault-Baron:2016:HAR,
  author =       "Johann Brault-Baron",
  title =        "Hypergraph Acyclicity Revisited",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "54:1--54:??",
  month =        dec,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2983573",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:25:05 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The notion of graph acyclicity has been extended to
                 several notions of hypergraph acyclicity. In increasing
                 order of generality: gamma acyclicity, beta acyclicity,
                 and alpha acyclicity have met a great interest in many
                 fields. For each notion, we prove the equivalence
                 between the numerous characterizations with a new,
                 simpler proof, in a self-contained manner. For that
                 purpose, we introduce new notions of alpha, beta, and
                 gamma leaf that allow one to define new ``rule-based''
                 characterizations of each notion. The combined
                 presentation of the notions is completed with a study
                 of their respective closure properties. New closure
                 results are established, and alpha, beta, and gamma
                 acyclicity are proved optimal w.r.t. their closure
                 properties.",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Reaves:2016:DAE,
  author =       "Bradley Reaves and Jasmine Bowers and Sigmund Albert
                 {Gorski III} and Olabode Anise and Rahul Bobhate and
                 Raymond Cho and Hiranava Das and Sharique Hussain and
                 Hamza Karachiwala and Nolen Scaife and Byron Wright and
                 Kevin Butler and William Enck and Patrick Traynor",
  title =        "{*droid}: Assessment and Evaluation of {Android}
                 Application Analysis Tools",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "55:1--55:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2996358",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The security research community has invested
                 significant effort in improving the security of Android
                 applications over the past half decade. This effort has
                 addressed a wide range of problems and resulted in the
                 creation of many tools for application analysis. In
                 this article, we perform the first systematization of
                 Android security research that analyzes applications,
                 characterizing the work published in more than 17 top
                 venues since 2010. We categorize each paper by the
                 types of problems they solve, highlight areas that have
                 received the most attention, and note whether tools
                 were ever publicly released for each effort. Of the
                 released tools, we then evaluate a representative
                 sample to determine how well application developers can
                 apply the results of our community's efforts to improve
                 their products. We find not only that significant work
                 remains to be done in terms of research coverage but
                 also that the tools suffer from significant issues
                 ranging from lack of maintenance to the inability to
                 produce functional output for applications with known
                 vulnerabilities. We close by offering suggestions on
                 how the community can more successfully move forward.",
  acknowledgement = ack-nhfb,
  articleno =    "55",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Aleti:2016:SLR,
  author =       "Aldeida Aleti and Irene Moser",
  title =        "A Systematic Literature Review of Adaptive Parameter
                 Control Methods for Evolutionary Algorithms",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "56:1--56:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2996355",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Evolutionary algorithms (EAs) are robust stochastic
                 optimisers that perform well over a wide range of
                 problems. Their robustness, however, may be affected by
                 several adjustable parameters, such as mutation rate,
                 crossover rate, and population size. Algorithm
                 parameters are usually problem-specific, and often have
                 to be tuned not only to the problem but even the
                 problem instance at hand to achieve ideal performance.
                 In addition, research has shown that different
                 parameter values may be optimal at different stages of
                 the optimisation process. To address these issues,
                 researchers have shifted their focus to adaptive
                 parameter control, in which parameter values are
                 adjusted during the optimisation process based on the
                 performance of the algorithm. These methods redefine
                 parameter values repeatedly based on implicit or
                 explicit rules that decide how to make the best use of
                 feedback from the optimisation algorithm. In this
                 survey, we systematically investigate the state of the
                 art in adaptive parameter control. The approaches are
                 classified using a new conceptual model that subdivides
                 the process of adapting parameter values into four
                 steps that are present explicitly or implicitly in all
                 existing approaches that tune parameters dynamically
                 during the optimisation process. The analysis reveals
                 the major focus areas of adaptive parameter control
                 research as well as gaps and potential directions for
                 further development in this area.",
  acknowledgement = ack-nhfb,
  articleno =    "56",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Li:2016:PDS,
  author =       "Tuo Li and Jude Angelo Ambrose and Roshan Ragel and
                 Sri Parameswaran",
  title =        "Processor Design for Soft Errors: Challenges and State
                 of the Art",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "57:1--57:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2996357",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Today, soft errors are one of the major design
                 technology challenges at and beyond the 22nm technology
                 nodes. This article introduces the soft error problem
                 from the perspective of processor design. This article
                 also provides a survey of the existing soft error
                 mitigation methods across different levels of design
                 abstraction involved in processor design, including the
                 device level, the circuit level, the architectural
                 level, and the program level.",
  acknowledgement = ack-nhfb,
  articleno =    "57",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dias:2016:SAP,
  author =       "Gabriel Martins Dias and Boris Bellalta and Simon
                 Oechsner",
  title =        "A Survey About Prediction-Based Data Reduction in
                 Wireless Sensor Networks",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "58:1--58:??",
  month =        dec,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2996356",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:25:05 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "One of the main characteristics of Wireless Sensor
                 Networks (WSNs) is the constrained energy resources of
                 their wireless sensor nodes. Although this issue has
                 been addressed in several works and received much
                 attention over the years, the most recent advances
                 pointed out that the energy harvesting and wireless
                 charging techniques may offer means to overcome such a
                 limitation. Consequently, an issue that had been put in
                 second place now emerges: the low availability of
                 spectrum resources. Because of it, the incorporation of
                 the WSNs into the Internet of Things and the
                 exponential growth of the latter may be hindered if no
                 control over the data generation is taken.
                 Alternatively, part of the sensed data can be predicted
                 without triggering transmissions that could congest the
                 wireless medium. In this work, we analyze and
                 categorize existing prediction-based data reduction
                 mechanisms that have been designed for WSNs. Our main
                 contribution is a systematic procedure for selecting a
                 scheme to make predictions in WSNs, based on WSNs'
                 constraints, characteristics of prediction methods, and
                 monitored data. Finally, we conclude the article with a
                 discussion about future challenges and open research
                 directions in the use of prediction methods to support
                 the WSNs' growth.",
  acknowledgement = ack-nhfb,
  articleno =    "58",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gardiner:2016:SML,
  author =       "Joseph Gardiner and Shishir Nagaraja",
  title =        "On the Security of Machine Learning in Malware {C\&C}
                 Detection: a Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "59:1--59:??",
  month =        dec,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3003816",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:25:05 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "One of the main challenges in security today is
                 defending against malware attacks. As trends and
                 anecdotal evidence show, preventing these attacks,
                 regardless of their indiscriminate or targeted nature,
                 has proven difficult: intrusions happen and devices get
                 compromised, even at security-conscious organizations.
                 As a consequence, an alternative line of work has
                 focused on detecting and disrupting the individual
                 steps that follow an initial compromise and are
                 essential for the successful progression of the attack.
                 In particular, several approaches and techniques have
                 been proposed to identify the command and control (C8C)
                 channel that a compromised system establishes to
                 communicate with its controller. A major oversight of
                 many of these detection techniques is the design's
                 resilience to evasion attempts by the well-motivated
                 attacker. C8C detection techniques make widespread use
                 of a machine learning (ML) component. Therefore, to
                 analyze the evasion resilience of these detection
                 techniques, we first systematize works in the field of
                 C8C detection and then, using existing models from the
                 literature, go on to systematize attacks against the ML
                 components used in these approaches.",
  acknowledgement = ack-nhfb,
  articleno =    "59",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bailly:2017:VMT,
  author =       "Gilles Bailly and Eric Lecolinet and Laurence Nigay",
  title =        "Visual Menu Techniques",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "60:1--60:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3002171",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Menus are used for exploring and selecting commands in
                 interactive applications. They are widespread in
                 current systems and used by a large variety of users.
                 As a consequence, they have motivated many studies in
                 Human-Computer Interaction (HCI). Facing the large
                 variety of menus, it is difficult to have a clear
                 understanding of the design possibilities and to
                 ascertain their similarities and differences. In this
                 article, we address a main challenge of menu design:
                 the need to characterize the design space of menus. To
                 do this, we propose a taxonomy of menu properties that
                 structures existing work on visual menus. As properties
                 have an impact on the performance of the menu, we start
                 by refining performance through a list of quality
                 criteria and by reviewing existing analytical and
                 empirical methods for quality evaluation. This taxonomy
                 of menu properties is a step toward the elaboration of
                 advanced predictive models of menu performance and the
                 optimization of menus. A key point of this work is to
                 focus both on menus and on the properties of menus, and
                 then enable a fine-grained analysis in terms of
                 performance.",
  acknowledgement = ack-nhfb,
  articleno =    "60",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kiljan:2017:SAC,
  author =       "Sven Kiljan and Koen Simoens and Danny {De Cock} and
                 Marko {Van Eekelen} and Harald Vranken",
  title =        "A Survey of Authentication and Communications Security
                 in Online Banking",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "61:1--61:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3002170",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "A survey was conducted to provide a state of the art
                 of online banking authentication and communications
                 security implementations. Between global regions the
                 applied (single or multifactor) authentication schemes
                 differ greatly, as well as the security of SSL/TLS
                 implementations. Three phases for online banking
                 development are identified. It is predicted that mobile
                 banking will enter a third phase, characterized by the
                 use of standard web technologies to develop mobile
                 banking applications for different platforms. This has
                 the potential to make mobile banking a target for
                 attacks in a similar manner that home banking currently
                 is.",
  acknowledgement = ack-nhfb,
  articleno =    "61",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pendleton:2017:SSS,
  author =       "Marcus Pendleton and Richard Garcia-Lebron and Jin-Hee
                 Cho and Shouhuai Xu",
  title =        "A Survey on Systems Security Metrics",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "62:1--62:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3005714",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Security metrics have received significant attention.
                 However, they have not been systematically explored
                 based on the understanding of attack-defense
                 interactions, which are affected by various factors,
                 including the degree of system vulnerabilities, the
                 power of system defense mechanisms, attack (or threat)
                 severity, and situations a system at risk faces. This
                 survey particularly focuses on how a system security
                 state can evolve as an outcome of cyber attack-defense
                 interactions. This survey concerns how to measure
                 system-level security by proposing a security metrics
                 framework based on the following four sub-metrics: (1)
                 metrics of system vulnerabilities, (2) metrics of
                 defense power, (3) metrics of attack or threat
                 severity, and (4) metrics of situations. To investigate
                 the relationships among these four sub-metrics, we
                 propose a hierarchical ontology with four
                 sub-ontologies corresponding to the four sub-metrics
                 and discuss how they are related to each other. Using
                 the four sub-metrics, we discuss the state-of-art
                 existing security metrics and their advantages and
                 disadvantages (or limitations) to obtain lessons and
                 insight in order to achieve an ideal goal in developing
                 security metrics. Finally, we discuss open research
                 questions in the security metrics research domain and
                 we suggest key factors to enhance security metrics from
                 a system security perspective.",
  acknowledgement = ack-nhfb,
  articleno =    "62",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Georgievski:2017:APU,
  author =       "Ilche Georgievski and Marco Aiello",
  title =        "Automated Planning for Ubiquitous Computing",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "63:1--63:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3004294",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The goal of ubiquitous computing is to create ambience
                 in which one's experiences and quality of life are
                 improved by monitoring and assisting people using
                 ubiquitous technologies and computation in coherence.
                 The continuous advancements of involved technologies,
                 such as wireless communications, mobile devices, and
                 sensors, imply fast evolution of ubiquitous computing
                 environments too. The complexity of these environments
                 is reaching a point where traditional solutions simply
                 no longer work. The environments are in need of
                 computational techniques that can deal with the
                 evolution and uncertainty of ubiquitous computing
                 environments dynamically and automatically. Artificial
                 Intelligence (AI) can contribute towards satisfying
                 this future scenario in many ways, while numerous
                 approaches inspired by work in the AI planning
                 community have already been designed for ubiquitous
                 computing. We devote this study to investigate the
                 current progress of AI planning for ubiquitous
                 computing by analysing those approaches. We rigorously
                 search for and select relevant literature out of which
                 we extract qualitative information. Using the extracted
                 qualities, we derive a generic framework that consists
                 of aspects important to planning for ubiquitous
                 computing. The framework's main purpose is to
                 facilitate the understanding of those aspects, and
                 classify the literature according to them. We then
                 analyse the literature in a consolidated way, and
                 identify future challenges of planning for ubiquitous
                 computing.",
  acknowledgement = ack-nhfb,
  articleno =    "63",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Diener:2017:ABT,
  author =       "Matthias Diener and Eduardo H. M. Cruz and Marco A. Z.
                 Alves and Philippe O. A. Navaux and Israel Koren",
  title =        "Affinity-Based Thread and Data Mapping in Shared
                 Memory Systems",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "64:1--64:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3006385",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Shared memory architectures have recently experienced
                 a large increase in thread-level parallelism, leading
                 to complex memory hierarchies with multiple cache
                 memory levels and memory controllers. These new designs
                 created a Non-Uniform Memory Access (NUMA) behavior,
                 where the performance and energy consumption of memory
                 accesses depend on the place where the data is located
                 in the memory hierarchy. Accesses to local caches or
                 memory controllers are generally more efficient than
                 accesses to remote ones. A common way to improve the
                 locality and balance of memory accesses is to determine
                 the mapping of threads to cores and data to memory
                 controllers based on the affinity between threads and
                 data. Such mapping techniques can operate at different
                 hardware and software levels, which impacts their
                 complexity, applicability, and the resulting
                 performance and energy consumption gains. In this
                 article, we introduce a taxonomy to classify different
                 mapping mechanisms and provide a comprehensive overview
                 of existing solutions.",
  acknowledgement = ack-nhfb,
  articleno =    "64",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Servos:2017:CRO,
  author =       "Daniel Servos and Sylvia L. Osborn",
  title =        "Current Research and Open Problems in Attribute-Based
                 Access Control",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "65:1--65:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3007204",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Attribute-based access control (ABAC) is a promising
                 alternative to traditional models of access control
                 (i.e., discretionary access control (DAC), mandatory
                 access control (MAC), and role-based access control
                 (RBAC)) that is drawing attention in both recent
                 academic literature and industry application. However,
                 formalization of a foundational model of ABAC and large
                 scale adoption is still in its infancy. The relatively
                 recent emergence of ABAC still leaves a number of
                 problems unexplored. Issues like delegation,
                 administration, auditability, scalability, hierarchical
                 representations, and the like, have been largely
                 ignored or left to future work. This article provides a
                 basic introduction to ABAC and a comprehensive review
                 of recent research efforts toward developing formal
                 models of ABAC. A taxonomy of ABAC research is
                 presented and used to categorize and evaluate surveyed
                 articles. Open problems are identified based on the
                 shortcomings of the reviewed works and potential
                 solutions discussed.",
  acknowledgement = ack-nhfb,
  articleno =    "65",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Liew:2017:SWM,
  author =       "Chee Sun Liew and Malcolm P. Atkinson and Michelle
                 Galea and Tan Fong Ang and Paul Martin and Jano I. {Van
                 Hemert}",
  title =        "Scientific Workflows: Moving Across Paradigms",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "66:1--66:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3012429",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Modern scientific collaborations have opened up the
                 opportunity to solve complex problems that require both
                 multidisciplinary expertise and large-scale
                 computational experiments. These experiments typically
                 consist of a sequence of processing steps that need to
                 be executed on selected computing platforms. Execution
                 poses a challenge, however, due to (1) the complexity
                 and diversity of applications, (2) the diversity of
                 analysis goals, (3) the heterogeneity of computing
                 platforms, and (4) the volume and distribution of data.
                 A common strategy to make these in silico experiments
                 more manageable is to model them as workflows and to
                 use a workflow management system to organize their
                 execution. This article looks at the overall challenge
                 posed by a new order of scientific experiments and the
                 systems they need to be run on, and examines how this
                 challenge can be addressed by workflows and workflow
                 management systems. It proposes a taxonomy of workflow
                 management system (WMS) characteristics, including
                 aspects previously overlooked. This frames a review of
                 prevalent WMSs used by the scientific community,
                 elucidates their evolution to handle the challenges
                 arising with the emergence of the ``fourth paradigm,''
                 and identifies research needed to maintain progress in
                 this area.",
  acknowledgement = ack-nhfb,
  articleno =    "66",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Capraro:2017:ISD,
  author =       "Maximilian Capraro and Dirk Riehle",
  title =        "Inner Source Definition, Benefits, and Challenges",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "67:1--67:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2856821",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Inner Source (IS) is the use of open source software
                 development practices and the establishment of an open
                 source-like culture within organizations. The
                 organization may still develop proprietary software but
                 internally opens up its development. A steady stream of
                 scientific literature and practitioner reports
                 indicates the interest in this research area. However,
                 the research area lacks a systematic assessment of
                 known research work: No model exists that defines IS
                 thoroughly. Various case studies provide insights into
                 IS programs in the context of specific organizations
                 but only few publications apply a broader perspective.
                 To resolve this, we performed an extensive literature
                 survey and analyzed 43 IS related publications plus
                 additional background literature. Using qualitative
                 data analysis methods, we developed a model of the
                 elements that constitute IS. We present a
                 classification framework for IS programs and projects
                 and apply it to lay out a map of known IS endeavors.
                 Further, we present qualitative models summarizing the
                 benefits and challenges of IS adoption. The survey
                 provides the first broad review of IS literature and
                 systematic arrangement of IS research results.",
  acknowledgement = ack-nhfb,
  articleno =    "67",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jhaveri:2017:ARF,
  author =       "Mohammad Hanif Jhaveri and Orcun Cetin and Carlos
                 Ga{\~n}{\'a}n and Tyler Moore and Michel {Van Eeten}",
  title =        "Abuse Reporting and the Fight Against Cybercrime",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "68:1--68:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3003147",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Cybercriminal activity has exploded in the past
                 decade, with diverse threats ranging from phishing
                 attacks to botnets and drive-by-downloads afflicting
                 millions of computers worldwide. In response, a
                 volunteer defense has emerged, led by security
                 companies, infrastructure operators, and vigilantes.
                 This reactionary force does not concern itself with
                 making proactive upgrades to the cyber infrastructure.
                 Instead, it operates on the front lines by remediating
                 infections as they appear. We construct a model of the
                 abuse reporting infrastructure in order to explain how
                 voluntary action against cybercrime functions today, in
                 hopes of improving our understanding of what works and
                 how to make remediation more effective in the future.
                 We examine the incentives to participate among data
                 contributors, affected resource owners, and
                 intermediaries. Finally, we present a series of key
                 attributes that differ among voluntary actions to
                 investigate further through experimentation, pointing
                 toward a research agenda that could establish causality
                 between interventions and outcomes.",
  acknowledgement = ack-nhfb,
  articleno =    "68",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Martinez:2017:SLP,
  author =       "V{\'\i}ctor Mart{\'\i}nez and Fernando Berzal and
                 Juan-Carlos Cubero",
  title =        "A Survey of Link Prediction in Complex Networks",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "69:1--69:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3012704",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Networks have become increasingly important to model
                 complex systems composed of interacting elements.
                 Network data mining has a large number of applications
                 in many disciplines including protein-protein
                 interaction networks, social networks, transportation
                 networks, and telecommunication networks. Different
                 empirical studies have shown that it is possible to
                 predict new relationships between elements attending to
                 the topology of the network and the properties of its
                 elements. The problem of predicting new relationships
                 in networks is called link prediction. Link prediction
                 aims to infer the behavior of the network link
                 formation process by predicting missed or future
                 relationships based on currently observed connections.
                 It has become an attractive area of study since it
                 allows us to predict how networks will evolve. In this
                 survey, we will review the general-purpose techniques
                 at the heart of the link prediction problem, which can
                 be complemented by domain-specific heuristic methods in
                 practice.",
  acknowledgement = ack-nhfb,
  articleno =    "69",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chang:2017:MCB,
  author =       "Chii Chang and Satish Narayana Srirama and Rajkumar
                 Buyya",
  title =        "Mobile Cloud Business Process Management System for
                 the {Internet of Things}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "70:1--70:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3012000",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The Internet of Things (IoT) represents a
                 comprehensive environment that consists of a large
                 number of smart devices interconnecting heterogeneous
                 physical objects to the Internet. Many domains such as
                 logistics, manufacturing, agriculture, urban computing,
                 home automation, ambient assisted living, and various
                 ubiquitous computing applications have utilized IoT
                 technologies. Meanwhile, Business Process Management
                 Systems (BPMSs) have become a successful and efficient
                 solution for coordinated management and optimized
                 utilization of resources/entities. However, past BPMSs
                 have not considered many issues they will face in
                 managing large-scale connected heterogeneous IoT
                 entities. Without fully understanding the behavior,
                 capability, and state of the IoT entities, the BPMS can
                 fail to manage the IoT integrated information systems.
                 In this article, we analyze existing BPMSs for IoT and
                 identify the limitations and their drawbacks based on a
                 Mobile Cloud Computing perspective. Later, we discuss a
                 number of open challenges in BPMS for IoT.",
  acknowledgement = ack-nhfb,
  articleno =    "70",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wiriyathammabhum:2017:CVN,
  author =       "Peratham Wiriyathammabhum and Douglas Summers-Stay and
                 Cornelia Ferm{\"u}ller and Yiannis Aloimonos",
  title =        "Computer Vision and Natural Language Processing:
                 Recent Approaches in Multimedia and Robotics",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "71:1--71:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3009906",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Integrating computer vision and natural language
                 processing is a novel interdisciplinary field that has
                 received a lot of attention recently. In this survey,
                 we provide a comprehensive introduction of the
                 integration of computer vision and natural language
                 processing in multimedia and robotics applications with
                 more than 200 key references. The tasks that we survey
                 include visual attributes, image captioning, video
                 captioning, visual question answering, visual
                 retrieval, human-robot interaction, robotic actions,
                 and robot navigation. We also emphasize strategies to
                 integrate computer vision and natural language
                 processing models as a unified theme of distributional
                 semantics. We make an analog of distributional
                 semantics in computer vision and natural language
                 processing as image embedding and word embedding,
                 respectively. We also present a unified view for the
                 field and propose possible future directions.",
  acknowledgement = ack-nhfb,
  articleno =    "71",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pavai:2017:SCO,
  author =       "G. Pavai and T. V. Geetha",
  title =        "A Survey on Crossover Operators",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "72:1--72:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3009966",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Crossover is an important operation in the Genetic
                 Algorithms (GA). Crossover operation is responsible for
                 producing offspring for the next generation so as to
                 explore a much wider area of the solution space. There
                 are many crossover operators designed to cater to
                 different needs of different optimization problems.
                 Despite the many analyses, it is still difficult to
                 decide which crossover to use when. In this article, we
                 have considered the various existing crossover
                 operators based on the application for which they were
                 designed for and the purpose that they were designed
                 for. We have classified the existing crossover
                 operators into two broad categories, namely (1)
                 Crossover operators for representation of applications
                 --- where the crossover operators designed to suit the
                 representation aspect of applications are discussed
                 along with how the crossover operators work and (2)
                 Crossover operators for improving GA performance of
                 applications --- where crossover operators designed to
                 influence the quality of the solution and speed of GA
                 are discussed. We have also come up with some
                 interesting future directions in the area of designing
                 new crossover operators as a result of our survey.",
  acknowledgement = ack-nhfb,
  articleno =    "72",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Boukerche:2017:MIH,
  author =       "Azzedine Boukerche and Alexander Magnano and Noura
                 Aljeri",
  title =        "Mobile {IP} Handover for Vehicular Networks: Methods,
                 Models, and Classifications",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "73:1--73:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2996451",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The popularity and development of wireless devices has
                 led to a demand for widespread high-speed Internet
                 access, including access for vehicles and other modes
                 of high-speed transportation. The current widely
                 deployed method for providing Internet Protocol (IP)
                 services to mobile devices is the mobile IP. This
                 includes a handover process for a mobile device to
                 maintain its IP session while it switches between
                 points of access. However, the mobile IP handover
                 causes performance degradation due to its disruptive
                 latency and high packet drop rate. This is largely
                 problematic for vehicles, as they will be forced to
                 transition between access points more frequently due to
                 their higher speeds and frequent topological changes in
                 vehicular networks. In this article, we discuss the
                 different mobile IP handover solutions found within
                 related literature and their potential for resolving
                 issues pertinent to vehicular networks. First, we
                 provide an overview of the mobile IP handover and its
                 problematic components. This is followed by
                 categorization and comparison between different mobile
                 IP handover solutions, with an analysis of their
                 benefits and drawbacks.",
  acknowledgement = ack-nhfb,
  articleno =    "73",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shin:2017:SSD,
  author =       "Youngjoo Shin and Dongyoung Koo and Junbeom Hur",
  title =        "A Survey of Secure Data Deduplication Schemes for
                 Cloud Storage Systems",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "74:1--74:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3017428",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Data deduplication has attracted many cloud service
                 providers (CSPs) as a way to reduce storage costs. Even
                 though the general deduplication approach has been
                 increasingly accepted, it comes with many security and
                 privacy problems due to the outsourced data delivery
                 models of cloud storage. To deal with specific security
                 and privacy issues, secure deduplication techniques
                 have been proposed for cloud data, leading to a diverse
                 range of solutions and trade-offs. Hence, in this
                 article, we discuss ongoing research on secure
                 deduplication for cloud data in consideration of the
                 attack scenarios exploited most widely in cloud
                 storage. On the basis of classification of
                 deduplication system, we explore security risks and
                 attack scenarios from both inside and outside
                 adversaries. We then describe state-of-the-art secure
                 deduplication techniques for each approach that deal
                 with different security issues under specific or
                 combined threat models, which include both
                 cryptographic and protocol solutions. We discuss and
                 compare each scheme in terms of security and efficiency
                 specific to different security goals. Finally, we
                 identify and discuss unresolved issues and further
                 research challenges for secure deduplication in cloud
                 storage.",
  acknowledgement = ack-nhfb,
  articleno =    "74",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Aburaed:2017:AQT,
  author =       "Nour Abura'ed and Faisal Shah Khan and Harish
                 Bhaskar",
  title =        "Advances in the Quantum Theoretical Approach to Image
                 Processing Applications",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "75:1--75:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3009965",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In this article, a detailed survey of the quantum
                 approach to image processing is presented. Recently, it
                 has been established that existing quantum algorithms
                 are applicable to image processing tasks allowing
                 quantum informational models of classical image
                 processing. However, efforts continue in identifying
                 the diversity of its applicability in various image
                 processing domains. Here, in addition to reviewing some
                 of the critical image processing applications that
                 quantum mechanics have targeted, such as denoising,
                 edge detection, image storage, retrieval, and
                 compression, this study will also highlight the
                 complexities in transitioning from the classical to the
                 quantum domain. This article shall establish
                 theoretical fundamentals, analyze performance and
                 evaluation, draw key statistical evidence to support
                 claims, and provide recommendations based on published
                 literature mostly during the period from 2010 to
                 2015.",
  acknowledgement = ack-nhfb,
  articleno =    "75",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tam:2017:EAM,
  author =       "Kimberly Tam and Ali Feizollah and Nor Badrul Anuar
                 and Rosli Salleh and Lorenzo Cavallaro",
  title =        "The Evolution of {Android} Malware and {Android}
                 Analysis Techniques",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "76:1--76:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3017427",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "With the integration of mobile devices into daily
                 life, smartphones are privy to increasing amounts of
                 sensitive information. Sophisticated mobile malware,
                 particularly Android malware, acquire or utilize such
                 data without user consent. It is therefore essential to
                 devise effective techniques to analyze and detect these
                 threats. This article presents a comprehensive survey
                 on leading Android malware analysis and detection
                 techniques, and their effectiveness against evolving
                 malware. This article categorizes systems by
                 methodology and date to evaluate progression and
                 weaknesses. This article also discusses evaluations of
                 industry solutions, malware statistics, and malware
                 evasion techniques and concludes by supporting future
                 research paths.",
  acknowledgement = ack-nhfb,
  articleno =    "76",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Li:2017:DDTa,
  author =       "Tao Li and Ning Xie and Chunqiu Zeng and Wubai Zhou
                 and Li Zheng and Yexi Jiang and Yimin Yang and Hsin-Yu
                 Ha and Wei Xue and Yue Huang and Shu-Ching Chen and
                 Jainendra Navlakha and S. S. Iyengar",
  title =        "Data-Driven Techniques in Disaster Information
                 Management",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "1:1--1:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3017678",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Improving disaster management and recovery techniques
                 is one of national priorities given the huge toll
                 caused by man-made and nature calamities. Data-driven
                 disaster management aims at applying advanced data
                 collection and analysis technologies to achieve more
                 effective and responsive disaster management, and has
                 undergone considerable progress in the last decade.
                 However, to the best of our knowledge, there is
                 currently no work that both summarizes recent progress
                 and suggests future directions for this emerging
                 research area. To remedy this situation, we provide a
                 systematic treatment of the recent developments in
                 data-driven disaster management. Specifically, we first
                 present a general overview of the requirements and
                 system architectures of disaster management systems and
                 then summarize state-of-the-art data-driven techniques
                 that have been applied on improving situation awareness
                 as well as in addressing users' information needs in
                 disaster management. We also discuss and categorize
                 general data-mining and machine-learning techniques in
                 disaster management. Finally, we recommend several
                 research directions for further investigations.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{LaRosa:2017:BPV,
  author =       "Marcello {La Rosa} and Wil M. P. {Van Der Aalst} and
                 Marlon Dumas and Fredrik P. Milani",
  title =        "Business Process Variability Modeling: a Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "2:1--2:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3041957",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "It is common for organizations to maintain multiple
                 variants of a given business process, such as multiple
                 sales processes for different products or multiple
                 bookkeeping processes for different countries.
                 Conventional business process modeling languages do not
                 explicitly support the representation of such families
                 of process variants. This gap triggered significant
                 research efforts over the past decade, leading to an
                 array of approaches to business process variability
                 modeling. In general, each of these approaches extends
                 a conventional process modeling language with
                 constructs to capture customizable process models. A
                 customizable process model represents a family of
                 process variants in a way that a model of each variant
                 can be derived by adding or deleting fragments
                 according to customization options or according to a
                 domain model. This survey draws up a systematic
                 inventory of approaches to customizable process
                 modeling and provides a comparative evaluation with the
                 aim of identifying common and differentiating modeling
                 features, providing criteria for selecting among
                 multiple approaches, and identifying gaps in the state
                 of the art. The survey puts into evidence an abundance
                 of customizable process-modeling languages, which
                 contrasts with a relative scarcity of available tool
                 support and empirical comparative evaluations.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Salayma:2017:WBA,
  author =       "Marwa Salayma and Ahmed Al-Dubai and Imed Romdhani and
                 Youssef Nasser",
  title =        "Wireless Body Area Network {(WBAN)}: a Survey on
                 Reliability, Fault Tolerance, and Technologies
                 Coexistence",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "3:1--3:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3041956",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Wireless Body Area Network (WBAN) has been a key
                 element in e-health to monitor bodies. This technology
                 enables new applications under the umbrella of
                 different domains, including the medical field, the
                 entertainment and ambient intelligence areas. This
                 survey paper places substantial emphasis on the concept
                 and key features of the WBAN technology. First, the
                 WBAN concept is introduced and a review of key
                 applications facilitated by this networking technology
                 is provided. The study then explores a wide variety of
                 communication standards and methods deployed in this
                 technology. Due to the sensitivity and criticality of
                 the data carried and handled by WBAN, fault tolerance
                 is a critical issue and widely discussed in this paper.
                 Hence, this survey investigates thoroughly the
                 reliability and fault tolerance paradigms suggested for
                 WBANs. Open research and challenging issues pertaining
                 to fault tolerance, coexistence and interference
                 management and power consumption are also discussed
                 along with some suggested trends in these aspects.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nath:2017:EKG,
  author =       "Sayantan Nath and Sonali Agarwal and G. N. Pandey",
  title =        "Evaluation of Knowledge Gaps in Mathematical
                 Applications of Thermal Image Processing Techniques for
                 Fire Prevention",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "4:1--4:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3009967",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In this article, we present literature reviews on fire
                 prevention methods, especially in mining industries,
                 using thermal image processing techniques. Fire
                 protection systems are crucial because of the increased
                 loss of human lives due to coal fires and fatal
                 explosions in coal mines across the world in the past
                 few decades. And with the growth in the demand for
                 energy and the mining of coal expected up to the year
                 2050, determining conditions leading up to a breakout
                 of fire is paramount. To detect uncertain fire breakout
                 conditions, thermal imaging is considered the most
                 significant among several early warning methods to
                 recognize spontaneous combustion of coal piles (e.g.,
                 temperature recordings by sensors, compaction testing
                 of ore seam, gas tests). The evolution of thermographic
                 imaging applied in various industrial sectors (e.g.,
                 coal furnaces, oil tankers, building inspections,
                 security) with numerous applications of mathematical
                 models will be presented in the light of safety
                 dimensions in the mining industry. The missing links or
                 unattended areas of mathematics in the application of
                 thermal image processing in mining, especially in the
                 coal industry, will be evolved as the gap in knowledge
                 suggested in our concluding statements.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Su:2017:SDF,
  author =       "Ting Su and Ke Wu and Weikai Miao and Geguang Pu and
                 Jifeng He and Yuting Chen and Zhendong Su",
  title =        "A Survey on Data-Flow Testing",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "5:1--5:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3020266",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Data-flow testing (DFT) is a family of testing
                 strategies designed to verify the interactions between
                 each program variable's definition and its uses. Such a
                 test objective of interest is referred to as a def-use
                 pair. DFT selects test data with respect to various
                 test adequacy criteria (i.e., data-flow coverage
                 criteria ) to exercise each pair. The original
                 conception of DFT was introduced by Herman in 1976.
                 Since then, a number of studies have been conducted,
                 both theoretically and empirically, to analyze DFT's
                 complexity and effectiveness. In the past four decades,
                 DFT has been continuously concerned, and various
                 approaches from different aspects are proposed to
                 pursue automatic and efficient data-flow testing. This
                 survey presents a detailed overview of data-flow
                 testing, including challenges and approaches in
                 enforcing and automating it: (1) it introduces the
                 data-flow analysis techniques that are used to identify
                 def-use pairs; (2) it classifies and discusses
                 techniques for data-flow-based test data generation,
                 such as search-based testing, random testing,
                 collateral-coverage-based testing,
                 symbolic-execution-based testing, and
                 model-checking-based testing; (3) it discusses
                 techniques for tracking data-flow coverage; (4) it
                 presents several DFT applications, including software
                 fault localization, web security testing, and
                 specification consistency checking; and (5) it
                 summarizes recent advances and discusses future
                 research directions toward more practical data-flow
                 testing.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Biswas:2017:STC,
  author =       "Arnab Kumar Biswas and Dipak Ghosal and Shishir
                 Nagaraja",
  title =        "A Survey of Timing Channels and Countermeasures",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "6:1--6:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3023872",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "A timing channel is a communication channel that can
                 transfer information to a receiver/decoder by
                 modulating the timing behavior of an entity. Examples
                 of this entity include the interpacket delays of a
                 packet stream, the reordering packets in a packet
                 stream, or the resource access time of a cryptographic
                 module. Advances in the information and coding theory
                 and the availability of high-performance computing
                 systems interconnected by high-speed networks have
                 spurred interest in and development of various types of
                 timing channels. With the emergence of complex timing
                 channels, novel detection and prevention techniques are
                 also being developed to counter them. In this article,
                 we provide a detailed survey of timing channels broadly
                 categorized into network timing channel, in which
                 communicating entities are connected by a network, and
                 in-system timing channel, in which the communicating
                 entities are within a computing system. This survey
                 builds on the last comprehensive survey by Zander et
                 al. [2007] and considers all three canonical
                 applications of timing channels, namely, covert
                 communication, timing side channel, and network flow
                 watermarking. We survey the theoretical foundations,
                 the implementation, and the various detection and
                 prevention techniques that have been reported in
                 literature. Based on the analysis of the current
                 literature, we discuss potential future research
                 directions both in the design and application of timing
                 channels and their detection and prevention
                 techniques.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dylla:2017:SQS,
  author =       "Frank Dylla and Jae Hee Lee and Till Mossakowski and
                 Thomas Schneider and Andr{\'e} {Van Delden} and Jasper
                 {Van De Ven} and Diedrich Wolter",
  title =        "A Survey of Qualitative Spatial and Temporal Calculi:
                 Algebraic and Computational Properties",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "7:1--7:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3038927",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Qualitative spatial and temporal reasoning (QSTR) is
                 concerned with symbolic knowledge representation,
                 typically over infinite domains. The motivations for
                 employing QSTR techniques include exploiting
                 computational properties that allow efficient reasoning
                 to capture human cognitive concepts in a computational
                 framework. The notion of a qualitative calculus is one
                 of the most prominent QSTR formalisms. This article
                 presents the first overview of all qualitative calculi
                 developed to date and their computational properties,
                 together with generalized definitions of the
                 fundamental concepts and methods that now encompass all
                 existing calculi. Moreover, we provide a classification
                 of calculi according to their algebraic properties.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ramachandra:2017:PAD,
  author =       "Raghavendra Ramachandra and Christoph Busch",
  title =        "Presentation Attack Detection Methods for Face
                 Recognition Systems: a Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "8:1--8:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3038924",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The vulnerability of face recognition systems to
                 presentation attacks (also known as direct attacks or
                 spoof attacks) has received a great deal of interest
                 from the biometric community. The rapid evolution of
                 face recognition systems into real-time applications
                 has raised new concerns about their ability to resist
                 presentation attacks, particularly in unattended
                 application scenarios such as automated border control.
                 The goal of a presentation attack is to subvert the
                 face recognition system by presenting a facial
                 biometric artifact. Popular face biometric artifacts
                 include a printed photo, the electronic display of a
                 facial photo, replaying video using an electronic
                 display, and 3D face masks. These have demonstrated a
                 high security risk for state-of-the-art face
                 recognition systems. However, several presentation
                 attack detection (PAD) algorithms (also known as
                 countermeasures or antispoofing methods) have been
                 proposed that can automatically detect and mitigate
                 such targeted attacks. The goal of this survey is to
                 present a systematic overview of the existing work on
                 face presentation attack detection that has been
                 carried out. This paper describes the various aspects
                 of face presentation attacks, including different types
                 of face artifacts, state-of-the-art PAD algorithms and
                 an overview of the respective research labs working in
                 this domain, vulnerability assessments and performance
                 evaluation metrics, the outcomes of competitions, the
                 availability of public databases for benchmarking new
                 PAD algorithms in a reproducible manner, and finally a
                 summary of the relevant international standardization
                 in this field. Furthermore, we discuss the open
                 challenges and future work that need to be addressed in
                 this evolving field of biometrics.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Meixner:2017:HIM,
  author =       "Britta Meixner",
  title =        "Hypervideos and Interactive Multimedia Presentations",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "9:1--9:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3038925",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Hypervideos and interactive multimedia presentations
                 allow the creation of fully interactive and enriched
                 video. It is possible to organize video scenes in a
                 nonlinear way. Additional information can be added to
                 the video ranging from short descriptions to images and
                 more videos. Hypervideos are video-based but also
                 provide navigation between video scenes and additional
                 multimedia elements. Interactive multimedia
                 presentations consist of different media with a
                 temporal and spatial synchronization that can be
                 navigated via hyperlinks. Their creation and
                 description requires description formats, multimedia
                 models, and standards-as well as players. Specialized
                 authoring tools with advanced editing functions allow
                 authors to manage all media files, link and arrange
                 them to an overall presentation, and keep an overview
                 during the whole process. They considerably simplify
                 the creation process compared to writing and editing
                 description documents in simple text editors. Data
                 formats need features that describe interactivity and
                 nonlinear navigation while maintaining temporal and
                 spatial synchronization. Players should be easy to use
                 with extended feature sets keeping elements
                 synchronized. In this article, we analyzed more than
                 400 papers for relevant work in this field. From the
                 findings we discovered a set of trends and unsolved
                 problems, and propose directions for future research.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jukan:2017:SCS,
  author =       "Admela Jukan and Xavi Masip-Bruin and Nina Amla",
  title =        "Smart Computing and Sensing Technologies for Animal
                 Welfare: a Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "10:1--10:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3041960",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Animals play a profoundly important and intricate role
                 in our lives today. Dogs have been human companions for
                 thousands of years, but now they work to assist the
                 disabled, and in combat and search and rescue
                 situations. Farm animals are a critical part of
                 sustainable agriculture today, and there is increasing
                 consumer interest in humanely raised livestock, and how
                 it impacts our health and environmental footprint. Wild
                 animals are threatened with extinction by human induced
                 factors, and shrinking and compromised habitats. There
                 are many reasons, including societal and economic ones,
                 to explore how new computing technologies can be used
                 to ensure the welfare of animals in these settings. The
                 goal of this review is to systematically survey the
                 existing literature in smart computing and sensing
                 technologies for domestic, farm, and wild animal
                 welfare. We use a broad notion of animal welfare to
                 refer to an assessment of whether animals are healthy,
                 free of pain and suffering, and positively stimulated
                 in their environment. Smart computing and sensing is
                 also used in broad terms, to refer to systems that are
                 not isolated but interconnected with communication
                 networks, and capable of remote data collection,
                 processing, exchange, and analysis. The findings of
                 this review are expected to motivate future research in
                 computer science and engineering, as well as contribute
                 to data, information, and communication management for
                 animal welfare.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chi:2017:HTS,
  author =       "Lianhua Chi and Xingquan Zhu",
  title =        "Hashing Techniques: a Survey and Taxonomy",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "11:1--11:36",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3047307",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  abstract =     "With the rapid development of information storage and
                 networking technologies, quintillion bytes of data are
                 generated every day from social networks, business
                 transactions, sensors, and many other domains. The
                 increasing data volumes impose significant challenges
                 to traditional data analysis tools in storing,
                 processing, and analyzing these extremely large-scale
                 data. For decades, hashing has been one of the most
                 effective tools commonly used to compress data for fast
                 access and analysis, as well as information integrity
                 verification. Hashing techniques have also evolved from
                 simple randomization approaches to advanced adaptive
                 methods considering locality, structure, label
                 information, and data security, for effective hashing.
                 This survey reviews and categorizes existing hashing
                 techniques as a taxonomy, in order to provide a
                 comprehensive view of mainstream hashing techniques for
                 different types of data and applications. The taxonomy
                 also studies the uniqueness of each method and
                 therefore can serve as technique references in
                 understanding the niche of different hashing mechanisms
                 for future development.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tsvetkova:2017:UHM,
  author =       "Milena Tsvetkova and Taha Yasseri and Eric T. Meyer
                 and J. Brian Pickering and Vegard Engen and Paul
                 Walland and Marika L{\"u}ders and Asbj{\o}rn F{\o}lstad
                 and George Bravos",
  title =        "Understanding Human-Machine Networks: a
                 Cross-Disciplinary Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "12:1--12:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3039868",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In the current hyperconnected era, modern Information
                 and Communication Technology (ICT) systems form
                 sophisticated networks where not only do people
                 interact with other people, but also machines take an
                 increasingly visible and participatory role. Such
                 Human-Machine Networks (HMNs) are embedded in the daily
                 lives of people, both for personal and professional
                 use. They can have a significant impact by producing
                 synergy and innovations. The challenge in designing
                 successful HMNs is that they cannot be developed and
                 implemented in the same manner as networks of machines
                 nodes alone, or following a wholly human-centric view
                 of the network. The problem requires an
                 interdisciplinary approach. Here, we review current
                 research of relevance to HMNs across many disciplines.
                 Extending the previous theoretical concepts of
                 socio-technical systems, actor-network theory,
                 cyber-physical-social systems, and social machines, we
                 concentrate on the interactions among humans and
                 between humans and machines. We identify eight types of
                 HMNs: public-resource computing, crowdsourcing, web
                 search engines, crowdsensing, online markets, social
                 media, multiplayer online games and virtual worlds, and
                 mass collaboration. We systematically select literature
                 on each of these types and review it with a focus on
                 implications for designing HMNs. Moreover, we discuss
                 risks associated with HMNs and identify emerging design
                 and development trends.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Calzavara:2017:SWJ,
  author =       "Stefano Calzavara and Riccardo Focardi and Marco
                 Squarcina and Mauro Tempesta",
  title =        "Surviving the {Web}: a Journey into {Web} Session
                 Security",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "13:1--13:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3038923",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "In this article, we survey the most common attacks
                 against web sessions, that is, attacks that target
                 honest web browser users establishing an authenticated
                 session with a trusted web application. We then review
                 existing security solutions that prevent or mitigate
                 the different attacks by evaluating them along four
                 different axes: protection, usability, compatibility,
                 and ease of deployment. We also assess several
                 defensive solutions that aim at providing robust
                 safeguards against multiple attacks. Based on this
                 survey, we identify five guidelines that, to different
                 extents, have been taken into account by the designers
                 of the different proposals we reviewed. We believe that
                 these guidelines can be helpful for the development of
                 innovative solutions approaching web security in a more
                 systematic and comprehensive way.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bashroush:2017:CTS,
  author =       "Rabih Bashroush and Muhammad Garba and Rick Rabiser
                 and Iris Groher and Goetz Botterweck",
  title =        "{CASE} Tool Support for Variability Management in
                 Software Product Lines",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "14:1--14:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3034827",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Software product lines (SPL) aim at reducing
                 time-to-market and increasing software quality through
                 extensive, planned reuse of artifacts. An essential
                 activity in SPL is variability management, i.e.,
                 defining and managing commonality and variability among
                 member products. Due to the large scale and complexity
                 of today's software-intensive systems, variability
                 management has become increasingly complex to conduct.
                 Accordingly, tool support for variability management
                 has been gathering increasing momentum over the last
                 few years and can be considered a key success factor
                 for developing and maintaining SPLs. While several
                 studies have already been conducted on variability
                 management, none of these analyzed the available tool
                 support in detail. In this work, we report on a survey
                 in which we analyzed 37 existing variability management
                 tools identified using a systematic literature review
                 to understand the tools' characteristics, maturity, and
                 the challenges in the field. We conclude that while
                 most studies on variability management tools provide a
                 good motivation and description of the research context
                 and challenges, they often lack empirical data to
                 support their claims and findings. It was also found
                 that quality attributes important for the practical use
                 of tools such as usability, integration, scalability,
                 and performance were out of scope for most studies.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Soler-Dominguez:2017:SFA,
  author =       "Amparo Soler-Dominguez and Angel A. Juan and Renatas
                 Kizys",
  title =        "A Survey on Financial Applications of Metaheuristics",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "15:1--15:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3054133",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Modern heuristics or metaheuristics are optimization
                 algorithms that have been increasingly used during the
                 last decades to support complex decision-making in a
                 number of fields, such as logistics and transportation,
                 telecommunication networks, bioinformatics, finance,
                 and the like. The continuous increase in computing
                 power, together with advancements in metaheuristics
                 frameworks and parallelization strategies, are
                 empowering these types of algorithms as one of the best
                 alternatives to solve rich and real-life combinatorial
                 optimization problems that arise in a number of
                 financial and banking activities. This article reviews
                 some of the works related to the use of metaheuristics
                 in solving both classical and emergent problems in the
                 finance arena. A non-exhaustive list of examples
                 includes rich portfolio optimization, index tracking,
                 enhanced indexation, credit risk, stock investments,
                 financial project scheduling, option pricing, feature
                 selection, bankruptcy and financial distress
                 prediction, and credit risk assessment. This article
                 also discusses some open opportunities for researchers
                 in the field, and forecast the evolution of
                 metaheuristics to include real-life uncertainty
                 conditions into the optimization problems being
                 considered.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Burow:2017:CFI,
  author =       "Nathan Burow and Scott A. Carr and Joseph Nash and Per
                 Larsen and Michael Franz and Stefan Brunthaler and
                 Mathias Payer",
  title =        "Control-Flow Integrity: Precision, Security, and
                 Performance",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "16:1--16:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3054924",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Memory corruption errors in C/C++ programs remain the
                 most common source of security vulnerabilities in
                 today's systems. Control-flow hijacking attacks exploit
                 memory corruption vulnerabilities to divert program
                 execution away from the intended control flow.
                 Researchers have spent more than a decade studying and
                 refining defenses based on Control-Flow Integrity
                 (CFI); this technique is now integrated into several
                 production compilers. However, so far, no study has
                 systematically compared the various proposed CFI
                 mechanisms nor is there any protocol on how to compare
                 such mechanisms. We compare a broad range of CFI
                 mechanisms using a unified nomenclature based on (i) a
                 qualitative discussion of the conceptual security
                 guarantees, (ii) a quantitative security evaluation,
                 and (iii) an empirical evaluation of their performance
                 in the same test environment. For each mechanism, we
                 evaluate (i) protected types of control-flow transfers
                 and (ii) precision of the protection for forward and
                 backward edges. For open-source, compiler-based
                 implementations, we also evaluate (iii) generated
                 equivalence classes and target sets and (iv) runtime
                 performance.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{ulMuram:2017:SRS,
  author =       "Faiz ul Muram and Huy Tran and Uwe Zdun",
  title =        "Systematic Review of Software Behavioral Model
                 Consistency Checking",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "17:1--17:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3037755",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In software development, models are often used to
                 represent multiple views of the same system. Such
                 models need to be properly related to each other in
                 order to provide a consistent description of the
                 developed system. Models may contain contradictory
                 system specifications, for instance, when they evolve
                 independently. Therefore, it is very crucial to ensure
                 that models conform to each other. In this context, we
                 focus on consistency checking of behavior models.
                 Several techniques and approaches have been proposed in
                 the existing literature to support behavioral model
                 consistency checking. This article presents a
                 Systematic Literature Review (SLR) that was carried out
                 to obtain an overview of the various consistency
                 concepts, problems, and solutions proposed regarding
                 behavior models. In our study, the identification and
                 selection of the primary studies was based on a
                 well-planned search strategy. The search process
                 identified a total of 1770 studies, out of which 96
                 have been thoroughly analyzed according to our
                 predefined SLR protocol. The SLR aims to highlight the
                 state-of-the-art of software behavior model consistency
                 checking and identify potential gaps for future
                 research. Based on research topics in selected studies,
                 we have identified seven main categories: targeted
                 software models, types of consistency checking,
                 consistency checking techniques, inconsistency
                 handling, type of study and evaluation, automation
                 support, and practical impact. The findings of the
                 systematic review also reveal suggestions for future
                 research, such as improving the quality of study design
                 and conducting evaluations, and application of research
                 outcomes in industrial settings. For this purpose,
                 appropriate strategy for inconsistency handling, better
                 tool support for consistency checking and/or
                 development tool integration should be considered in
                 future studies.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Soetens:2017:CFC,
  author =       "Quinten David Soetens and Romain Robbes and Serge
                 Demeyer",
  title =        "Changes as First-Class Citizens: a Research
                 Perspective on Modern Software Tooling",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "18:1--18:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3038926",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Software must evolve to keep up with an ever-changing
                 context, the real world. We discuss an emergent trend
                 in software evolution research revolving around the
                 central notion that drives evolution: Change. By
                 reifying change, and by modelling it as a first-class
                 entity, researchers can now analyse the complex
                 phenomenon known as software evolution with an
                 unprecedented degree of accuracy. We present a
                 Systematic Mapping Study of 86 articles to give an
                 overview on the state of the art in this area of
                 research and present a roadmap with open issues and
                 future directions.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Boyar:2017:OAA,
  author =       "Joan Boyar and Lene M. Favrholdt and Christian Kudahl
                 and Kim S. Larsen and Jesper W. Mikkelsen",
  title =        "Online Algorithms with Advice: a Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "19:1--19:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3056461",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In online scenarios requests arrive over time, and
                 each request must be serviced in an irrevocable manner
                 before the next request arrives. Online algorithms with
                 advice is an area of research where one attempts to
                 measure how much knowledge of future requests is
                 necessary to achieve a given performance level, as
                 defined by the competitive ratio. When this knowledge,
                 the advice, is obtainable, this leads to practical
                 algorithms, called semi-online algorithms. On the other
                 hand, each negative result gives robust results about
                 the limitations of a broad range of semi-online
                 algorithms. This survey explains the models for online
                 algorithms with advice, motivates the study in general,
                 presents some examples of the work that has been
                 carried out, and includes an extensive set of
                 references, organized by problem studied.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ioannidou:2017:DLA,
  author =       "Anastasia Ioannidou and Elisavet Chatzilari and Spiros
                 Nikolopoulos and Ioannis Kompatsiaris",
  title =        "Deep Learning Advances in Computer Vision with {$3$D}
                 Data: a Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "20:1--20:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3042064",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Deep learning has recently gained popularity achieving
                 state-of-the-art performance in tasks involving text,
                 sound, or image processing. Due to its outstanding
                 performance, there have been efforts to apply it in
                 more challenging scenarios, for example, 3D data
                 processing. This article surveys methods applying deep
                 learning on 3D data and provides a classification based
                 on how they exploit them. From the results of the
                 examined works, we conclude that systems employing 2D
                 views of 3D data typically surpass voxel-based (3D)
                 deep models, which however, can perform better with
                 more layers and severe data augmentation. Therefore,
                 larger-scale datasets and increased resolutions are
                 required.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hussein:2017:ILS,
  author =       "Ahmed Hussein and Mohamed Medhat Gaber and Eyad Elyan
                 and Chrisina Jayne",
  title =        "Imitation Learning: a Survey of Learning Methods",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "21:1--21:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3054912",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Imitation learning techniques aim to mimic human
                 behavior in a given task. An agent (a learning machine)
                 is trained to perform a task from demonstrations by
                 learning a mapping between observations and actions.
                 The idea of teaching by imitation has been around for
                 many years; however, the field is gaining attention
                 recently due to advances in computing and sensing as
                 well as rising demand for intelligent applications. The
                 paradigm of learning by imitation is gaining popularity
                 because it facilitates teaching complex tasks with
                 minimal expert knowledge of the tasks. Generic
                 imitation learning methods could potentially reduce the
                 problem of teaching a task to that of providing
                 demonstrations, without the need for explicit
                 programming or designing reward functions specific to
                 the task. Modern sensors are able to collect and
                 transmit high volumes of data rapidly, and processors
                 with high computational power allow fast processing
                 that maps the sensory data to actions in a timely
                 manner. This opens the door for many potential AI
                 applications that require real-time perception and
                 reaction such as humanoid robots, self-driving
                 vehicles, human computer interaction, and computer
                 games, to name a few. However, specialized algorithms
                 are needed to effectively and robustly learn models as
                 learning by imitation poses its own set of challenges.
                 In this article, we survey imitation learning methods
                 and present design options in different steps of the
                 learning process. We introduce a background and
                 motivation for the field as well as highlight
                 challenges specific to the imitation problem. Methods
                 for designing and evaluating imitation learning tasks
                 are categorized and reviewed. Special attention is
                 given to learning methods in robotics and games as
                 these domains are the most popular in the literature
                 and provide a wide array of problems and methodologies.
                 We extensively discuss combining imitation learning
                 approaches using different sources and methods, as well
                 as incorporating other motion learning methods to
                 enhance imitation. We also discuss the potential impact
                 on industry, present major applications, and highlight
                 current and future research directions.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gudmundsson:2017:STA,
  author =       "Joachim Gudmundsson and Michael Horton",
  title =        "Spatio-Temporal Analysis of Team Sports",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "22:1--22:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3054132",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Team-based invasion sports such as football,
                 basketball, and hockey are similar in the sense that
                 the players are able to move freely around the playing
                 area and that player and team performance cannot be
                 fully analysed without considering the movements and
                 interactions of all players as a group.
                 State-of-the-art object tracking systems now produce
                 spatio-temporal traces of player trajectories with high
                 definition and high frequency, and this, in turn, has
                 facilitated a variety of research efforts, across many
                 disciplines, to extract insight from the trajectories.
                 We survey recent research efforts that use
                 spatio-temporal data from team sports as input and
                 involve non-trivial computation. This article
                 categorises the research efforts in a coherent
                 framework and identifies a number of open research
                 questions.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gomes:2017:SEL,
  author =       "Heitor Murilo Gomes and Jean Paul Barddal and
                 Fabr{\'\i}cio Enembreck and Albert Bifet",
  title =        "A Survey on Ensemble Learning for Data Stream
                 Classification",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "23:1--23:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3054925",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Ensemble-based methods are among the most widely used
                 techniques for data stream classification. Their
                 popularity is attributable to their good performance in
                 comparison to strong single learners while being
                 relatively easy to deploy in real-world applications.
                 Ensemble algorithms are especially useful for data
                 stream learning as they can be integrated with drift
                 detection algorithms and incorporate dynamic updates,
                 such as selective removal or addition of classifiers.
                 This work proposes a taxonomy for data stream ensemble
                 learning as derived from reviewing over 60 algorithms.
                 Important aspects such as combination, diversity, and
                 dynamic updates, are thoroughly discussed. Additional
                 contributions include a listing of popular open-source
                 tools and a discussion about current data stream
                 research challenges and how they relate to ensemble
                 learning (big data streams, concept evolution, feature
                 drifts, temporal dependencies, and others).",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Singh:2017:SCS,
  author =       "Amit Kumar Singh and Piotr Dziurzanski and Hashan
                 Roshantha Mendis and Leandro Soares Indrusiak",
  title =        "A Survey and Comparative Study of Hard and Soft
                 Real-Time Dynamic Resource Allocation Strategies for
                 {Multi-\slash} Many-Core Systems",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "24:1--24:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3057267",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Multi-/many-core systems are envisioned to satisfy the
                 ever-increasing performance requirements of complex
                 applications in various domains such as embedded and
                 high-performance computing. Such systems need to cater
                 to increasingly dynamic workloads, requiring efficient
                 dynamic resource allocation strategies to satisfy hard
                 or soft real-time constraints. This article provides an
                 extensive survey of hard and soft real-time dynamic
                 resource allocation strategies proposed since the
                 mid-1990s and highlights the emerging trends for
                 multi-/many-core systems. The survey covers a taxonomy
                 of the resource allocation strategies and considers
                 their various optimization objectives, which have been
                 used to provide comprehensive comparison. The
                 strategies employ various principles, such as market
                 and biological concepts, to perform the optimizations.
                 The trend followed by the resource allocation
                 strategies, open research challenges, and likely
                 emerging research directions have also been provided.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Yadollahi:2017:CST,
  author =       "Ali Yadollahi and Ameneh Gholipour Shahraki and Osmar
                 R. Zaiane",
  title =        "Current State of Text Sentiment Analysis from Opinion
                 to Emotion Mining",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "25:1--25:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3057270",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Sentiment analysis from text consists of extracting
                 information about opinions, sentiments, and even
                 emotions conveyed by writers towards topics of
                 interest. It is often equated to opinion mining, but it
                 should also encompass emotion mining. Opinion mining
                 involves the use of natural language processing and
                 machine learning to determine the attitude of a writer
                 towards a subject. Emotion mining is also using similar
                 technologies but is concerned with detecting and
                 classifying writers emotions toward events or topics.
                 Textual emotion-mining methods have various
                 applications, including gaining information about
                 customer satisfaction, helping in selecting teaching
                 materials in e-learning, recommending products based on
                 users emotions, and even predicting mental-health
                 disorders. In surveys on sentiment analysis, which are
                 often old or incomplete, the strong link between
                 opinion mining and emotion mining is understated. This
                 motivates the need for a different and new perspective
                 on the literature on sentiment analysis, with a focus
                 on emotion mining. We present the state-of-the-art
                 methods and propose the following contributions: (1) a
                 taxonomy of sentiment analysis; (2) a survey on
                 polarity classification methods and resources,
                 especially those related to emotion mining; (3) a
                 complete survey on emotion theories and emotion-mining
                 research; and (4) some useful resources, including
                 lexicons and datasets.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Weerasiri:2017:TSC,
  author =       "Denis Weerasiri and Moshe Chai Barukh and Boualem
                 Benatallah and Quan Z. Sheng and Rajiv Ranjan",
  title =        "A Taxonomy and Survey of Cloud Resource Orchestration
                 Techniques",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "26:1--26:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3054177",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Cloud services and applications prove indispensable
                 amid today's modern utility-based computing. The cloud
                 has displayed a disruptive and growing impact on
                 everyday computing tasks. However, facilitating the
                 orchestration of cloud resources to build such cloud
                 services and applications is yet to unleash its entire
                 magnitude of power. Accordingly, it is paramount to
                 devise a unified and comprehensive analysis framework
                 to accelerate fundamental understanding of cloud
                 resource orchestration in terms of concepts, paradigms,
                 languages, models, and tools. This framework is
                 essential to empower effective research, comprehension,
                 comparison, and selection of cloud resource
                 orchestration models, languages, platforms, and tools.
                 This article provides such a comprehensive framework
                 while analyzing the relevant state of the art in cloud
                 resource orchestration from a novel and holistic
                 viewpoint.",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mittal:2017:STC,
  author =       "Sparsh Mittal",
  title =        "A Survey of Techniques for Cache Partitioning in
                 Multicore Processors",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "27:1--27:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3062394",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "As the number of on-chip cores and memory demands of
                 applications increase, judicious management of cache
                 resources has become not merely attractive but
                 imperative. Cache partitioning, that is, dividing cache
                 space between applications based on their memory
                 demands, is a promising approach to provide capacity
                 benefits of shared cache with performance isolation of
                 private caches. However, naively partitioning the cache
                 may lead to performance loss, unfairness, and lack of
                 quality-of-service guarantees. It is clear that
                 intelligent techniques are required for realizing the
                 full potential of cache partitioning. In this article,
                 we present a survey of techniques for partitioning
                 shared caches in multicore processors. We categorize
                 the techniques based on important characteristics and
                 provide a bird's eye view of the field of cache
                 partitioning.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Luo:2017:SEP,
  author =       "Hanjiang Luo and Kaishun Wu and Rukhsana Ruby and Feng
                 Hong and Zhongwen Guo and Lionel M. Ni",
  title =        "Simulation and Experimentation Platforms for
                 Underwater Acoustic Sensor Networks: Advancements and
                 Challenges",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "28:1--28:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3040990",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Ocean and water basically cover the major parts of our
                 planet. To obtain the best utilization of the
                 underlying resources on these parts of the Earth,
                 people have made some research advancements.
                 Specifically, the research on underwater wireless
                 acoustic sensor networks (UWA-SNs) has made great
                 progress. However, wide deployment of UWA-SNs is far
                 from a reality due to several reasons. One important
                 reason is that offshore deployment and field-level
                 experiments of ocean-centric applications are both
                 expensive and labor intensive. Other alternatives to
                 attain this objective are to conduct simulation or
                 experimentation that can reduce cost and accelerate the
                 research activities and their outcomes. However,
                 designing efficient and reliable simulation and
                 experimentation platforms have proven to be more
                 challenging beyond the expectation. In this article, we
                 explore the main techniques (including their pros and
                 cons) and components to develop simulation and
                 experimentation platforms and provide a comprehensive
                 survey report in this area. We classify simulation and
                 experimentation platforms based on some typical
                 criteria and then provide useful guidelines for
                 researchers on choosing suitable platforms in
                 accordance with their requirements. Finally, we address
                 some open and un-resolved issues in this context and
                 provide some suggestions on future research.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kazmi:2017:ERT,
  author =       "Rafaqut Kazmi and Dayang N. A. Jawawi and Radziah
                 Mohamad and Imran Ghani",
  title =        "Effective Regression Test Case Selection: a Systematic
                 Literature Review",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "29:1--29:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3057269",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Regression test case selection techniques attempt to
                 increase the testing effectiveness based on the
                 measurement capabilities, such as cost, coverage, and
                 fault detection. This systematic literature review
                 presents state-of-the-art research in effective
                 regression test case selection techniques. We examined
                 47 empirical studies published between 2007 and 2015.
                 The selected studies are categorized according to the
                 selection procedure, empirical study design, and
                 adequacy criteria with respect to their effectiveness
                 measurement capability and methods used to measure the
                 validity of these results. The results showed that
                 mining and learning-based regression test case
                 selection was reported in 39\% of the studies, unit
                 level testing was reported in 18\% of the studies, and
                 object-oriented environment (Java) was used in 26\% of
                 the studies. Structural faults, the most common target,
                 was used in 55\% of the studies. Overall, only 39\% of
                 the studies conducted followed experimental guidelines
                 and are reproducible. There are 7 different cost
                 measures, 13 different coverage types, and 5
                 fault-detection metrics reported in these studies. It
                 is also observed that 70\% of the studies being
                 analyzed used cost as the effectiveness measure
                 compared to 31\% that used fault-detection capability
                 and 16\% that used coverage.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Do:2017:GTC,
  author =       "Cuong T. Do and Nguyen H. Tran and Choongseon Hong and
                 Charles A. Kamhoua and Kevin A. Kwiat and Erik Blasch
                 and Shaolei Ren and Niki Pissinou and Sundaraja
                 Sitharama Iyengar",
  title =        "Game Theory for Cyber Security and Privacy",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "30:1--30:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3057268",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In this survey, we review the existing game-theoretic
                 approaches for cyber security and privacy issues,
                 categorizing their application into two classes,
                 security and privacy. To show how game theory is
                 utilized in cyberspace security and privacy, we select
                 research regarding three main applications:
                 cyber-physical security, communication security, and
                 privacy. We present game models, features, and
                 solutions of the selected works and describe their
                 advantages and limitations from design to
                 implementation of the defense mechanisms. We also
                 identify some emerging trends and topics for future
                 research. This survey not only demonstrates how to
                 employ game-theoretic approaches to security and
                 privacy but also encourages researchers to employ game
                 theory to establish a comprehensive understanding of
                 emerging security and privacy problems in cyberspace
                 and potential solutions.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kafi:2017:SRP,
  author =       "Mohamed Amine Kafi and Jalel Ben Othman and Nadjib
                 Badache",
  title =        "A Survey on Reliability Protocols in Wireless Sensor
                 Networks",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "2",
  pages =        "31:1--31:??",
  month =        jun,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3064004",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:20 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Wireless Sensor Network (WSN) applications have become
                 more and more attractive with the miniaturization of
                 circuits and the large variety of sensors. The
                 different application domains, especially critical
                 fields of WSN use, make the reliability of data
                 acquisition and communication a hot research field that
                 must be tackled efficiently. Indeed, the quality of
                 largely used, cheap-cost wireless sensors and their
                 scarce energy supply support these reliability
                 challenges that lead to data loss or corruption. For
                 solving this problem, the conception of a reliability
                 mechanism that detects these shortcomings and recovers
                 to them becomes necessary. In this article, we present
                 a survey on existing reliability protocols conceived
                 especially for WSNs due to their special features. The
                 deep classification and discussion in this study allow
                 for understanding the pros and cons of state-of-the-art
                 works in order to enhance the existing schemes and fill
                 the gaps. We have classified the works according to the
                 required level of reliability, the manner to identify
                 the origins of the lack of reliability, and the control
                 to recover this lack of reliability. Across the
                 discussion along this study, we deduce that the
                 cross-layer design between MAC, routing, and transport
                 layers presents a good concept to efficiently overcome
                 the different reliability holes.",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Perera:2017:FCS,
  author =       "Charith Perera and Yongrui Qin and Julio C. Estrella
                 and Stephan Reiff-Marganiec and Athanasios V.
                 Vasilakos",
  title =        "Fog Computing for Sustainable Smart Cities: a Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "32:1--32:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3057266",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The Internet of Things (IoT) aims to connect billions
                 of smart objects to the Internet, which can bring a
                 promising future to smart cities. These objects are
                 expected to generate large amounts of data and send the
                 data to the cloud for further processing, especially
                 for knowledge discovery, in order that appropriate
                 actions can be taken. However, in reality sensing all
                 possible data items captured by a smart object and then
                 sending the complete captured data to the cloud is less
                 useful. Further, such an approach would also lead to
                 resource wastage (e.g., network, storage, etc.). The
                 Fog (Edge) computing paradigm has been proposed to
                 counterpart the weakness by pushing processes of
                 knowledge discovery using data analytics to the edges.
                 However, edge devices have limited computational
                 capabilities. Due to inherited strengths and
                 weaknesses, neither Cloud computing nor Fog computing
                 paradigm addresses these challenges alone. Therefore,
                 both paradigms need to work together in order to build
                 a sustainable IoT infrastructure for smart cities. In
                 this article, we review existing approaches that have
                 been proposed to tackle the challenges in the Fog
                 computing domain. Specifically, we describe several
                 inspiring use case scenarios of Fog computing, identify
                 ten key characteristics and common features of Fog
                 computing, and compare more than 30 existing research
                 efforts in this domain. Based on our review, we further
                 identify several major functionalities that ideal Fog
                 computing platforms should support and a number of open
                 challenges toward implementing them, to shed light on
                 future research directions on realizing Fog computing
                 for building sustainable smart cities.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Al-Helali:2017:AOH,
  author =       "Baligh M. Al-Helali and Sabri A. Mahmoud",
  title =        "{Arabic Online Handwriting Recognition (AOHR)}: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "33:1--33:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3060620",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article comprehensively surveys Arabic Online
                 Handwriting Recognition (AOHR). We address the
                 challenges posed by online handwriting recognition,
                 including ligatures, dots and diacritic problems,
                 online/offline touching of text, and geometric
                 variations. Then we present a general model of an AOHR
                 system that incorporates the different phases of an
                 AOHR system. We summarize the main AOHR databases and
                 identify their uses and limitations. Preprocessing
                 techniques that are used in AOHR, viz. normalization,
                 smoothing, de-hooking, baseline identification, and
                 delayed stroke processing, are presented with
                 illustrative examples. We discuss different techniques
                 for Arabic online handwriting segmentation at the
                 character and morpheme levels and identify their
                 limitations. Feature extraction techniques that are
                 used in AOHR are discussed and their challenges
                 identified. We address the classification techniques of
                 non-cursive (characters and digits) and cursive Arabic
                 online handwriting and analyze their applications. We
                 discuss different classification techniques, viz.
                 structural approaches, Support Vector Machine (SVM),
                 Fuzzy SVM, Neural Networks, Hidden Markov Model,
                 Genetic algorithms, decision trees, and rule-based
                 systems, and analyze their performance. Post-processing
                 techniques are also discussed. Several tables that
                 summarize the surveyed publications are provided for
                 ease of reference and comparison. We summarize the
                 current limitations and difficulties of AOHR and future
                 directions of research.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Yau:2017:SRL,
  author =       "Kok-Lim Alvin Yau and Junaid Qadir and Hooi Ling Khoo
                 and Mee Hong Ling and Peter Komisarczuk",
  title =        "A Survey on Reinforcement Learning Models and
                 Algorithms for Traffic Signal Control",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "34:1--34:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3068287",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Traffic congestion has become a vexing and complex
                 issue in many urban areas. Of particular interest are
                 the intersections where traffic bottlenecks are known
                 to occur despite being traditionally signalized.
                 Reinforcement learning (RL), which is an artificial
                 intelligence approach, has been adopted in traffic
                 signal control for monitoring and ameliorating traffic
                 congestion. RL enables autonomous decision makers
                 (e.g., traffic signal controllers) to observe, learn,
                 and select the optimal action (e.g., determining the
                 appropriate traffic phase and its timing) to manage
                 traffic such that system performance is improved. This
                 article reviews various RL models and algorithms
                 applied to traffic signal control in the aspects of the
                 representations of the RL model (i.e., state, action,
                 and reward), performance measures, and complexity to
                 establish a foundation for further investigation in
                 this research field. Open issues are presented toward
                 the end of this article to discover new research areas
                 with the objective to spark new interest in this
                 research field.",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hong:2017:GVS,
  author =       "Cheol-Ho Hong and Ivor Spence and Dimitrios S.
                 Nikolopoulos",
  title =        "{GPU} Virtualization and Scheduling Methods: a
                 Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "35:1--35:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3068281",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "The integration of graphics processing units (GPUs) on
                 high-end compute nodes has established a new
                 accelerator-based heterogeneous computing model, which
                 now permeates high-performance computing. The same
                 paradigm nevertheless has limited adoption in cloud
                 computing or other large-scale distributed computing
                 paradigms. Heterogeneous computing with GPUs can
                 benefit the Cloud by reducing operational costs and
                 improving resource and energy efficiency. However, such
                 a paradigm shift would require effective methods for
                 virtualizing GPUs, as well as other accelerators. In
                 this survey article, we present an extensive and
                 in-depth survey of GPU virtualization techniques and
                 their scheduling methods. We review a wide range of
                 virtualization techniques implemented at the GPU
                 library, driver, and hardware levels. Furthermore, we
                 review GPU scheduling methods that address performance
                 and fairness issues between multiple virtual machines
                 sharing GPUs. We believe that our survey delivers a
                 perspective on the challenges and opportunities for
                 virtualization of heterogeneous computing
                 environments.",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Khan:2017:CDR,
  author =       "Muhammad Murad Khan and Roliana Ibrahim and Imran
                 Ghani",
  title =        "Cross Domain Recommender Systems: a Systematic
                 Literature Review",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "36:1--36:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3073565",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Cross domain recommender systems (CDRS) can assist
                 recommendations in a target domain based on knowledge
                 learned from a source domain. CDRS consists of three
                 building blocks: domain, user-item overlap scenarios,
                 and recommendation tasks. The objective of this
                 research is to identify the most widely used CDRS
                 building-block definitions, identify common features
                 between them, classify current research in the frame of
                 identified definitions, group together research with
                 respect to algorithm types, present existing problems,
                 and recommend future directions for CDRS research. To
                 achieve this objective, we have conducted a systematic
                 literature review of 94 shortlisted studies. We
                 classified the selected studies using the tag-based
                 approach and designed classification grids. Using
                 classification grids, it was found that the
                 category-domain contributed a maximum of 62\%, whereas
                 the time domain contributed at least 3\%. User-item
                 overlaps were found to have equal contribution. Single
                 target domain recommendation task was found at a
                 maximum of 78\%, whereas cross-domain recommendation
                 task had a minor influence at only 10\%. MovieLens
                 contributed the most at 22\%, whereas Yahoo-music
                 provided 1\% between 29 datasets. Factorization-based
                 algorithms contributed a total of 37\%, whereas
                 semantics-based algorithms contributed 6\% among seven
                 types of identified algorithm groups. Finally, future
                 directions were grouped into five categories.",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{OBrien:2017:SPE,
  author =       "Kenneth O'Brien and Ilia Pietri and Ravi Reddy and
                 Alexey Lastovetsky and Rizos Sakellariou",
  title =        "A Survey of Power and Energy Predictive Models in
                 {HPC} Systems and Applications",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "37:1--37:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3078811",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Power and energy efficiency are now critical concerns
                 in extreme-scale high-performance scientific computing.
                 Many extreme-scale computing systems today (for
                 example: Top500) have tight integration of multicore
                 CPU processors and accelerators (mix of Graphical
                 Processing Units, Intel Xeon Phis, or Field
                 Programmable Gate Arrays) empowering them to provide
                 not just unprecedented computational power but also to
                 address these concerns. However, such integration
                 renders these systems highly heterogeneous and
                 hierarchical, thereby necessitating design of novel
                 performance, power, and energy models to accurately
                 capture these inherent characteristics. There are now
                 several extensive research efforts focusing exclusively
                 on power and energy efficiency models and techniques
                 for the processors composing these extreme-scale
                 computing systems. This article synthesizes these
                 research efforts with absolute concentration on
                 predictive power and energy models and prime emphasis
                 on node architecture. Through this survey, we also
                 intend to highlight the shortcomings of these models to
                 correctly and comprehensively predict the power and
                 energy consumptions by taking into account the
                 hierarchical and heterogeneous nature of these tightly
                 integrated high-performance computing systems.",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rheinlander:2017:OCD,
  author =       "Astrid Rheinl{\"a}nder and Ulf Leser and Goetz
                 Graefe",
  title =        "Optimization of Complex Dataflows with User-Defined
                 Functions",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "38:1--38:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3078752",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In many fields, recent years have brought a sharp rise
                 in the size of the data to be analyzed and the
                 complexity of the analysis to be performed. Such
                 analyses are often described as dataflows specified in
                 declarative dataflow languages. A key technique to
                 achieve scalability for such analyses is the
                 optimization of the declarative programs; however, many
                 real-life dataflows are dominated by user-defined
                 functions (UDFs) to perform, for instance, text
                 analysis, graph traversal, classification, or
                 clustering. This calls for specific optimization
                 techniques as the semantics of such UDFs are unknown to
                 the optimizer. In this article, we survey techniques
                 for optimizing dataflows with UDFs. We consider methods
                 developed over decades of research in relational
                 database systems as well as more recent approaches
                 spurred by the popularity of Map/Reduce-style data
                 processing frameworks. We present techniques for
                 syntactical dataflow modification, approaches for
                 inferring semantics and rewrite options for UDFs, and
                 methods for dataflow transformations both on the
                 logical and the physical levels. Furthermore, we give a
                 comprehensive overview on declarative dataflow
                 languages for Big Data processing systems from the
                 perspective of their build-in optimization techniques.
                 Finally, we highlight open research challenges with the
                 intention to foster more research into optimizing
                 dataflows that contain UDFs.",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Barforoush:2017:NCF,
  author =       "Ahmad Barforoush and Hossein Shirazi and Hojjat
                 Emami",
  title =        "A New Classification Framework to Evaluate the Entity
                 Profiling on the {Web}: Past, Present and Future",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "39:1--39:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3066904",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Recently, we have witnessed entity profiling (EP)
                 becoming increasingly one of the most important topics
                 in information extraction, personalized applications,
                 and web data analysis. EP aims to identify, extract,
                 and represent a compact summary of valuable information
                 about an entity based on the data related to it. To
                 determine how EP systems have developed, during the
                 last few years, this article reviews EP systems through
                 a survey of the literature, from 2000 to 2015. To
                 fulfill this aim, we introduce a comparison framework
                 to compare and classify EP systems. Our comparison
                 framework is composed of thirteen criteria that
                 include: profiling source, the entity being modeled,
                 the information that constitutes the profile,
                 representation schema, profile construction technique,
                 scale, scope/target domain, language, updating
                 mechanism, enrichment technique, dynamicity, evaluation
                 method, and application among others. Then, using the
                 comparison framework, we discuss the recent development
                 of the field and list some of the open problems and
                 main trends that have emerged in EP to provide a proper
                 guideline for researchers to develop or use robust
                 profiling systems with suitable features according to
                 their needs.",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Poh:2017:SSE,
  author =       "Geong Sen Poh and Ji-Jian Chin and Wei-Chuen Yau and
                 Kim-Kwang Raymond Choo and Moesfa Soeheila Mohamad",
  title =        "Searchable Symmetric Encryption: Designs and
                 Challenges",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "40:1--40:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3064005",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Searchable Symmetric Encryption (SSE) when deployed in
                 the cloud allows one to query encrypted data without
                 the risk of data leakage. Despite the widespread
                 interest, existing surveys do not examine in detail how
                 SSE's underlying structures are designed and how these
                 result in the many properties of a SSE scheme. This is
                 the gap we seek to address, as well as presenting
                 recent state-of-the-art advances on SSE. Specifically,
                 we present a general framework and believe the
                 discussions may lead to insights for potential new
                 designs. We draw a few observations. First, most
                 schemes use index table, where optimal index size and
                 sublinear search can be achieved using an inverted
                 index. Straightforward updating can only be achieved
                 using direct index, but search time would be linear. A
                 recent trend is the combinations of index table, and
                 tree, deployed for efficient updating and storage.
                 Secondly, mechanisms from related fields such as
                 Oblivious RAM (ORAM) have been integrated to reduce
                 leakages. However, using these mechanisms to minimise
                 leakages in schemes with richer functionalities (e.g.,
                 ranked, range) is relatively unexplored. Thirdly, a new
                 approach (e.g., multiple servers) is required to
                 mitigate new and emerging attacks on leakage. Lastly,
                 we observe that a proposed index may not be practically
                 efficient when implemented, where I/O access must be
                 taken into consideration.",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ye:2017:SMD,
  author =       "Yanfang Ye and Tao Li and Donald Adjeroh and S.
                 Sitharama Iyengar",
  title =        "A Survey on Malware Detection Using Data Mining
                 Techniques",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "41:1--41:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3073559",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In the Internet age, malware (such as viruses,
                 trojans, ransomware, and bots) has posed serious and
                 evolving security threats to Internet users. To protect
                 legitimate users from these threats, anti-malware
                 software products from different companies, including
                 Comodo, Kaspersky, Kingsoft, and Symantec, provide the
                 major defense against malware. Unfortunately, driven by
                 the economic benefits, the number of new malware
                 samples has explosively increased: anti-malware vendors
                 are now confronted with millions of potential malware
                 samples per year. In order to keep on combating the
                 increase in malware samples, there is an urgent need to
                 develop intelligent methods for effective and efficient
                 malware detection from the real and large daily sample
                 collection. In this article, we first provide a brief
                 overview on malware as well as the anti-malware
                 industry, and present the industrial needs on malware
                 detection. We then survey intelligent malware detection
                 methods. In these methods, the process of detection is
                 usually divided into two stages: feature extraction and
                 classification/clustering. The performance of such
                 intelligent malware detection approaches critically
                 depend on the extracted features and the methods for
                 classification/clustering. We provide a comprehensive
                 investigation on both the feature extraction and the
                 classification/clustering techniques. We also discuss
                 the additional issues and the challenges of malware
                 detection using data mining techniques and finally
                 forecast the trends of malware development.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Keiren:2017:CMT,
  author =       "Jeroen J. A. Keiren and Peter Fontana and Rance
                 Cleaveland",
  title =        "Corrections to {``A Menagerie of Timed Automata''}",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "42:1--42:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3078809",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Fontana:2013:MTA}.",
  abstract =     "This note corrects a technical error in the ACM
                 Computing Surveys article mentioned in the title. The
                 flaw involved constructions for showing that timed
                 automata with urgent locations have the same
                 expressiveness as timed automata that allow false
                 location invariants. Corrected constructions are
                 presented in this note, and the affected results are
                 reproved.",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cao:2017:DSC,
  author =       "Longbing Cao",
  title =        "Data Science: a Comprehensive Overview",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "43:1--43:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3076253",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The 21st century has ushered in the age of big data
                 and data economy, in which data DNA, which carries
                 important knowledge, insights, and potential, has
                 become an intrinsic constituent of all data-based
                 organisms. An appropriate understanding of data DNA and
                 its organisms relies on the new field of data science
                 and its keystone, analytics. Although it is widely
                 debated whether big data is only hype and buzz, and
                 data science is still in a very early phase,
                 significant challenges and opportunities are emerging
                 or have been inspired by the research, innovation,
                 business, profession, and education of data science.
                 This article provides a comprehensive survey and
                 tutorial of the fundamental aspects of data science:
                 the evolution from data analysis to data science, the
                 data science concepts, a big picture of the era of data
                 science, the major challenges and directions in data
                 innovation, the nature of data analytics, new
                 industrialization and service opportunities in the data
                 economy, the profession and competency of data
                 education, and the future of data science. This article
                 is the first in the field to draw a comprehensive big
                 picture, in addition to offering rich observations,
                 lessons, and thinking about data science and
                 analytics.",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Acquisti:2017:NPS,
  author =       "Alessandro Acquisti and Idris Adjerid and Rebecca
                 Balebako and Laura Brandimarte and Lorrie Faith Cranor
                 and Saranga Komanduri and Pedro Giovanni Leon and
                 Norman Sadeh and Florian Schaub and Manya Sleeper and
                 Yang Wang and Shomir Wilson",
  title =        "Nudges for Privacy and Security: Understanding and
                 Assisting Users' Choices Online",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "44:1--44:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3054926",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Advancements in information technology often task
                 users with complex and consequential privacy and
                 security decisions. A growing body of research has
                 investigated individuals' choices in the presence of
                 privacy and information security tradeoffs, the
                 decision-making hurdles affecting those choices, and
                 ways to mitigate such hurdles. This article provides a
                 multi-disciplinary assessment of the literature
                 pertaining to privacy and security decision making. It
                 focuses on research on assisting individuals' privacy
                 and security choices with soft paternalistic
                 interventions that nudge users toward more beneficial
                 choices. The article discusses potential benefits of
                 those interventions, highlights their shortcomings, and
                 identifies key ethical, design, and research
                 challenges.",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Li:2017:DDTb,
  author =       "Tao Li and Chunqiu Zeng and Yexi Jiang and Wubai Zhou
                 and Liang Tang and Zheng Liu and Yue Huang",
  title =        "Data-Driven Techniques in Computing System
                 Management",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "45:1--45:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3092697",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Modern forms of computing systems are becoming
                 progressively more complex, with an increasing number
                 of heterogeneous hardware and software components. As a
                 result, it is quite challenging to manage these complex
                 systems and meet the requirements in manageability,
                 dependability, and performance that are demanded by
                 enterprise customers. This survey presents a variety of
                 data-driven techniques and applications with a focus on
                 computing system management. In particular, the survey
                 introduces intelligent methods for event generation
                 that can transform diverse log data sources into
                 structured events, reviews different types of event
                 patterns and the corresponding event-mining techniques,
                 and summarizes various event summarization methods and
                 data-driven approaches for problem diagnosis in system
                 management. We hope this survey will provide a good
                 overview for data-driven techniques in computing system
                 management.",
  acknowledgement = ack-nhfb,
  articleno =    "45",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Morin:2017:EA,
  author =       "Pat Morin and Wolfgang Mulzer and Tommy Reddad",
  title =        "Encoding Arguments",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "46:1--46:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3084288",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Many proofs in discrete mathematics and theoretical
                 computer science are based on the probabilistic method.
                 To prove the existence of a good object, we pick a
                 random object and show that it is bad with low
                 probability. This method is effective, but the
                 underlying probabilistic machinery can be daunting.
                 ``Encoding arguments'' provide an alternative
                 presentation in which probabilistic reasoning is
                 encapsulated in a ``uniform encoding lemma.'' This
                 lemma provides an upper bound on the probability of an
                 event using the fact that a uniformly random choice
                 from a set of size n cannot be encoded with fewer than
                 log$_2$ n bits on average. With the lemma, the argument
                 reduces to devising an encoding where bad objects have
                 short codewords. In this expository article, we
                 describe the basic method and provide a simple tutorial
                 on how to use it. After that, we survey many
                 applications to classic problems from discrete
                 mathematics and computer science. We also give a
                 generalization for the case of non-uniform
                 distributions, as well as a rigorous justification for
                 the use of non-integer codeword lengths in encoding
                 arguments. These latter two results allow encoding
                 arguments to be applied more widely and to produce
                 tighter results.",
  acknowledgement = ack-nhfb,
  articleno =    "46",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Storer:2017:BCS,
  author =       "Tim Storer",
  title =        "Bridging the Chasm: a Survey of Software Engineering
                 Practice in Scientific Programming",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "47:1--47:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3084225",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The use of software is pervasive in all fields of
                 science. Associated software development efforts may be
                 very large, long lived, and complex, requiring the
                 commitment of significant resources. However, several
                 authors have argued that the ``gap'' or ``chasm''
                 between software engineering and scientific programming
                 is a serious risk to the production of reliable
                 scientific results, as demonstrated in a number of case
                 studies. This article reviews the research that
                 addresses the gap, exploring how both software
                 engineering and research practice may need to evolve to
                 accommodate the use of software in science.",
  acknowledgement = ack-nhfb,
  articleno =    "47",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Granatyr:2017:NAT,
  author =       "Jones Granatyr and Nardine Osman and Jo{\~a}o Dias and
                 Maria Augusta {Silveira Netto Nunes} and Judith
                 Masthoff and Fabr{\'\i}cio Enembreck and Otto Robert
                 Lessing and Carles Sierra and Ana Maria Paiva and Edson
                 Em{\'\i}lio Scalabrin",
  title =        "The Need for Affective Trust Applied to Trust and
                 Reputation Models",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "48:1--48:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3078833",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Trust allows the behavior evaluation of individuals by
                 setting confidence values, which are used in decisions
                 about whether or not to interact. They have been used
                 in several fields, and many trust and reputation models
                 were developed recently. We perceived that most of them
                 were built upon the numeric and cognitive paradigms,
                 which do not use affective aspects to build trust or
                 help in decision making. Studies in psychology argued
                 that personality, emotions, and mood are important in
                 decision making and can change the behaviors of
                 individuals. Based on that, we present links between
                 trust and affective computing, showing relations of
                 trust dimensions found in trust models with affective
                 aspects, and presenting why affective computing
                 approaches fit trust issues often addressed by research
                 in this field. We also discuss trust relationships and
                 decision making, emotions, and personality. Affective
                 computing concepts have been used in a dispersed way
                 and specifically in some models, so we aim to bring
                 them together to encourage the growth of fuller trust
                 models similar to those used by humans. We aim to find
                 relations between both fields so it will be possible to
                 employ such concepts to develop trust models using this
                 new paradigm, defined as the affective paradigm.",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kaur:2017:IPA,
  author =       "Kiranbir Kaur and Sandeep Sharma and Karanjeet Singh
                 Kahlon",
  title =        "Interoperability and Portability Approaches in
                 Inter-Connected Clouds: a Review",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "49:1--49:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3092698",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Inter-connected cloud computing is an inherent
                 evolution of Cloud Computing. Numerous benefits
                 provided by connecting clouds have garnered attraction
                 from the academic as well as the industry sector. Just
                 as every new evolution faces challenges,
                 inter-connected clouds have their own set of challenges
                 such as security, monitoring, authorization and
                 identity management, vendor lock-in, and so forth. This
                 article considers the vendor lock-in problem, which is
                 a direct consequence of the lack of interoperability
                 and portability. An extensive literature review by
                 surveying more than 120 papers has been done to analyze
                 and categorize various solutions suggested in
                 literature for solving the interoperability and
                 portability issues of inter-connected clouds. After
                 categorizing the solutions, the literature has been
                 mapped to a specific solution and a comparative
                 analysis of the papers under the same solution has been
                 done. The term ``inter-connected clouds'' has been used
                 generically in this article to refer to any
                 collaboration of clouds which may be from the user side
                 (Multi-clouds or Aggregated service by Broker) or the
                 provider side (Federated clouds or Hybrid clouds).
                 Lastly, two closely related issues (Brokers and
                 Meta-scheduling) and the remaining challenges of
                 inter-connected clouds are discussed.",
  acknowledgement = ack-nhfb,
  articleno =    "49",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Psychou:2017:CRT,
  author =       "Georgia Psychou and Dimitrios Rodopoulos and Mohamed
                 M. Sabry and Tobias Gemmeke and David Atienza and
                 Tobias G. Noll and Francky Catthoor",
  title =        "Classification of Resilience Techniques Against
                 Functional Errors at Higher Abstraction Layers of
                 Digital Systems",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "50:1--50:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3092699",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Nanoscale technology nodes bring reliability concerns
                 back to the center stage of digital system design. A
                 systematic classification of approaches that increase
                 system resilience in the presence of functional
                 hardware (HW)-induced errors is presented, dealing with
                 higher system abstractions, such as the
                 (micro)architecture, the mapping, and platform software
                 (SW). The field is surveyed in a systematic way based
                 on nonoverlapping categories, which add insight into
                 the ongoing work by exposing similarities and
                 differences. HW and SW solutions are discussed in a
                 similar fashion so that interrelationships become
                 apparent. The presented categories are illustrated by
                 representative literature examples to illustrate their
                 properties. Moreover, it is demonstrated how hybrid
                 schemes can be decomposed into their primitive
                 components.",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Soulier:2017:CSI,
  author =       "Laure Soulier and Lynda Tamine",
  title =        "On the Collaboration Support in Information
                 Retrieval",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "51:1--51:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3092696",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Collaborative Information Retrieval (CIR) is a
                 well-known setting in which explicit collaboration
                 occurs among a group of users working together to solve
                 a shared information need. This type of collaboration
                 has been deemed as beneficial for complex or
                 exploratory search tasks. With the multiplicity of
                 factors impacting on the search effectiveness (e.g.,
                 collaborators' interactions or the individual
                 perception of the shared information need), CIR gives
                 rise to several challenges in terms of collaboration
                 support through algorithmic approaches. More
                 particularly, CIR should allow us to satisfy the shared
                 information need by optimizing the collaboration within
                 the search session over all collaborators, while
                 ensuring that both mutually beneficial goals are
                 reached and that the cognitive cost of the
                 collaboration does not impact the search effectiveness.
                 In this survey, we propose an overview of CIR with a
                 particular focus on the collaboration support through
                 algorithmic approaches. The objective of this article
                 is (a) to organize previous empirical studies analyzing
                 collaborative search with the goal to provide useful
                 design implications for CIR models, (b) to give a
                 picture of the CIR area by distinguishing two main
                 categories of models using the collaboration mediation
                 axis, and (c) to point out potential perspectives in
                 the domain.",
  acknowledgement = ack-nhfb,
  articleno =    "51",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Schoknecht:2017:SBP,
  author =       "Andreas Schoknecht and Tom Thaler and Peter Fettke and
                 Andreas Oberweis and Ralf Laue",
  title =        "Similarity of Business Process Models --- A
                 State-of-the-Art Analysis",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "52:1--52:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3092694",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Business process models play an important role in
                 today's enterprises, hence, model repositories may
                 contain hundreds of models. These models are, for
                 example, reused during process modeling activities or
                 utilized to check the conformance of processes with
                 legal regulations. With respect to the amount of
                 models, such applications benefit from or even require
                 detailed insights into the correspondences between
                 process models or between process models' nodes.
                 Therefore, various process similarity and matching
                 measures have been proposed during the past few years.
                 This article provides an overview of the
                 state-of-the-art regarding business process model
                 similarity measures and aims at analyzing which
                 similarity measures exist, how they are characterized,
                 and what kind of calculations are typically applied to
                 determine similarity values. Finally, the analysis of
                 123 similarity measures results in the suggestions to
                 conduct further comparative analyses of similarity
                 measures, to investigate the integration of human input
                 into similarity measurement, and to further analyze the
                 requirements of similarity measurement usage scenarios
                 as future research opportunities.",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Stein:2017:CLN,
  author =       "Michael Stein and Mathias Fischer and Immanuel
                 Schweizer and Max M{\"u}hlh{\"a}user",
  title =        "A Classification of Locality in Network Research",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "53:1--53:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3092693",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Limiting the knowledge of individual nodes is a major
                 concern for the design of distributed algorithms. With
                 the LOCAL model, theoretical research already
                 established a common model of locality that has gained
                 little practical relevance. As a result, practical
                 research de facto lacks any common locality model. The
                 only common denominator among practitioners is that a
                 local algorithm is distributed with a restricted scope
                 of interaction. This article closes the gap by
                 introducing four practically motivated classes of
                 locality that successively weaken the strict
                 requirements of the LOCAL model. These classes are
                 applied to categorize and survey 36 local algorithms
                 from 12 different application domains. A detailed
                 comparison shows the practicality of the classification
                 and provides interesting insights. For example, the
                 majority of algorithms limit the scope of interaction
                 to at most two hops, independent of their locality
                 class. Moreover, the application domain of algorithms
                 tends to influence their degree of locality.",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chakraborty:2017:MCA,
  author =       "Tanmoy Chakraborty and Ayushi Dalmia and Animesh
                 Mukherjee and Niloy Ganguly",
  title =        "Metrics for Community Analysis: a Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "54:1--54:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3091106",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Detecting and analyzing dense groups or communities
                 from social and information networks has attracted
                 immense attention over the last decade due to its
                 enormous applicability in different domains. Community
                 detection is an ill-defined problem, as the nature of
                 the communities is not known in advance. The problem
                 has turned even more complicated due to the fact that
                 communities emerge in the network in various forms such
                 as disjoint, overlapping, and hierarchical. Various
                 heuristics have been proposed to address these
                 challenges, depending on the application in hand. All
                 these heuristics have been materialized in the form of
                 new metrics, which in most cases are used as
                 optimization functions for detecting the community
                 structure, or provide an indication of the goodness of
                 detected communities during evaluation. Over the last
                 decade, a large number of such metrics have been
                 proposed. Thus, there arises a need for an organized
                 and detailed survey of the metrics proposed for
                 community detection and evaluation. Here, we present a
                 survey of the start-of-the-art metrics used for the
                 detection and the evaluation of community structure. We
                 also conduct experiments on synthetic and real networks
                 to present a comparative analysis of these metrics in
                 measuring the goodness of the underlying community
                 structure.",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tran:2017:SWT,
  author =       "Nguyen Khoi Tran and Quan Z. Sheng and Muhammad Ali
                 Babar and Lina Yao",
  title =        "Searching the {Web of Things}: State of the Art,
                 Challenges, and Solutions",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "55:1--55:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3092695",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Technological advances allow more physical objects to
                 connect to the Internet and provide their services on
                 the Web as resources. Search engines are the key to
                 fully utilize this emerging Web of Things, as they
                 bridge users and applications with resources needed for
                 their operation. Developing these systems is a
                 challenging and diverse endeavor due to the diversity
                 of Web of Things resources that they work with. Each
                 combination of resources in query resolution process
                 requires a different type of search engine with its own
                 technical challenges and usage scenarios. This
                 diversity complicates both the development of new
                 systems and assessment of the state of the art. In this
                 article, we present a systematic survey on Web of
                 Things Search Engines (WoTSE), focusing on the
                 diversity in forms of these systems. We collect and
                 analyze over 200 related academic works to build a
                 flexible conceptual model for WoTSE. We develop an
                 analytical framework on this model to review the
                 development of the field and its current status,
                 reflected by 30 representative works in the area. We
                 conclude our survey with a discussion on open issues to
                 bridge the gap between the existing progress and an
                 ideal WoTSE.",
  acknowledgement = ack-nhfb,
  articleno =    "55",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ghaffarian:2017:SVA,
  author =       "Seyed Mohammad Ghaffarian and Hamid Reza Shahriari",
  title =        "Software Vulnerability Analysis and Discovery Using
                 Machine-Learning and Data-Mining Techniques: a Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "56:1--56:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3092566",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Software security vulnerabilities are one of the
                 critical issues in the realm of computer security. Due
                 to their potential high severity impacts, many
                 different approaches have been proposed in the past
                 decades to mitigate the damages of software
                 vulnerabilities. Machine-learning and data-mining
                 techniques are also among the many approaches to
                 address this issue. In this article, we provide an
                 extensive review of the many different works in the
                 field of software vulnerability analysis and discovery
                 that utilize machine-learning and data-mining
                 techniques. We review different categories of works in
                 this domain, discuss both advantages and shortcomings,
                 and point out challenges and some uncharted territories
                 in the field.",
  acknowledgement = ack-nhfb,
  articleno =    "56",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tariq:2017:NGP,
  author =       "Zain Bin Tariq and Dost Muhammad Cheema and Muhammad
                 Zahir Kamran and Ijaz Haider Naqvi",
  title =        "Non-{GPS} Positioning Systems: a Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "57:1--57:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3098207",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "An enormous amount of research has been conducted in
                 the area of positioning systems and thus it calls for a
                 detailed literature review of recent localization
                 systems. This article focuses on recent developments of
                 non-Global Positioning System (GPS)
                 localization/positioning systems. We have presented a
                 new hierarchical method to classify various positioning
                 systems. A comprehensive performance comparison of the
                 techniques and technologies against multiple
                 performance metrics along with the limitations is
                 presented. A few indoor positioning systems have
                 emerged as more successful in particular application
                 environments than others, which are presented at the
                 end.",
  acknowledgement = ack-nhfb,
  articleno =    "57",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Deng:2017:TRT,
  author =       "Yangdong Deng and Yufei Ni and Zonghui Li and Shuai Mu
                 and Wenjun Zhang",
  title =        "Toward Real-Time Ray Tracing: a Survey on Hardware
                 Acceleration and Microarchitecture Techniques",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "58:1--58:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3104067",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Ray tracing has long been considered as the
                 next-generation technology for graphics rendering.
                 Recently, there has been strong momentum to adopt ray
                 tracing--based rendering techniques on consumer-level
                 platforms due to the inability of further enhancing
                 user experience by increasing display resolution. On
                 the other hand, the computing workload of ray tracing
                 is still overwhelming. A 10-fold performance gap has to
                 be narrowed for real-time applications, even on the
                 latest graphics processing units (GPUs). As a result,
                 hardware acceleration techniques are critical to
                 delivering a satisfying level performance while at the
                 same time meeting an acceptable power budget. A large
                 body of research on ray-tracing hardware has been
                 proposed over the past decade. This article is aimed at
                 providing a timely survey on hardware techniques to
                 accelerate the ray-tracing algorithm. First, a
                 quantitative profiling on the ray-tracing workload is
                 presented. We then review hardware techniques for the
                 main functional blocks in a ray-tracing pipeline. On
                 such a basis, the ray-tracing microarchitectures for
                 both ASIC and processors are surveyed by following a
                 systematic taxonomy.",
  acknowledgement = ack-nhfb,
  articleno =    "58",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sun:2017:AJP,
  author =       "Kwangwon Sun and Sukyoung Ryu",
  title =        "Analysis of {JavaScript} Programs: Challenges and
                 Research Trends",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "59:1--59:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3106741",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2010.bib",
  abstract =     "JavaScript has been a de facto standard language for
                 client-side web programs, and now it is expanding its
                 territory to general purpose programs. In this article,
                 we classify the client-side JavaScript research for the
                 last decade or so into six topics: static analysis,
                 dynamic analysis, formalization and reasoning, type
                 safety and JIT optimization, security for web
                 applications, and empirical studies. Because the
                 majority of the research has focused on static and
                 dynamic analyses of JavaScript, we evaluate research
                 trends in the analysis of JavaScript first and then the
                 other topics. Finally, we discuss possible future
                 research directions with open challenges.",
  acknowledgement = ack-nhfb,
  articleno =    "59",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Caballero:2017:SAD,
  author =       "Rafael Caballero and Adri{\'a}n Riesco and Josep
                 Silva",
  title =        "A Survey of Algorithmic Debugging",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "60:1--60:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3106740",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Algorithmic debugging is a technique proposed in 1982
                 by E. Y. Shapiro in the context of logic programming.
                 This survey shows how the initial ideas have been
                 developed to become a widespread debugging schema
                 fitting many different programming paradigms and with
                 applications out of the program debugging field. We
                 describe the general framework and the main issues
                 related to the implementations in different programming
                 paradigms and discuss several proposed improvements and
                 optimizations. We also review the main algorithmic
                 debugger tools that have been implemented so far and
                 compare their features. From this comparison, we
                 elaborate a summary of desirable characteristics that
                 should be considered when implementing future
                 algorithmic debuggers.",
  acknowledgement = ack-nhfb,
  articleno =    "60",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jayaraman:2017:SPS,
  author =       "Padma Jayaraman and Ranjani Parthasarathi",
  title =        "A Survey on Post-Silicon Functional Validation for
                 Multicore Architectures",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "4",
  pages =        "61:1--61:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3107615",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "During a processor development cycle, post-silicon
                 validation is performed on the first fabricated chip to
                 detect and fix design errors. Design errors occur due
                 to functional issues when a unit in a design does not
                 meet its specification. The chances of occurrence of
                 such errors are high when new features are added in a
                 processor. Thus, in multicore architectures, with new
                 features being added in core and uncore components, the
                 task of verifying the functionality independently and
                 in coordination with other units gains significance.
                 Several new techniques are being proposed in the field
                 of functional validation. In this article, we undertake
                 a survey of these techniques to identify areas that
                 need to be addressed for multicore designs. We start
                 with an analysis of design errors in multicore
                 architectures. We then survey different functional
                 validation techniques based on hardware, software, and
                 formal methods and propose a comprehensive taxonomy for
                 each of these approaches. We also perform a critical
                 analysis to identify gaps in existing research and
                 propose new research directions for validation of
                 multicore architectures.",
  acknowledgement = ack-nhfb,
  articleno =    "61",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Boukerche:2017:AVD,
  author =       "Azzedine Boukerche and Abdul Jabbar Siddiqui and
                 Abdelhamid Mammeri",
  title =        "Automated Vehicle Detection and Classification:
                 Models, Methods, and Techniques",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "62:1--62:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3107614",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Automated Vehicle Classification (AVC) based on vision
                 sensors has received active attention from researchers,
                 due to heightened security concerns in Intelligent
                 Transportation Systems. In this work, we propose a
                 categorization of AVC studies based on the granularity
                 of classification, namely Vehicle Type Recognition,
                 Vehicle Make Recognition, and Vehicle Make and Model
                 Recognition. For each category of AVC systems, we
                 present a comprehensive review and comparison of
                 features extraction, global representation, and
                 classification techniques. We also present the accuracy
                 and speed-related performance metrics and discuss how
                 they can be used to compare and evaluate different AVC
                 works. The various datasets proposed over the years for
                 AVC are also compared in light of the real-world
                 challenges they represent, and those they do not. The
                 major challenges involved in each category of AVC
                 systems are presented, highlighting open problems in
                 this area of research. Finally, we conclude by
                 providing future directions of research in this area,
                 paving the way toward efficient large-scale AVC
                 systems. This survey shall help researchers interested
                 in the area to analyze works completed so far in each
                 category of AVC, focusing on techniques proposed for
                 each module, and to chalk out strategies to enhance
                 state-of-the-art technology.",
  acknowledgement = ack-nhfb,
  articleno =    "62",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhong:2017:SAS,
  author =       "Changtao Zhong and Nishanth Sastry",
  title =        "Systems Applications of Social Networks",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "63:1--63:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3092742",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The aim of this article is to provide an understanding
                 of social networks as a useful addition to the standard
                 toolbox of techniques used by system designers. To this
                 end, we give examples of how data about social links
                 have been collected and used in different application
                 contexts. We develop a broad taxonomy-based overview of
                 common properties of social networks, review how they
                 might be used in different applications, and point out
                 potential pitfalls where appropriate. We propose a
                 framework, distinguishing between two main types of
                 social network-based user selection- personalised user
                 selection, which identifies target users who may be
                 relevant for a given source node, using the social
                 network around the source as a context, and generic
                 user selection or group delimitation, which filters for
                 a set of users who satisfy a set of application
                 requirements based on their social properties. Using
                 this framework, we survey applications of social
                 networks in three typical kinds of application
                 scenarios: recommender systems, content-sharing systems
                 (e.g., P2P or video streaming), and systems that defend
                 against users who abuse the system (e.g., spam or sybil
                 attacks). In each case, we discuss potential directions
                 for future research that involve using social network
                 properties.",
  acknowledgement = ack-nhfb,
  articleno =    "63",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Baca:2017:SXQ,
  author =       "Radim Baca and Michal Kr{\'a}tk{\'y} and Irena
                 Holubov{\'a} and Martin Necask{\'y} and Tom{\'a}s
                 Skopal and Martin Svoboda and Sherif Sakr",
  title =        "Structural {XML} Query Processing",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "64:1--64:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3095798",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Since the boom in new proposals on techniques for
                 efficient querying of XML data is now over and the
                 research world has shifted its attention toward new
                 types of data formats, we believe that it is crucial to
                 review what has been done in the area to help users
                 choose an appropriate strategy and scientists exploit
                 the contributions in new areas of data processing. The
                 aim of this work is to provide a comprehensive study of
                 the state-of-the-art of approaches for the structural
                 querying of XML data. In particular, we start with a
                 description of labeling schemas to capture the
                 structure of the data and the respective storage
                 strategies. Then we deal with the key part of every XML
                 query processing: a twig query join, XML query
                 algebras, optimizations of query plans, and selectivity
                 estimation of XML queries. To the best of our
                 knowledge, this is the first work that provides such a
                 detailed description of XML query processing techniques
                 that are related to structural aspects and that
                 contains information about their theoretical and
                 practical features as well as about their mutual
                 compatibility and general usability.",
  acknowledgement = ack-nhfb,
  articleno =    "64",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bagga:2017:MAS,
  author =       "Pallavi Bagga and Rahul Hans",
  title =        "Mobile Agents System Security: a Systematic Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "65:1--65:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3095797",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A pivotal cause for the boom of Mobile Agent paradigm
                 relies on the competence to ward off security attacks.
                 This article surveys the prevalent attacks on the
                 mobile agents and the agent platforms; the existing
                 countermeasures and their curbs, catering threefold
                 benefaction: First, to acquaint the researchers with
                 numerous security requirements and the objectives.
                 Second, to analyze the different detection and
                 prevention mechanisms mitigating the security
                 bottlenecks in Mobile Agents System. Third, to address
                 the future security challenges. In a nutshell, this
                 survey hands over a key to researchers who primarily
                 target the security concerns of the mobile agent-based
                 applications.",
  acknowledgement = ack-nhfb,
  articleno =    "65",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Andreasen:2017:SDA,
  author =       "Esben Andreasen and Liang Gong and Anders M{\o}ller
                 and Michael Pradel and Marija Selakovic and Koushik Sen
                 and Cristian-Alexandru Staicu",
  title =        "A Survey of Dynamic Analysis and Test Generation for
                 {JavaScript}",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "66:1--66:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3106739",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2010.bib",
  abstract =     "JavaScript has become one of the most prevalent
                 programming languages. Unfortunately, some of the
                 unique properties that contribute to this popularity
                 also make JavaScript programs prone to errors and
                 difficult for program analyses to reason about. These
                 properties include the highly dynamic nature of the
                 language, a set of unusual language features, a lack of
                 encapsulation mechanisms, and the ``no crash''
                 philosophy. This article surveys dynamic program
                 analysis and test generation techniques for JavaScript
                 targeted at improving the correctness, reliability,
                 performance, security, and privacy of JavaScript-based
                 software.",
  acknowledgement = ack-nhfb,
  articleno =    "66",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Murray:2017:TOB,
  author =       "Niall Murray and Oluwakemi A. Ademoye and Gheorghita
                 Ghinea and Gabriel-Miro Muntean",
  title =        "A Tutorial for Olfaction-Based Multisensorial Media
                 Application Design and Evaluation",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "67:1--67:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3108243",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Recently, multimedia researchers have added several
                 so-called new media to the traditional multimedia
                 components (e.g., olfaction, haptic, and gustation).
                 Evaluating multimedia user-perceived Quality of
                 Experience (QoE) is already non-trivial and the
                 addition of multisensorial media components increases
                 this challenge. No standardized methodology exists to
                 conduct subjective quality assessments of
                 multisensorial media applications. To date, researchers
                 have employed different aspects of audiovisual
                 standards to assess user QoE of multisensorial media
                 applications and thus, a fragmented approach exists. In
                 this article, the authors highlight issues researchers
                 face from numerous perspectives including applicability
                 (or lack of) existing audiovisual standards to evaluate
                 user QoE and lack of result comparability due to
                 varying approaches, specific requirements of
                 olfactory-based multisensorial media applications, and
                 novelty associated with these applications. Finally,
                 based on the diverse approaches in the literature and
                 the collective experience of authors, this article
                 provides a tutorial and recommendations on the key
                 steps to conduct olfactory-based multisensorial media
                 QoE evaluation.",
  acknowledgement = ack-nhfb,
  articleno =    "67",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Angles:2017:FMQ,
  author =       "Renzo Angles and Marcelo Arenas and Pablo Barcel{\'o}
                 and Aidan Hogan and Juan Reutter and Domagoj Vrgoc",
  title =        "Foundations of Modern Query Languages for Graph
                 Databases",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "68:1--68:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3104031",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  abstract =     "We survey foundational features underlying modern
                 graph query languages. We first discuss two popular
                 graph data models: edge-labelled graphs, where nodes
                 are connected by directed, labelled edges, and property
                 graphs, where nodes and edges can further have
                 attributes. Next we discuss the two most fundamental
                 graph querying functionalities: graph patterns and
                 navigational expressions. We start with graph patterns,
                 in which a graph-structured query is matched against
                 the data. Thereafter, we discuss navigational
                 expressions, in which patterns can be matched
                 recursively against the graph to navigate paths of
                 arbitrary length; we give an overview of what kinds of
                 expressions have been proposed and how they can be
                 combined with graph patterns. We also discuss several
                 semantics under which queries using the previous
                 features can be evaluated, what effects the selection
                 of features and semantics has on complexity, and offer
                 examples of such features in three modern languages
                 that are used to query graphs: SPARQL, Cypher, and
                 Gremlin. We conclude by discussing the importance of
                 formalisation for graph query languages; a summary of
                 what is known about SPARQL, Cypher, and Gremlin in
                 terms of expressivity and complexity; and an outline of
                 possible future directions for the area.",
  acknowledgement = ack-nhfb,
  articleno =    "68",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Herremans:2017:FTM,
  author =       "Dorien Herremans and Ching-Hua Chuan and Elaine Chew",
  title =        "A Functional Taxonomy of Music Generation Systems",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "69:1--69:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3108242",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Digital advances have transformed the face of
                 automatic music generation since its beginnings at the
                 dawn of computing. Despite the many breakthroughs,
                 issues such as the musical tasks targeted by different
                 machines and the degree to which they succeed remain
                 open questions. We present a functional taxonomy for
                 music generation systems with reference to existing
                 systems. The taxonomy organizes systems according to
                 the purposes for which they were designed. It also
                 reveals the inter-relatedness amongst the systems. This
                 design-centered approach contrasts with predominant
                 methods-based surveys and facilitates the
                 identification of grand challenges to set the stage for
                 new breakthroughs.",
  acknowledgement = ack-nhfb,
  articleno =    "69",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pulido-Prieto:2017:SNP,
  author =       "Oscar Pulido-Prieto and Ulises
                 Ju{\'a}rez-Mart{\'\i}nez",
  title =        "A Survey of Naturalistic Programming Technologies",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "70:1--70:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3109481",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Mainly focused on solving abstraction problems,
                 programming paradigms limit language expressiveness,
                 thus leaving unexplored natural language descriptions
                 that are implicitly expressive. Several authors have
                 developed tools for programming with a natural language
                 subset limited to specific domains to deal with the
                 ambiguity occurring with artificial intelligence
                 technique use. This article presents a review of tools
                 and languages with naturalistic features and highlights
                 the problems that authors have resolved and those they
                 have not addressed, going on to discuss the fact that a
                 ``naturalistic'' language based on a well-defined model
                 is not reported.",
  acknowledgement = ack-nhfb,
  articleno =    "70",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Alevizos:2017:PCE,
  author =       "Elias Alevizos and Anastasios Skarlatidis and
                 Alexander Artikis and Georgios Paliouras",
  title =        "Probabilistic Complex Event Recognition: a Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "71:1--71:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3117809",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Complex event recognition (CER) applications exhibit
                 various types of uncertainty, ranging from incomplete
                 and erroneous data streams to imperfect complex event
                 patterns. We review CER techniques that handle, to some
                 extent, uncertainty. We examine techniques based on
                 automata, probabilistic graphical models, and
                 first-order logic, which are the most common ones, and
                 approaches based on Petri nets and grammars, which are
                 less frequently used. Several limitations are
                 identified with respect to the employed languages,
                 their probabilistic models, and their performance, as
                 compared to the purely deterministic cases. Based on
                 those limitations, we highlight promising directions
                 for future work.",
  acknowledgement = ack-nhfb,
  articleno =    "71",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Martinez-Gil:2017:MES,
  author =       "Francisco Martinez-Gil and Miguel Lozano and Ignacio
                 Garc{\'\i}a-Fern{\'a}ndez and Fernando Fern{\'a}ndez",
  title =        "Modeling, Evaluation, and Scale on Artificial
                 Pedestrians: a Literature Review",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "72:1--72:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3117808",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Modeling pedestrian dynamics and their implementation
                 in a computer are challenging and important issues in
                 the knowledge areas of transportation and computer
                 simulation. The aim of this article is to provide a
                 bibliographic outlook so that the reader may have quick
                 access to the most relevant works related to this
                 problem. We have used three main axes to organize the
                 article's contents: pedestrian models, validation
                 techniques, and multiscale approaches. The backbone of
                 this work is the classification of existing pedestrian
                 models; we have organized the works in the literature
                 under five categories, according to the techniques used
                 for implementing the operational level in each
                 pedestrian model. Then the main existing validation
                 methods, oriented to evaluate the behavioral quality of
                 the simulation systems, are reviewed. Furthermore, we
                 review the key issues that arise when facing multiscale
                 pedestrian modeling, where we first focus on the
                 behavioral scale (combinations of micro and macro
                 pedestrian models) and second on the scale size (from
                 individuals to crowds). The article begins by
                 introducing the main characteristics of walking
                 dynamics and its analysis tools and concludes with a
                 discussion about the contributions that different
                 knowledge fields can make in the near future to this
                 exciting area.",
  acknowledgement = ack-nhfb,
  articleno =    "72",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Joshi:2017:ASD,
  author =       "Aditya Joshi and Pushpak Bhattacharyya and Mark J.
                 Carman",
  title =        "Automatic Sarcasm Detection: a Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "73:1--73:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3124420",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Automatic sarcasm detection is the task of predicting
                 sarcasm in text. This is a crucial step to sentiment
                 analysis, considering prevalence and challenges of
                 sarcasm in sentiment-bearing text. Beginning with an
                 approach that used speech-based features, automatic
                 sarcasm detection has witnessed great interest from the
                 sentiment analysis community. This article is a
                 compilation of past work in automatic sarcasm
                 detection. We observe three milestones in the research
                 so far: semi-supervised pattern extraction to identify
                 implicit sentiment, use of hashtag-based supervision,
                 and incorporation of context beyond target text. In
                 this article, we describe datasets, approaches, trends,
                 and issues in sarcasm detection. We also discuss
                 representative performance values, describe shared
                 tasks, and provide pointers to future work, as given in
                 prior works. In terms of resources to understand the
                 state-of-the-art, the survey presents several useful
                 illustrations-most prominently, a table that summarizes
                 past papers along different dimensions such as the
                 types of features, annotation techniques, and datasets
                 used.",
  acknowledgement = ack-nhfb,
  articleno =    "73",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gonzalez:2017:RQL,
  author =       "Pablo Gonz{\'a}lez and Alberto Casta{\~n}o and Nitesh
                 V. Chawla and Juan Jos{\'e} {Del Coz}",
  title =        "A Review on Quantification Learning",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "74:1--74:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3117807",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The task of quantification consists in providing an
                 aggregate estimation (e.g., the class distribution in a
                 classification problem) for unseen test sets, applying
                 a model that is trained using a training set with a
                 different data distribution. Several real-world
                 applications demand this kind of method that does not
                 require predictions for individual examples and just
                 focuses on obtaining accurate estimates at an aggregate
                 level. During the past few years, several
                 quantification methods have been proposed from
                 different perspectives and with different goals. This
                 article presents a unified review of the main
                 approaches with the aim of serving as an introductory
                 tutorial for newcomers in the field.",
  acknowledgement = ack-nhfb,
  articleno =    "74",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Batalla:2017:SSH,
  author =       "Jordi Mongay Batalla and Athanasios Vasilakos and
                 Mariusz Gajewski",
  title =        "Secure Smart Homes: Opportunities and Challenges",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "75:1--75:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3122816",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The Smart Home concept integrates smart applications
                 in the daily human life. In recent years, Smart Homes
                 have increased security and management challenges due
                 to the low capacity of small sensors, multiple
                 connectivity to the Internet for efficient applications
                 (use of big data and cloud computing), and
                 heterogeneity of home systems, which require inexpert
                 users to configure devices and micro-systems. This
                 article presents current security and management
                 approaches in Smart Homes and shows the good practices
                 imposed on the market for developing secure systems in
                 houses. At last, we propose future solutions for
                 efficiently and securely managing the Smart Homes.",
  acknowledgement = ack-nhfb,
  articleno =    "75",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{DeBoer:2017:SAO,
  author =       "Frank {De Boer} and Vlad Serbanescu and Reiner
                 H{\"a}hnle and Ludovic Henrio and Justine Rochas and
                 Crystal Chang Din and Einar Broch Johnsen and Marjan
                 Sirjani and Ehsan Khamespanah and Kiko Fernandez-Reyes
                 and Albert Mingkun Yang",
  title =        "A Survey of Active Object Languages",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "76:1--76:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3122848",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "To program parallel systems efficiently and easily, a
                 wide range of programming models have been proposed,
                 each with different choices concerning synchronization
                 and communication between parallel entities. Among
                 them, the actor model is based on loosely coupled
                 parallel entities that communicate by means of
                 asynchronous messages and mailboxes. Some actor
                 languages provide a strong integration with
                 object-oriented concepts; these are often called active
                 object languages. This article reviews four major actor
                 and active object languages and compares them according
                 to carefully chosen dimensions that cover central
                 aspects of the programming paradigms and their
                 implementation.",
  acknowledgement = ack-nhfb,
  articleno =    "76",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Laube:2017:SAC,
  author =       "Stefan Laube and Rainer B{\"o}hme",
  title =        "Strategic Aspects of Cyber Risk Information Sharing",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "5",
  pages =        "77:1--77:??",
  month =        nov,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3124398",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Cyber risk management largely reduces to a race for
                 information between defenders of ICT systems and
                 attackers. Defenders can gain advantage in this race by
                 sharing cyber risk information with each other. Yet,
                 they often exchange less information than is socially
                 desirable, because sharing decisions are guided by
                 selfish rather than altruistic reasons. A growing line
                 of research studies these strategic aspects that drive
                 defenders' sharing decisions. The present survey
                 systematizes these works in a novel framework. It
                 provides a consolidated understanding of defenders'
                 strategies to privately or publicly share information
                 and enables us to distill trends in the literature and
                 identify future research directions. We reveal that
                 many theoretical works assume cyber risk information
                 sharing to be beneficial, while empirical validations
                 are often missing.",
  acknowledgement = ack-nhfb,
  articleno =    "77",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Santana:2018:SPS,
  author =       "Eduardo Felipe Zambom Santana and Ana Paula Chaves and
                 Marco Aurelio Gerosa and Fabio Kon and Dejan S.
                 Milojicic",
  title =        "Software Platforms for Smart Cities: Concepts,
                 Requirements, Challenges, and a Unified Reference
                 Architecture",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "78:1--78:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3124391",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Information and communication technologies (ICT) can
                 be instrumental in progressing towards smarter city
                 environments, which improve city services,
                 sustainability, and citizens' quality of life. Smart
                 City software platforms can support the development and
                 integration of Smart City applications. However, the
                 ICT community must overcome current technological and
                 scientific challenges before these platforms can be
                 widely adopted. This article surveys the state of the
                 art in software platforms for Smart Cities. We analyzed
                 23 projects concerning the most used enabling
                 technologies, as well as functional and non-functional
                 requirements, classifying them into four categories:
                 Cyber-Physical Systems, Internet of Things, Big Data,
                 and Cloud Computing. Based on these results, we derived
                 a reference architecture to guide the development of
                 next-generation software platforms for Smart Cities.
                 Finally, we enumerated the most frequently cited open
                 research challenges and discussed future opportunities.
                 This survey provides important references to help
                 application developers, city managers, system
                 operators, end-users, and Smart City researchers make
                 project, investment, and research decisions.",
  acknowledgement = ack-nhfb,
  articleno =    "78",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tunali:2018:SFT,
  author =       "Onur Tunali and Mustafa Altun",
  title =        "A Survey of Fault-Tolerance Algorithms for
                 Reconfigurable Nano-Crossbar Arrays",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "79:1--79:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3125641",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Nano-crossbar arrays have emerged as a promising and
                 viable technology to improve computing performance of
                 electronic circuits beyond the limits of current CMOS.
                 Arrays offer both structural efficiency with
                 reconfiguration and prospective capability of
                 integration with different technologies. However,
                 certain problems need to be addressed, and the most
                 important one is the prevailing occurrence of faults.
                 Considering fault rate projections as high as 20\% that
                 is much higher than those of CMOS, it is fair to expect
                 sophisticated fault-tolerance methods. The focus of
                 this survey article is the assessment and evaluation of
                 these methods and related algorithms applied in logic
                 mapping and configuration processes. As a start, we
                 concisely explain reconfigurable nano-crossbar arrays
                 with their fault characteristics and models. Following
                 that, we demonstrate configuration techniques of the
                 arrays in the presence of permanent faults and
                 elaborate on two main fault-tolerance methodologies,
                 namely defect-unaware and defect-aware approaches, with
                 a short review on advantages and disadvantages. For
                 both methodologies, we present detailed experimental
                 results of related algorithms regarding their strengths
                 and weaknesses with a comprehensive yield, success rate
                 and runtime analysis. Next, we overview fault-tolerance
                 approaches for transient faults. As a conclusion, we
                 overview the proposed algorithms with future directions
                 and upcoming challenges.",
  acknowledgement = ack-nhfb,
  articleno =    "79",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tal:2018:TRV,
  author =       "Irina Tal and Gabriel-Miro Muntean",
  title =        "Towards Reasoning Vehicles: a Survey of Fuzzy
                 Logic-Based Solutions in Vehicular Networks",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "80:1--80:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3125640",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Vehicular networks and their associated technologies
                 enable an extremely varied plethora of applications and
                 therefore attract increasing attention from a wide
                 audience. However, vehicular networks also have many
                 challenges that arise mainly due to their dynamic and
                 complex environment. Fuzzy Logic, known for its ability
                 to deal with complexity, imprecision, and model
                 non-deterministic problems, is a very promising
                 technology for use in such a dynamic and complex
                 context. This article presents the first comprehensive
                 survey of research on Fuzzy Logic approaches in the
                 context of vehicular networks, and provides fundamental
                 information which enables readers to design their own
                 Fuzzy Logic systems in this context. As such, this
                 article describes the Fuzzy Logic concepts with
                 emphasis on their implementation in vehicular networks,
                 includes classification and thorough analysis of the
                 Fuzzy Logic-based solutions in vehicular networks, and
                 discusses how Fuzzy Logic could be employed in the
                 context of some of the key research directions in the
                 5G-enabled vehicular networks.",
  acknowledgement = ack-nhfb,
  articleno =    "80",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shi:2018:GPG,
  author =       "Xuanhua Shi and Zhigao Zheng and Yongluan Zhou and Hai
                 Jin and Ligang He and Bo Liu and Qiang-Sheng Hua",
  title =        "Graph Processing on {GPUs}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "81:1--81:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3128571",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In the big data era, much real-world data can be
                 naturally represented as graphs. Consequently, many
                 application domains can be modeled as graph processing.
                 Graph processing, especially the processing of the
                 large-scale graphs with the number of vertices and
                 edges in the order of billions or even hundreds of
                 billions, has attracted much attention in both industry
                 and academia. It still remains a great challenge to
                 process such large-scale graphs. Researchers have been
                 seeking for new possible solutions. Because of the
                 massive degree of parallelism and the high memory
                 access bandwidth in GPU, utilizing GPU to accelerate
                 graph processing proves to be a promising solution.
                 This article surveys the key issues of graph processing
                 on GPUs, including data layout, memory access pattern,
                 workload mapping, and specific GPU programming. In this
                 article, we summarize the state-of-the-art research on
                 GPU-based graph processing, analyze the existing
                 challenges in detail, and explore the research
                 opportunities for the future.",
  acknowledgement = ack-nhfb,
  articleno =    "81",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Burns:2018:SRM,
  author =       "Alan Burns and Robert I. Davis",
  title =        "A Survey of Research into Mixed Criticality Systems",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "82:1--82:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3131347",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This survey covers research into mixed criticality
                 systems that has been published since Vestal's seminal
                 paper in 2007, up until the end of 2016. The survey is
                 organised along the lines of the major research areas
                 within this topic. These include single processor
                 analysis (including fixed priority and Earliest
                 Deadline First (EDF) scheduling, shared resources, and
                 static and synchronous scheduling), multiprocessor
                 analysis, realistic models, and systems issues. The
                 survey also explores the relationship between research
                 into mixed criticality systems and other topics such as
                 hard and soft time constraints, fault tolerant
                 scheduling, hierarchical scheduling, cyber physical
                 systems, probabilistic real-time systems, and
                 industrial safety standards.",
  acknowledgement = ack-nhfb,
  articleno =    "82",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Martins:2018:SFH,
  author =       "Paulo Martins and Leonel Sousa and Artur Mariano",
  title =        "A Survey on Fully Homomorphic Encryption: an
                 Engineering Perspective",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "83:1--83:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3124441",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "It is unlikely that a hacker is able to compromise
                 sensitive data that is stored in an encrypted form.
                 However, when data is to be processed, it has to be
                 decrypted, becoming vulnerable to attacks. Homomorphic
                 encryption fixes this vulnerability by allowing one to
                 compute directly on encrypted data. In this survey,
                 both previous and current Somewhat Homomorphic
                 Encryption (SHE) schemes are reviewed, and the more
                 powerful and recent Fully Homomorphic Encryption (FHE)
                 schemes are comprehensively studied. The concepts that
                 support these schemes are presented, and their
                 performance and security are analyzed from an
                 engineering standpoint.",
  acknowledgement = ack-nhfb,
  articleno =    "83",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Torreno:2018:CMA,
  author =       "Alejandro Torre{\~n}o and Eva Onaindia and
                 Anton{\'\i}n Komenda and Michal Stolba",
  title =        "Cooperative Multi-Agent Planning: a Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "84:1--84:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3128584",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Cooperative multi-agent planning (MAP) is a relatively
                 recent research field that combines technologies,
                 algorithms, and techniques developed by the Artificial
                 Intelligence Planning and Multi-Agent Systems
                 communities. While planning has been generally treated
                 as a single-agent task, MAP generalizes this concept by
                 considering multiple intelligent agents that work
                 cooperatively to develop a course of action that
                 satisfies the goals of the group. This article reviews
                 the most relevant approaches to MAP, putting the focus
                 on the solvers that took part in the 2015 Competition
                 of Distributed and Multi-Agent Planning, and classifies
                 them according to their key features and relative
                 performance.",
  acknowledgement = ack-nhfb,
  articleno =    "84",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Yadav:2018:MEH,
  author =       "Pranjul Yadav and Michael Steinbach and Vipin Kumar
                 and Gyorgy Simon",
  title =        "Mining Electronic Health Records {(EHRs)}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "85:1--85:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3127881",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The continuously increasing cost of the US healthcare
                 system has received significant attention. Central to
                 the ideas aimed at curbing this trend is the use of
                 technology in the form of the mandate to implement
                 electronic health records (EHRs). EHRs consist of
                 patient information such as demographics, medications,
                 laboratory test results, diagnosis codes, and
                 procedures. Mining EHRs could lead to improvement in
                 patient health management as EHRs contain detailed
                 information related to disease prognosis for large
                 patient populations. In this article, we provide a
                 structured and comprehensive overview of data mining
                 techniques for modeling EHRs. We first provide a
                 detailed understanding of the major application areas
                 to which EHR mining has been applied and then discuss
                 the nature of EHR data and its accompanying challenges.
                 Next, we describe major approaches used for EHR mining,
                 the metrics associated with EHRs, and the various study
                 designs. With this foundation, we then provide a
                 systematic and methodological organization of existing
                 data mining techniques used to model EHRs and discuss
                 ideas for future research.",
  acknowledgement = ack-nhfb,
  articleno =    "85",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Neal:2018:SST,
  author =       "Tempestt Neal and Kalaivani Sundararajan and Aneez
                 Fatima and Yiming Yan and Yingfei Xiang and Damon
                 Woodard",
  title =        "Surveying Stylometry Techniques and Applications",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "86:1--86:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3132039",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The analysis of authorial style, termed stylometry,
                 assumes that style is quantifiably measurable for
                 evaluation of distinctive qualities. Stylometry
                 research has yielded several methods and tools over the
                 past 200 years to handle a variety of challenging
                 cases. This survey reviews several articles within five
                 prominent subtasks: authorship attribution, authorship
                 verification, authorship profiling, stylochronometry,
                 and adversarial stylometry. Discussions on datasets,
                 features, experimental techniques, and recent
                 approaches are provided. Further, a current research
                 challenge lies in the inability of authorship analysis
                 techniques to scale to a large number of authors with
                 few text samples. Here, we perform an extensive
                 performance analysis on a corpus of 1,000 authors to
                 investigate authorship attribution, verification, and
                 clustering using 14 algorithms from the literature.
                 Finally, several remaining research challenges are
                 discussed, along with descriptions of various
                 open-source and commercial software that may be useful
                 for stylometry subtasks.",
  acknowledgement = ack-nhfb,
  articleno =    "86",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Voronkov:2018:SLR,
  author =       "Artem Voronkov and Leonardo Horn Iwaya and Leonardo A.
                 Martucci and Stefan Lindskog",
  title =        "Systematic Literature Review on Usability of Firewall
                 Configuration",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "87:1--87:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3130876",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Firewalls are network security components that handle
                 incoming and outgoing network traffic based on a set of
                 rules. The process of correctly configuring a firewall
                 is complicated and prone to error, and it worsens as
                 the network complexity grows. A poorly configured
                 firewall may result in major security threats; in the
                 case of a network firewall, an organization's security
                 could be endangered, and in the case of a personal
                 firewall, an individual computer's security is
                 threatened. A major reason for poorly configured
                 firewalls, as pointed out in the literature, is
                 usability issues. Our aim is to identify existing
                 solutions that help professional and non-professional
                 users to create and manage firewall configuration
                 files, and to analyze the proposals in respect of
                 usability. A systematic literature review with a focus
                 on the usability of firewall configuration is presented
                 in the article. Its main goal is to explore what has
                 already been done in this field. In the primary
                 selection procedure, 1,202 articles were retrieved and
                 then screened. The secondary selection led us to 35
                 articles carefully chosen for further investigation, of
                 which 14 articles were selected and summarized. As main
                 contributions, we propose a taxonomy of existing
                 solutions as well as a synthesis and in-depth
                 discussion about the state of the art in firewall
                 usability. Among the main findings, we perceived that
                 there is a lack (or even an absence) of usability
                 evaluation or user studies to validate the proposed
                 models. Although all articles are related to the topic
                 of usability, none of them clearly defines it, and only
                 a few actually employ usability design principles
                 and/or guidelines.",
  acknowledgement = ack-nhfb,
  articleno =    "87",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kavun:2018:SAE,
  author =       "Elif Bilge Kavun and Hristina Mihajloska and Tolga
                 Yal{\c{c}}in",
  title =        "A Survey on Authenticated Encryption--{ASIC}
                 Designer's Perspective",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "88:1--88:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3131276",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Authenticated encryption (AE) has been a vital
                 operation in cryptography due to its ability to provide
                 confidentiality, integrity, and authenticity at the
                 same time. Its use has soared in parallel with
                 widespread use of the internet and has led to several
                 new schemes. There have been studies investigating
                 software performance of various schemes. However, the
                 same is yet to be done for hardware. We present a
                 comprehensive survey of hardware (specifically ASIC)
                 performance of the most commonly used AE schemes in the
                 literature. These schemes include encrypt-then-MAC
                 combination, block-cipher-based AE modes, and the
                 recently introduced permutation-based AE scheme. For
                 completeness, we implemented each scheme with various
                 standardized block ciphers and/or hash algorithms, and
                 their lightweight versions. Our evaluation targets
                 minimizing the time-area product while maximizing the
                 throughput on an ASIC platform. We used 45nm NANGATE
                 Open Cell Library for syntheses. We present area,
                 speed, time-area product, throughput, and power figures
                 for both standard and lightweight versions of each
                 scheme. We also provide an unbiased discussion on the
                 impact of the structure and complexity of each scheme
                 on hardware implementation. Our results reveal
                 13\%--30\% performance boost in permutation-based AE
                 compared to conventional schemes, and they can be used
                 as a benchmark in the ongoing AE competition CAESAR.",
  acknowledgement = ack-nhfb,
  articleno =    "88",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Werner:2018:SON,
  author =       "Sebastian Werner and Javier Navaridas and Mikel
                 Luj{\'a}n",
  title =        "A Survey on Optical Network-on-Chip Architectures",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "89:1--89:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3131346",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Optical on-chip data transmission enabled by silicon
                 photonics (SiP) is widely considered a key technology
                 to overcome the bandwidth and energy limitations of
                 electrical interconnects. The possibility of
                 integrating optical links into the on-chip
                 communication fabric has opened up a fascinating new
                 research field-Optical Networks-on-Chip (ONoCs)-which
                 has been gaining large interest by the community. SiP
                 devices and materials, however, are still evolving, and
                 dealing with optical data transmission on chip makes
                 designers and researchers face a whole new set of
                 obstacles and challenges. Designing efficient ONoCs is
                 a challenging task and requires a detailed knowledge
                 from on-chip traffic demands and patterns down to the
                 physical layout and implications of integrating both
                 electronic and photonic devices. In this paper, we
                 provide an exhaustive review of recently proposed ONoC
                 architectures, discuss their strengths and weaknesses,
                 and outline active research areas. Moreover, we discuss
                 recent research efforts in key enabling technologies,
                 such as on-chip and adaptive laser sources, automatic
                 synthesis tools, and ring heating techniques, which are
                 essential to enable a widespread commercial adoption of
                 ONoCs in the future.",
  acknowledgement = ack-nhfb,
  articleno =    "89",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hooshyar:2018:DDA,
  author =       "Danial Hooshyar and Moslem Yousefi and Heuiseok Lim",
  title =        "Data-Driven Approaches to Game Player Modeling: a
                 Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "90:1--90:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3145814",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Modeling and predicting player behavior is of the
                 utmost importance in developing games. Experience has
                 proven that, while theory-driven approaches are able to
                 comprehend and justify a model's choices, such models
                 frequently fail to encompass necessary features because
                 of a lack of insight of the model builders. In
                 contrast, data-driven approaches rely much less on
                 expertise, and thus offer certain potential advantages.
                 Hence, this study conducts a systematic review of the
                 extant research on data-driven approaches to game
                 player modeling. To this end, we have assessed
                 experimental studies of such approaches over a
                 nine-year period, from 2008 to 2016; this survey
                 yielded 46 research studies of significance. We found
                 that these studies pertained to three main areas of
                 focus concerning the uses of data-driven approaches in
                 game player modeling. One research area involved the
                 objectives of data-driven approaches in game player
                 modeling: behavior modeling and goal recognition.
                 Another concerned methods: classification, clustering,
                 regression, and evolutionary algorithm. The third was
                 comprised of the current challenges and promising
                 research directions for data-driven approaches in game
                 player modeling.",
  acknowledgement = ack-nhfb,
  articleno =    "90",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mansouri:2018:DSM,
  author =       "Yaser Mansouri and Adel Nadjaran Toosi and Rajkumar
                 Buyya",
  title =        "Data Storage Management in Cloud Environments:
                 Taxonomy, Survey, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "91:1--91:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3136623",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Storage as a Service (StaaS) is a vital component of
                 cloud computing by offering the vision of a virtually
                 infinite pool of storage resources. It supports a
                 variety of cloud-based data store classes in terms of
                 availability, scalability, ACID (Atomicity,
                 Consistency, Isolation, Durability) properties, data
                 models, and price options. Application providers deploy
                 these storage classes across different cloud-based data
                 stores not only to tackle the challenges arising from
                 reliance on a single cloud-based data store but also to
                 obtain higher availability, lower response time, and
                 more cost efficiency. Hence, in this article, we first
                 discuss the key advantages and challenges of
                 data-intensive applications deployed within and across
                 cloud-based data stores. Then, we provide a
                 comprehensive taxonomy that covers key aspects of
                 cloud-based data store: data model, data dispersion,
                 data consistency, data transaction service, and data
                 management cost. Finally, we map various cloud-based
                 data stores projects to our proposed taxonomy to
                 validate the taxonomy and identify areas for future
                 research.",
  acknowledgement = ack-nhfb,
  articleno =    "91",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shrestha:2018:ODE,
  author =       "Prakash Shrestha and Nitesh Saxena",
  title =        "An Offensive and Defensive Exposition of Wearable
                 Computing",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "92:1--92:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3133837",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Wearable computing is rapidly getting deployed in
                 many-commercial, medical, and personal-domains of
                 day-to-day life. Wearable devices appear in various
                 forms, shapes, and sizes and facilitate a wide variety
                 of applications in many domains of life. However,
                 wearables raise unique security and privacy concerns.
                 Wearables also hold the promise to help enhance the
                 existing security, privacy, and safety paradigms in
                 unique ways while preserving the system's usability.
                 The contribution of this research literature survey is
                 threefold. First, as a background, we identify a wide
                 range of existing as well as upcoming wearable devices
                 and investigate their broad applications. Second, we
                 provide an exposition of the security and privacy of
                 wearable computing, studying dual aspects, that is,
                 both attacks and defenses. Third, we provide a
                 comprehensive study of the potential security, privacy,
                 and safety enhancements to existing systems based on
                 the emergence of wearable technology. Although several
                 research works have emerged exploring different
                 offensive and defensive uses of wearables, there is a
                 lack of a broad and precise literature review
                 systematizing all those security and privacy aspects
                 and the underlying threat models. This research survey
                 also analyzes current and emerging research trends and
                 provides directions for future research.",
  acknowledgement = ack-nhfb,
  articleno =    "92",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{VanBerkel:2018:ESM,
  author =       "Niels {Van Berkel} and Denzil Ferreira and Vassilis
                 Kostakos",
  title =        "The Experience Sampling Method on Mobile Devices",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "93:1--93:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3123988",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The Experience Sampling Method (ESM) is used by
                 scientists from various disciplines to gather insights
                 into the intra-psychic elements of human life.
                 Researchers have used the ESM in a wide variety of
                 studies, with the method seeing increased popularity.
                 Mobile technologies have enabled new possibilities for
                 the use of the ESM, while simultaneously leading to new
                 conceptual, methodological, and technological
                 challenges. In this survey, we provide an overview of
                 the history of the ESM, usage of this methodology in
                 the computer science discipline, as well as its
                 evolution over time. Next, we identify and discuss
                 important considerations for ESM studies on mobile
                 devices, and analyse the particular methodological
                 parameters scientists should consider in their study
                 design. We reflect on the existing tools that support
                 the ESM methodology and discuss the future development
                 of such tools. Finally, we discuss the effect of future
                 technological developments on the use of the ESM and
                 identify areas requiring further investigation.",
  acknowledgement = ack-nhfb,
  articleno =    "93",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Li:2018:FSD,
  author =       "Jundong Li and Kewei Cheng and Suhang Wang and Fred
                 Morstatter and Robert P. Trevino and Jiliang Tang and
                 Huan Liu",
  title =        "Feature Selection: a Data Perspective",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "94:1--94:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3136625",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Feature selection, as a data preprocessing strategy,
                 has been proven to be effective and efficient in
                 preparing data (especially high-dimensional data) for
                 various data-mining and machine-learning problems. The
                 objectives of feature selection include building
                 simpler and more comprehensible models, improving
                 data-mining performance, and preparing clean,
                 understandable data. The recent proliferation of big
                 data has presented some substantial challenges and
                 opportunities to feature selection. In this survey, we
                 provide a comprehensive and structured overview of
                 recent advances in feature selection research.
                 Motivated by current challenges and opportunities in
                 the era of big data, we revisit feature selection
                 research from a data perspective and review
                 representative feature selection algorithms for
                 conventional data, structured data, heterogeneous data
                 and streaming data. Methodologically, to emphasize the
                 differences and similarities of most existing feature
                 selection algorithms for conventional data, we
                 categorize them into four main groups:
                 similarity-based, information-theoretical-based,
                 sparse-learning-based, and statistical-based methods.
                 To facilitate and promote the research in this
                 community, we also present an open source feature
                 selection repository that consists of most of the
                 popular feature selection algorithms
                 (http://featureselection.asu.edu/). Also, we use it as
                 an example to show how to evaluate feature selection
                 algorithms. At the end of the survey, we present a
                 discussion about some open problems and challenges that
                 require more attention in future research.",
  acknowledgement = ack-nhfb,
  articleno =    "94",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Uurtio:2018:TCC,
  author =       "Viivi Uurtio and Jo{\~a}o M. Monteiro and Jaz Kandola
                 and John Shawe-Taylor and Delmiro Fernandez-Reyes and
                 Juho Rousu",
  title =        "A Tutorial on Canonical Correlation Methods",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "95:1--95:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3136624",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Canonical correlation analysis is a family of
                 multivariate statistical methods for the analysis of
                 paired sets of variables. Since its proposition,
                 canonical correlation analysis has, for instance, been
                 extended to extract relations between two sets of
                 variables when the sample size is insufficient in
                 relation to the data dimensionality, when the relations
                 have been considered to be non-linear, and when the
                 dimensionality is too large for human interpretation.
                 This tutorial explains the theory of canonical
                 correlation analysis, including its regularised,
                 kernel, and sparse variants. Additionally, the deep and
                 Bayesian CCA extensions are briefly reviewed. Together
                 with the numerical examples, this overview provides a
                 coherent compendium on the applicability of the
                 variants of canonical correlation analysis. By bringing
                 together techniques for solving the optimisation
                 problems, evaluating the statistical significance and
                 generalisability of the canonical correlation model,
                 and interpreting the relations, we hope that this
                 article can serve as a hands-on tool for applying
                 canonical correlation methods in data analysis.",
  acknowledgement = ack-nhfb,
  articleno =    "95",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Skarbez:2018:SPR,
  author =       "Richard Skarbez and Frederick P. {Brooks, Jr.} and
                 Mary C. Whitton",
  title =        "A Survey of Presence and Related Concepts",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "96:1--96:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3134301",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The presence construct, most commonly defined as the
                 sense of ``being there,'' has driven research and
                 development of virtual environments (VEs) for decades.
                 Despite that, there is not widespread agreement on how
                 to define or operationalize this construct. The
                 literature contains many different definitions of
                 presence and many proposed measures for it. This
                 article reviews many of the definitions, measures, and
                 models of presence from the literature. We also review
                 several related constructs, including social presence,
                 copresence, immersion, agency, transportation, reality
                 judgment, and embodiment. In addition, we present a
                 meta-analysis of existing presence models and propose a
                 model of presence informed by Slater's Place Illusion
                 and Plausibility Illusion constructs.",
  acknowledgement = ack-nhfb,
  articleno =    "96",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{He:2018:GSB,
  author =       "Suining He and Kang G. Shin",
  title =        "Geomagnetism for {Smartphone}-Based Indoor
                 Localization: Challenges, Advances, and Comparisons",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "97:1--97:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3139222",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Geomagnetism has recently attracted considerable
                 attention for indoor localization due to its
                 pervasiveness and independence from extra
                 infrastructure. Its location signature has been
                 observed to be temporally stable and spatially
                 discernible for localization purposes. This survey
                 examines and analyzes the recent challenges and
                 advances in geomagnetism-based indoor localization
                 using smartphones. We first study smartphone-based
                 geomagnetism measurements. We then review recent
                 efforts in database construction and computation
                 reduction, followed by state-of-the-art schemes in
                 localizing the target. For each category, we identify
                 practical deployment challenges and compare related
                 studies. Finally, we summarize future directions and
                 provide a guideline for new researchers in this
                 field.",
  acknowledgement = ack-nhfb,
  articleno =    "97",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mertz:2018:UAL,
  author =       "Jhonny Mertz and Ingrid Nunes",
  title =        "Understanding Application-Level Caching in {Web}
                 Applications: a Comprehensive Introduction and Survey
                 of State-of-the-Art Approaches",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "98:1--98:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3145813",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A new form of caching, namely application-level
                 caching, has been recently employed in web applications
                 to improve their performance and increase scalability.
                 It consists of the insertion of caching logic into the
                 application base code to temporarily store processed
                 content in memory and then decrease the response time
                 of web requests by reusing this content. However,
                 caching at this level demands knowledge of the domain
                 and application specificities to achieve caching
                 benefits, given that this information supports
                 decisions such as what and when to cache content.
                 Developers thus must manually manage the cache,
                 possibly with the help of existing libraries and
                 frameworks. Given the increasing popularity of
                 application-level caching, we thus provide a survey of
                 approaches proposed in this context. We provide a
                 comprehensive introduction to web caching and
                 application-level caching, and present state-of-the-art
                 work on designing, implementing, and managing
                 application-level caching. Our focus is not only on
                 static solutions but also approaches that adaptively
                 adjust caching solutions to avoid the gradual
                 performance decay that caching can suffer over time.
                 This survey can be used as a start point for
                 researchers and developers, who aim to improve
                 application-level caching or need guidance in designing
                 application-level caching solutions, possibly with
                 humans out-of-the-loop.",
  acknowledgement = ack-nhfb,
  articleno =    "98",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Betzel:2018:ACT,
  author =       "Filipe Betzel and Karen Khatamifard and Harini Suresh
                 and David J. Lilja and John Sartori and Ulya Karpuzcu",
  title =        "Approximate Communication: Techniques for Reducing
                 Communication Bottlenecks in Large-Scale Parallel
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "1:1--1:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3145812",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  abstract =     "Approximate computing has gained research attention
                 recently as a way to increase energy efficiency and/or
                 performance by exploiting some applications' intrinsic
                 error resiliency. However, little attention has been
                 given to its potential for tackling the communication
                 bottleneck that remains one of the looming challenges
                 to be tackled for efficient parallelism. This article
                 explores the potential benefits of approximate
                 computing for communication reduction by surveying
                 three promising techniques for approximate
                 communication: compression, relaxed synchronization,
                 and value prediction. The techniques are compared based
                 on an evaluation framework composed of communication
                 cost reduction, performance, energy reduction,
                 applicability, overheads, and output degradation.
                 Comparison results demonstrate that lossy link
                 compression and approximate value prediction show great
                 promise for reducing the communication bottleneck in
                 bandwidth-constrained applications. Meanwhile, relaxed
                 synchronization is found to provide large speedups for
                 select error-tolerant applications, but suffers from
                 limited general applicability and unreliable output
                 degradation guarantees. Finally, this article concludes
                 with several suggestions for future research on
                 approximate communication techniques.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sturdee:2018:ACS,
  author =       "Miriam Sturdee and Jason Alexander",
  title =        "Analysis and Classification of Shape-Changing
                 Interfaces for Design and Application-based Research",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "2:1--2:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3143559",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Shape-changing interfaces are physically tangible,
                 interactive devices, surfaces, or spaces that allow for
                 rich, organic, and novel experiences with computational
                 devices. Over the last 15 years, research has produced
                 functional prototypes over many use applications;
                 reviews have identified themes and possible future
                 directions but have not yet looked at possible design
                 or application-based research. Here, we gather this
                 information together to provide a reference for
                 designers and researchers wishing to build upon
                 existing prototyping work, using synthesis and
                 discussion of existing shape-changing interface reviews
                 and comprehensive analysis and classification of 84
                 shape-changing interfaces. Eight categories of
                 prototype are identified alongside recommendations for
                 the field.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wasik:2018:SOJ,
  author =       "Szymon Wasik and Maciej Antczak and Jan Badura and
                 Artur Laskowski and Tomasz Sternal",
  title =        "A Survey on Online Judge Systems and Their
                 Applications",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "3:1--3:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3143560",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Online judges are systems designed for the reliable
                 evaluation of algorithm source code submitted by users,
                 which is next compiled and tested in a homogeneous
                 environment. Online judges are becoming popular in
                 various applications. Thus, we would like to review the
                 state of the art for these systems. We classify them
                 according to their principal objectives into systems
                 supporting organization of competitive programming
                 contests, enhancing education and recruitment
                 processes, facilitating the solving of data mining
                 challenges, online compilers and development platforms
                 integrated as components of other custom systems.
                 Moreover, we introduce a formal definition of an online
                 judge system and summarize the common evaluation
                 methodology supported by such systems. Finally, we
                 briefly discuss an Optil.io platform as an example of
                 an online judge system, which has been proposed for the
                 solving of complex optimization problems. We also
                 analyze the competition results conducted using this
                 platform. The competition proved that online judge
                 systems, strengthened by crowdsourcing concepts, can be
                 successfully applied to accurately and efficiently
                 solve complex industrial- and science-driven
                 challenges.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chen:2018:MTR,
  author =       "Tsong Yueh Chen and Fei-Ching Kuo and Huai Liu and
                 Pak-Lok Poon and Dave Towey and T. H. Tse and Zhi Quan
                 Zhou",
  title =        "Metamorphic Testing: a Review of Challenges and
                 Opportunities",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "4:1--4:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3143561",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Metamorphic testing is an approach to both test case
                 generation and test result verification. A central
                 element is a set of metamorphic relations, which are
                 necessary properties of the target function or
                 algorithm in relation to multiple inputs and their
                 expected outputs. Since its first publication, we have
                 witnessed a rapidly increasing body of work examining
                 metamorphic testing from various perspectives,
                 including metamorphic relation identification, test
                 case generation, integration with other software
                 engineering techniques, and the validation and
                 evaluation of software systems. In this article, we
                 review the current research of metamorphic testing and
                 discuss the challenges yet to be addressed. We also
                 present visions for further improvement of metamorphic
                 testing and highlight opportunities for new research.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Obaidellah:2018:SUE,
  author =       "Unaizah Obaidellah and Mohammed {Al Haek} and Peter
                 C.-H. Cheng",
  title =        "A Survey on the Usage of Eye-Tracking in Computer
                 Programming",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "5:1--5:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3145904",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2010.bib",
  abstract =     "Traditional quantitative research methods of data
                 collection in programming, such as questionnaires and
                 interviews, are the most common approaches for
                 researchers in this field. However, in recent years,
                 eye-tracking has been on the rise as a new method of
                 collecting evidence of visual attention and the
                 cognitive process of programmers. Eye-tracking has been
                 used by researchers in the field of programming to
                 analyze and understand a variety of tasks such as
                 comprehension and debugging. In this article, we will
                 focus on reporting how experiments that used
                 eye-trackers in programming research are conducted, and
                 the information that can be collected from these
                 experiments. In this mapping study, we identify and
                 report on 63 studies, published between 1990 and June
                 2017, collected and gathered via manual search on
                 digital libraries and databases related to computer
                 science and computer engineering. Among the five main
                 areas of research interest are program comprehension
                 and debugging, which received an increased interest in
                 recent years, non-code comprehension, collaborative
                 programming, and requirements traceability research,
                 which had the fewest number of publications due to
                 possible limitations of the eye-tracking technology in
                 this type of experiments. We find that most of the
                 participants in these studies were students and faculty
                 members from institutions of higher learning, and while
                 they performed programming tasks on a range of
                 programming languages and programming representations,
                 we find Java language and Unified Modeling Language
                 (UML) representation to be the most used materials. We
                 also report on a range of eye-trackers and attention
                 tracking tools that have been utilized, and find Tobii
                 eye-trackers to be the most used devices by
                 researchers.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Paci:2018:SAC,
  author =       "Federica Paci and Anna Squicciarini and Nicola
                 Zannone",
  title =        "Survey on Access Control for Community-Centered
                 Collaborative Systems",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "6:1--6:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3146025",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The last decades have seen a growing interest and
                 demand for community-centered collaborative systems and
                 platforms. These systems and platforms aim to provide
                 an environment in which users can collaboratively
                 create, share, and manage resources. While offering
                 attractive opportunities for online collaboration and
                 information sharing, they also open several security
                 and privacy issues. This has attracted several research
                 efforts toward the design and implementation of novel
                 access control solutions that can handle the complexity
                 introduced by collaboration. Despite these efforts,
                 transition to practice has been hindered by the lack of
                 maturity of the proposed solutions. The access control
                 mechanisms typically adopted by commercial
                 collaborative systems like online social network
                 websites and collaborative editing platforms, are still
                 rather rudimentary and do not provide users with a
                 sufficient control over their resources. This survey
                 examines the growing literature on access control for
                 collaborative systems centered on communities, and
                 identifies the main challenges to be addressed in order
                 to facilitate the adoption of collaborative access
                 control solutions in real-life settings. Based on the
                 literature study, we delineate a roadmap for future
                 research in the area of access control for
                 community-centered collaborative systems.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Daniel:2018:QCC,
  author =       "Florian Daniel and Pavel Kucherbaev and Cinzia
                 Cappiello and Boualem Benatallah and Mohammad
                 Allahbakhsh",
  title =        "Quality Control in Crowdsourcing: a Survey of Quality
                 Attributes, Assessment Techniques, and Assurance
                 Actions",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "7:1--7:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3148148",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Crowdsourcing enables one to leverage on the
                 intelligence and wisdom of potentially large groups of
                 individuals toward solving problems. Common problems
                 approached with crowdsourcing are labeling images,
                 translating or transcribing text, providing opinions or
                 ideas, and similar-all tasks that computers are not
                 good at or where they may even fail altogether. The
                 introduction of humans into computations and/or
                 everyday work, however, also poses critical, novel
                 challenges in terms of quality control, as the crowd is
                 typically composed of people with unknown and very
                 diverse abilities, skills, interests, personal
                 objectives, and technological resources. This survey
                 studies quality in the context of crowdsourcing along
                 several dimensions, so as to define and characterize it
                 and to understand the current state of the art.
                 Specifically, this survey derives a quality model for
                 crowdsourcing tasks, identifies the methods and
                 techniques that can be used to assess the attributes of
                 the model, and the actions and strategies that help
                 prevent and mitigate quality problems. An analysis of
                 how these features are supported by the state of the
                 art further identifies open issues and informs an
                 outlook on hot future research directions.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Netto:2018:HCS,
  author =       "Marco A. S. Netto and Rodrigo N. Calheiros and Eduardo
                 R. Rodrigues and Renato L. F. Cunha and Rajkumar
                 Buyya",
  title =        "{HPC} Cloud for Scientific and Business Applications:
                 Taxonomy, Vision, and Research Challenges",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "8:1--8:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3150224",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "High performance computing (HPC) clouds are becoming
                 an alternative to on-premise clusters for executing
                 scientific applications and business analytics
                 services. Most research efforts in HPC cloud aim to
                 understand the cost benefit of moving
                 resource-intensive applications from on-premise
                 environments to public cloud platforms. Industry trends
                 show that hybrid environments are the natural path to
                 get the best of the on-premise and cloud
                 resources-steady (and sensitive) workloads can run on
                 on-premise resources and peak demand can leverage
                 remote resources in a pay-as-you-go manner.
                 Nevertheless, there are plenty of questions to be
                 answered in HPC cloud, which range from how to extract
                 the best performance of an unknown underlying platform
                 to what services are essential to make its usage
                 easier. Moreover, the discussion on the right pricing
                 and contractual models to fit small and large users is
                 relevant for the sustainability of HPC clouds. This
                 article brings a survey and taxonomy of efforts in HPC
                 cloud and a vision on what we believe is ahead of us,
                 including a set of research challenges that, once
                 tackled, can help advance businesses and scientific
                 discoveries. This becomes particularly relevant due to
                 the fast increasing wave of new HPC applications coming
                 from big data and artificial intelligence.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Khalastchi:2018:FDD,
  author =       "Eliahu Khalastchi and Meir Kalech",
  title =        "On Fault Detection and Diagnosis in Robotic Systems",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "9:1--9:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3146389",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The use of robots in our daily lives is increasing.
                 Different types of robots perform different tasks that
                 are too dangerous or too dull to be done by humans.
                 These sophisticated machines are susceptible to
                 different types of faults. These faults have to be
                 detected and diagnosed in time to allow recovery and
                 continuous operation. The field of Fault Detection and
                 Diagnosis (FDD) has been studied for many years. This
                 research has given birth to many approaches and
                 techniques that are applicable to different types of
                 physical machines. Yet the domain of robotics poses
                 unique requirements that are very challenging for
                 traditional FDD approaches. The study of FDD for
                 robotics is relatively new, and only few surveys were
                 presented. These surveys have focused on traditional
                 FDD approaches and how these approaches may broadly
                 apply to a generic type of robot. Yet robotic systems
                 can be identified by fundamental characteristics, which
                 pose different constraints and requirements from FDD.
                 In this article, we aim to provide the reader with
                 useful insights regarding the use of FDD approaches
                 that best suit the different characteristics of robotic
                 systems. We elaborate on the advantages these
                 approaches have and the challenges they must face. To
                 meet this aim, we use two perspectives: (1) we
                 elaborate on FDD from the perspective of the different
                 characteristics a robotic system may have and give
                 examples of successful FDD approaches, and (2) we
                 elaborate on FDD from the perspective of the different
                 FDD approaches and analyze the advantages and
                 disadvantages of each approach with respect to robotic
                 systems. Finally, we describe research opportunities
                 for robotic systems' FDD. With these three
                 contributions, readers from the FDD research
                 communities are introduced to FDD for robotic systems,
                 and the robotics research community is introduced to
                 the field of FDD.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pouyanfar:2018:MBD,
  author =       "Samira Pouyanfar and Yimin Yang and Shu-Ching Chen and
                 Mei-Ling Shyu and S. S. Iyengar",
  title =        "Multimedia Big Data Analytics: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "10:1--10:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3150226",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "With the proliferation of online services and mobile
                 technologies, the world has stepped into a multimedia
                 big data era. A vast amount of research work has been
                 done in the multimedia area, targeting different
                 aspects of big data analytics, such as the capture,
                 storage, indexing, mining, and retrieval of multimedia
                 big data. However, very few research work provides a
                 complete survey of the whole pine-line of the
                 multimedia big data analytics, including the management
                 and analysis of the large amount of data, the
                 challenges and opportunities, and the promising
                 research directions. To serve this purpose, we present
                 this survey, which conducts a comprehensive overview of
                 the state-of-the-art research work on multimedia big
                 data analytics. It also aims to bridge the gap between
                 multimedia challenges and big data solutions by
                 providing the current big data frameworks, their
                 applications in multimedia analyses, the strengths and
                 limitations of the existing methods, and the potential
                 future directions in multimedia big data analytics. To
                 the best of our knowledge, this is the first survey
                 that targets the most recent multimedia management
                 techniques for very large-scale data and also provides
                 the research studies and technologies advancing the
                 multimedia analyses in this big data era.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gritzalis:2018:ERA,
  author =       "Dimitris Gritzalis and Giulia Iseppi and Alexios
                 Mylonas and Vasilis Stavrou",
  title =        "Exiting the Risk Assessment Maze: a Meta-Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "11:1--11:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3145905",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Organizations are exposed to threats that increase the
                 risk factor of their ICT systems. The assurance of
                 their protection is crucial, as their reliance on
                 information technology is a continuing challenge for
                 both security experts and chief executives. As risk
                 assessment could be a necessary process in an
                 organization, one of its deliverables could be utilized
                 in addressing threats and thus facilitate the
                 development of a security strategy. Given the large
                 number of heterogeneous methods and risk assessment
                 tools that exist, comparison criteria can provide
                 better understanding of their options and
                 characteristics and facilitate the selection of a
                 method that best fits an organization's needs. This
                 article aims to address the problem of selecting an
                 appropriate risk assessment method to assess and manage
                 information security risks, by proposing a set of
                 comparison criteria, grouped into four categories.
                 Based upon them, it provides a comparison of the 10
                 popular risk assessment methods that could be utilized
                 by organizations to determine the method that is more
                 suitable for their needs. Finally, a case study is
                 presented to demonstrate the selection of a method
                 based on the proposed criteria.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nashat:2018:CTF,
  author =       "Dalia Nashat and Ali A. Amer",
  title =        "A Comprehensive Taxonomy of Fragmentation and
                 Allocation Techniques in Distributed Database Design",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "12:1--12:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3150223",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The need to design an optimally distributed database
                 is increasingly important with the growth of
                 information technology and computer networks. However,
                 designing a distributed database is an extremely
                 complex process due to a large number of geographically
                 distributed sites and database relations. Moreover,
                 decreasing communication costs and query response time
                 should be taken into consideration. There are three
                 main techniques applied to design a distributed
                 database, namely Fragmentation, Data allocation, and
                 Replication. It is notable that these techniques are
                 often treated separately and rarely processed together.
                 Some available allocation methods are applied
                 regardless of how the fragmentation technique is
                 performed or replication process is adopted. In
                 contrast, other fragmentation techniques do not
                 consider the allocation or the replication techniques.
                 Therefore, the first and foremost step for designing an
                 optimal database is to develop a comprehensive
                 understanding of the current fragmentation,
                 replication, and allocation techniques and their
                 disadvantages. This article presents an attempt to
                 fulfill this step by proposing a comprehensive taxonomy
                 of the available fragmentation and allocation
                 techniques in distributed database design. The article
                 also discusses some case studies of these techniques
                 for a deeper understanding of its achievements and
                 limitations.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhou:2018:ATM,
  author =       "Bowen Zhou and Rajkumar Buyya",
  title =        "Augmentation Techniques for Mobile Cloud Computing: a
                 Taxonomy, Survey, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "13:1--13:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3152397",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Despite the rapid growth of hardware capacity and
                 popularity in mobile devices, limited resources in
                 battery and processing capacity still lack the ability
                 to meet increasing mobile users' demands. Both
                 conventional techniques and emerging approaches are
                 brought together to fill this gap between user demand
                 and mobile devices' limited capabilities. Recent
                 research has focused on enhancing the performance of
                 mobile devices via augmentation techniques.
                 Augmentation techniques for mobile cloud computing
                 refer to the computing paradigms and solutions to
                 outsource mobile device computation and storage to more
                 powerful computing resources in order to enhance a
                 mobile device's computing capability and energy
                 efficiency (e.g., code offloading). Adopting
                 augmentation techniques in the heterogeneous and
                 intermittent mobile cloud computing environment creates
                 new challenges for computation management, energy
                 efficiency, and system reliability. In this article, we
                 aim to provide a comprehensive taxonomy and survey of
                 the existing techniques and frameworks for mobile cloud
                 augmentation regarding both computation and storage.
                 Different from the existing taxonomies in this field,
                 we focus on the techniques aspect, following the idea
                 of realizing a complete mobile cloud computing system.
                 The objective of this survey is to provide a guide on
                 what available augmentation techniques can be adopted
                 in mobile cloud computing systems as well as supporting
                 mechanisms such as decision-making and fault tolerance
                 policies for realizing reliable mobile cloud services.
                 We also present a discussion on the open challenges and
                 future research directions in this field.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Marvel:2018:MRA,
  author =       "Jeremy A. Marvel and Roger Bostelman and Joe Falco",
  title =        "Multi-Robot Assembly Strategies and Metrics",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "14:1--14:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3150225",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "We present a survey of multi-robot assembly
                 applications and methods and describe trends and
                 general insights into the multi-robot assembly problem
                 for industrial applications. We focus on fixtureless
                 assembly strategies featuring two or more robotic
                 systems. Such robotic systems include industrial robot
                 arms, dexterous robotic hands, and autonomous mobile
                 platforms, such as automated guided vehicles. In this
                 survey, we identify the types of assemblies that are
                 enabled by utilizing multiple robots, the algorithms
                 that synchronize the motions of the robots to complete
                 the assembly operations, and the metrics used to assess
                 the quality and performance of the assemblies.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gaziel-Yablowitz:2018:RAF,
  author =       "Michal Gaziel-Yablowitz and David G. Schwartz",
  title =        "A Review and Assessment Framework for Mobile-Based
                 Emergency Intervention Apps",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "15:1--15:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3145846",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Smartphone applications to support healthcare are
                 proliferating. A growing and important subset of these
                 apps supports emergency medical intervention to address
                 a wide range of illness-related emergencies to speed
                 the arrival of relevant treatment. The emergency
                 response characteristics and strategies employed by
                 these apps are the focus of this study, resulting in an
                 mHealth Emergency Strategy Index. While a growing body
                 of knowledge focuses on usability, safety, and privacy
                 aspects that characterize such apps, studies that map
                 the various emergency intervention strategies and
                 suggest assessment indicators to evaluate their role as
                 emergency agents are limited. We survey an extensive
                 range of mHealth apps designed for emergency response
                 along with the related assessment literature and
                 present an index for mobile-based medical emergency
                 intervention apps that can address future assessment
                 needs of mHealth apps.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Al-Garadi:2018:AOS,
  author =       "Mohammed Ali Al-Garadi and Kasturi Dewi Varathan and
                 Sri Devi Ravana and Ejaz Ahmed and Ghulam Mujtaba and
                 Muhammad Usman Shahid Khan and Samee U. Khan",
  title =        "Analysis of Online Social Network Connections for
                 Identification of Influential Users: Survey and Open
                 Research Issues",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "16:1--16:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3155897",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Online social networks (OSNs) are structures that help
                 users to interact, exchange, and propagate new ideas.
                 The identification of the influential users in OSNs is
                 a significant process for accelerating the propagation
                 of information that includes marketing applications or
                 hindering the dissemination of unwanted contents, such
                 as viruses, negative online behaviors, and rumors. This
                 article presents a detailed survey of influential
                 users' identification algorithms and their performance
                 evaluation approaches in OSNs. The survey covers recent
                 techniques, applications, and open research issues on
                 analysis of OSN connections for identification of
                 influential users.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Monperrus:2018:ASR,
  author =       "Martin Monperrus",
  title =        "Automatic Software Repair: a Bibliography",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "17:1--17:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3105906",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article presents a survey on automatic software
                 repair. Automatic software repair consists of
                 automatically finding a solution to software bugs
                 without human intervention. This article considers all
                 kinds of repairs. First, it discusses behavioral repair
                 where test suites, contracts, models, and crashing
                 inputs are taken as oracle. Second, it discusses state
                 repair, also known as runtime repair or runtime
                 recovery, with techniques such as checkpoint and
                 restart, reconfiguration, and invariant restoration.
                 The uniqueness of this article is that it spans the
                 research communities that contribute to this body of
                 knowledge: software engineering, dependability,
                 operating systems, programming languages, and security.
                 It provides a novel and structured overview of the
                 diversity of bug oracles and repair operators used in
                 the literature.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ding:2018:OSA,
  author =       "Zhijun Ding and Xiaolun Li and Changjun Jiang and
                 Mengchu Zhou",
  title =        "Objectives and State-of-the-Art of Location-Based
                 Social Network Recommender Systems",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "18:1--18:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3154526",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Because of the widespread adoption of GPS-enabled
                 devices, such as smartphones and GPS navigation
                 devices, more and more location information is being
                 collected and available. Compared with traditional ones
                 (e.g., Amazon, Taobao, and Dangdang), recommender
                 systems built on location-based social networks (LBSNs)
                 have received much attention. The former mine users'
                 preferences through the relationship between users and
                 items, e.g., online commodity, movies and music. The
                 latter add location information as a new dimension to
                 the former, hence resulting in a three-dimensional
                 relationship among users, locations, and activities. In
                 this article, we summarize LBSN recommender systems
                 from the perspective of such a relationship. User,
                 activity, and location are called objects, and
                 recommender objectives are formed and achieved by
                 mining and using such 3D relationships. From the
                 perspective of the 3D relationship among these objects,
                 we summarize the state-of-the-art of LBSN recommender
                 systems to fulfill the related objectives. We finally
                 indicate some future research directions in this
                 area.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Coutinho:2018:UWS,
  author =       "Rodolfo W. L. Coutinho and Azzedine Boukerche and Luiz
                 F. M. Vieira and Antonio A. F. Loureiro",
  title =        "Underwater Wireless Sensor Networks: a New Challenge
                 for Topology Control-Based Systems",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "19:1--19:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3154834",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Underwater wireless sensor networks (UWSNs) will pave
                 the way for a new era of underwater monitoring and
                 actuation applications. The envisioned landscape of
                 UWSN applications will help us learn more about our
                 oceans, as well as about what lies beneath them. They
                 are expected to change the current reality where no
                 more than 5\% of the volume of the oceans has been
                 observed by humans. However, to enable large
                 deployments of UWSNs, networking solutions toward
                 efficient and reliable underwater data collection need
                 to be investigated and proposed. In this context, the
                 use of topology control algorithms for a suitable,
                 autonomous, and on-the-fly organization of the UWSN
                 topology might mitigate the undesired effects of
                 underwater wireless communications and consequently
                 improve the performance of networking services and
                 protocols designed for UWSNs. This article presents and
                 discusses the intrinsic properties, potentials, and
                 current research challenges of topology control in
                 underwater sensor networks. We propose to classify
                 topology control algorithms based on the principal
                 methodology used to change the network topology. They
                 can be categorized in three major groups: power
                 control, wireless interface mode management, and
                 mobility assisted-based techniques. Using the proposed
                 classification, we survey the current state of the art
                 and present an in-depth discussion of topology control
                 solutions designed for UWSNs.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bruno:2018:SGC,
  author =       "Rodrigo Bruno and Paulo Ferreira",
  title =        "A Study on Garbage Collection Algorithms for Big Data
                 Environments",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "20:1--20:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3156818",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2010.bib",
  abstract =     "The need to process and store massive amounts of
                 data-Big Data-is a reality. In areas such as scientific
                 experiments, social networks management, credit card
                 fraud detection, targeted advertisement, and financial
                 analysis, massive amounts of information are generated
                 and processed daily to extract valuable, summarized
                 information. Due to its fast development cycle (i.e.,
                 less expensive to develop), mainly because of automatic
                 memory management, and rich community resources,
                 managed object-oriented programming languages (e.g.,
                 Java) are the first choice to develop Big Data
                 platforms (e.g., Cassandra, Spark) on which such Big
                 Data applications are executed. However, automatic
                 memory management comes at a cost. This cost is
                 introduced by the garbage collector, which is
                 responsible for collecting objects that are no longer
                 being used. Although current (classic) garbage
                 collection algorithms may be applicable to small-scale
                 applications, these algorithms are not appropriate for
                 large-scale Big Data environments, as they do not scale
                 in terms of throughput and pause times. In this work,
                 current Big Data platforms and their memory profiles
                 are studied to understand why classic algorithms (which
                 are still the most commonly used) are not appropriate,
                 and also to analyze recently proposed and relevant
                 memory management algorithms, targeted to Big Data
                 environments. The scalability of recent memory
                 management algorithms is characterized in terms of
                 throughput (improves the throughput of the application)
                 and pause time (reduces the latency of the application)
                 when compared to classic algorithms. The study is
                 concluded by presenting a taxonomy of the described
                 works and some open problems, with regard to Big Data
                 memory management, that could be addressed in future
                 works.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Draghici:2018:STA,
  author =       "Adriana Draghici and Maarten {Van Steen}",
  title =        "A Survey of Techniques for Automatically Sensing the
                 Behavior of a Crowd",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "21:1--21:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3129343",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Crowd-centric research is receiving increasingly more
                 attention as datasets on crowd behavior are becoming
                 readily available. We have come to a point where many
                 of the models on pedestrian analytics introduced in the
                 last decade, which have mostly not been validated, can
                 now be tested using real-world datasets. In this
                 survey, we concentrate exclusively on automatically
                 gathering such datasets, which we refer to as sensing
                 the behavior of pedestrians. We roughly distinguish two
                 approaches: one that requires users to explicitly use
                 local applications and wearables, and one that scans
                 the presence of handheld devices such as smartphones.
                 We come to the conclusion that despite the numerous
                 reports in popular media, relatively few groups have
                 been looking into practical solutions for sensing
                 pedestrian behavior. Moreover, we find that much work
                 is still needed, in particular when it comes to
                 combining privacy, transparency, scalability, and ease
                 of deployment. We report on over 90 relevant articles
                 and discuss and compare in detail 30 reports on sensing
                 pedestrian behavior.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bergmayr:2018:SRC,
  author =       "Alexander Bergmayr and Uwe Breitenb{\"u}cher and
                 Nicolas Ferry and Alessandro Rossini and Arnor Solberg
                 and Manuel Wimmer and Gerti Kappel and Frank Leymann",
  title =        "A Systematic Review of Cloud Modeling Languages",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "1",
  pages =        "22:1--22:??",
  month =        apr,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3150227",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Modern cloud computing environments support a
                 relatively high degree of automation in service
                 provisioning, which allows cloud service customers
                 (CSCs) to dynamically acquire services required for
                 deploying cloud applications. Cloud modeling languages
                 (CMLs) have been proposed to address the diversity of
                 features provided by cloud computing environments and
                 support different application scenarios, such as
                 migrating existing applications to the cloud,
                 developing new cloud applications, or optimizing them.
                 There is, however, still much debate in the research
                 community on what a CML is, and what aspects of a cloud
                 application and its target cloud computing environment
                 should be modeled by a CML. Furthermore, the
                 distinction between CMLs on a fine-grain level exposing
                 their modeling concepts is rarely made. In this
                 article, we investigate the diverse features currently
                 provided by existing CMLs. We classify and compare them
                 according to a common framework with the goal to
                 support CSCs in selecting the CML that fits the needs
                 of their application scenario and setting. As a result,
                 not only features of existing CMLs are pointed out for
                 which extensive support is already provided but also in
                 which existing CMLs are deficient, thereby suggesting a
                 research agenda.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Boito:2018:CRP,
  author =       "Francieli Zanon Boito and Eduardo C. Inacio and Jean
                 Luca Bez and Philippe O. A. Navaux and Mario A. R.
                 Dantas and Yves Denneulin",
  title =        "A Checkpoint of Research on Parallel {I/O} for
                 High-Performance Computing",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "23:1--23:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3152891",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/super.bib",
  abstract =     "We present a comprehensive survey on parallel I/O in
                 the high-performance computing (HPC) context. This is
                 an important field for HPC because of the historic gap
                 between processing power and storage latency, which
                 causes application performance to be impaired when
                 accessing or generating large amounts of data. As the
                 available processing power and amount of data increase,
                 I/O remains a central issue for the scientific
                 community. In this survey article, we focus on a
                 traditional I/O stack, with a POSIX parallel file
                 system. We present background concepts everyone could
                 benefit from. Moreover, through the comprehensive study
                 of publications from the most important conferences and
                 journals in a 5-year time window, we discuss the state
                 of the art in I/O optimization approaches, access
                 pattern extraction techniques, and performance
                 modeling, in addition to general aspects of parallel
                 I/O research. With this approach, we aim at identifying
                 the general characteristics of the field and the main
                 current and future research topics.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Brugere:2018:NSI,
  author =       "Ivan Brugere and Brian Gallagher and Tanya Y.
                 Berger-Wolf",
  title =        "Network Structure Inference, A Survey: Motivations,
                 Methods, and Applications",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "24:1--24:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3154524",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Networks represent relationships between entities in
                 many complex systems, spanning from online social
                 interactions to biological cell development and brain
                 connectivity. In many cases, relationships between
                 entities are unambiguously known: are two users
                 ``friends'' in a social network? Do two researchers
                 collaborate on a published article? Do two road
                 segments in a transportation system intersect? These
                 are directly observable in the system in question. In
                 most cases, relationships between nodes are not
                 directly observable and must be inferred: Does one gene
                 regulate the expression of another? Do two animals who
                 physically co-locate have a social bond? Who infected
                 whom in a disease outbreak in a population? Existing
                 approaches for inferring networks from data are found
                 across many application domains and use specialized
                 knowledge to infer and measure the quality of inferred
                 network for a specific task or hypothesis. However,
                 current research lacks a rigorous methodology that
                 employs standard statistical validation on inferred
                 models. In this survey, we examine (1) how network
                 representations are constructed from underlying data,
                 (2) the variety of questions and tasks on these
                 representations over several domains, and (3)
                 validation strategies for measuring the inferred
                 network's capability of answering questions on the
                 system of interest.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhang:2018:FEA,
  author =       "Ligang Zhang and Brijesh Verma and Dian Tjondronegoro
                 and Vinod Chandran",
  title =        "Facial Expression Analysis under Partial Occlusion: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "25:1--25:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3158369",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Automatic machine-based Facial Expression Analysis
                 (FEA) has made substantial progress in the past few
                 decades driven by its importance for applications in
                 psychology, security, health, entertainment, and
                 human-computer interaction. The vast majority of
                 completed FEA studies are based on nonoccluded faces
                 collected in a controlled laboratory environment.
                 Automatic expression recognition tolerant to partial
                 occlusion remains less understood, particularly in
                 real-world scenarios. In recent years, efforts
                 investigating techniques to handle partial occlusion
                 for FEA have seen an increase. The context is right for
                 a comprehensive perspective of these developments and
                 the state of the art from this perspective. This survey
                 provides such a comprehensive review of recent advances
                 in dataset creation, algorithm development, and
                 investigations of the effects of occlusion critical for
                 robust performance in FEA systems. It outlines existing
                 challenges in overcoming partial occlusion and
                 discusses possible opportunities in advancing the
                 technology. To the best of our knowledge, it is the
                 first FEA survey dedicated to occlusion and aimed at
                 promoting better-informed and benchmarked future
                 work.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gebai:2018:SAK,
  author =       "Mohamad Gebai and Michel R. Dagenais",
  title =        "Survey and Analysis of Kernel and Userspace Tracers on
                 {Linux}: Design, Implementation, and Overhead",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "26:1--26:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3158644",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  abstract =     "As applications and operating systems are becoming
                 more complex, the last decade has seen the rise of many
                 tracing tools all across the software stack. This
                 article presents a hands-on comparison of modern
                 tracers on Linux systems, both in user space and kernel
                 space. The authors implement microbenchmarks that not
                 only quantify the overhead of different tracers, but
                 also sample fine-grained metrics that unveil insights
                 into the tracers' internals and show the cause of each
                 tracer's overhead. Internal design choices and
                 implementation particularities are discussed, which
                 helps us to understand the challenges of developing
                 tracers. Furthermore, this analysis aims to help users
                 choose and configure their tracers based on their
                 specific requirements to reduce their overhead and get
                 the most of out of them.",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rojas:2018:WRD,
  author =       "Elisa Rojas and Roberto Doriguzzi-Corin and Sergio
                 Tamurejo and Andres Beato and Arne Schwabe and Kevin
                 Phemius and Carmen Guerrero",
  title =        "Are We Ready to Drive Software-Defined Networks? {A}
                 Comprehensive Survey on Management Tools and
                 Techniques",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "27:1--27:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3165290",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In the context of the emergent Software-Defined
                 Networking (SDN) paradigm, the attention is mostly
                 directed to the evolution of control protocols and
                 networking functionalities. However, network
                 professionals also need the right tools to reach the
                 same level-and beyond-of monitoring and control they
                 have in traditional networks. Current SDN tools are
                 developed on an ad hoc basis, for specific SDN
                 frameworks, while production environments demand
                 standard platforms and easy integration. This survey
                 aims to foster the definition of the next generation
                 SDN management framework by providing the readers a
                 thorough overview of existing SDN tools and main
                 research directions.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lamb:2018:ECC,
  author =       "Carolyn Lamb and Daniel G. Brown and Charles L. A.
                 Clarke",
  title =        "Evaluating Computational Creativity: an
                 Interdisciplinary Tutorial",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "28:1--28:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3167476",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This article is a tutorial for researchers who are
                 designing software to perform a creative task and want
                 to evaluate their system using interdisciplinary
                 theories of creativity. Researchers who study human
                 creativity have a great deal to offer computational
                 creativity. We summarize perspectives from psychology,
                 philosophy, cognitive science, and computer science as
                 to how creativity can be measured both in humans and in
                 computers. We survey how these perspectives have been
                 used in computational creativity research and make
                 recommendations for how they should be used.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fathy:2018:LSI,
  author =       "Yasmin Fathy and Payam Barnaghi and Rahim Tafazolli",
  title =        "Large-Scale Indexing, Discovery, and Ranking for the
                 {Internet of Things (IoT)}",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "29:1--29:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3154525",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Network-enabled sensing and actuation devices are key
                 enablers to connect real-world objects to the cyber
                 world. The Internet of Things (IoT) consists of the
                 network-enabled devices and communication technologies
                 that allow connectivity and integration of physical
                 objects (Things) into the digital world (Internet).
                 Enormous amounts of dynamic IoT data are collected from
                 Internet-connected devices. IoT data are usually
                 multi-variant streams that are heterogeneous, sporadic,
                 multi-modal, and spatio-temporal. IoT data can be
                 disseminated with different granularities and have
                 diverse structures, types, and qualities. Dealing with
                 the data deluge from heterogeneous IoT resources and
                 services imposes new challenges on indexing, discovery,
                 and ranking mechanisms that will allow building
                 applications that require on-line access and retrieval
                 of ad-hoc IoT data. However, the existing IoT data
                 indexing and discovery approaches are complex or
                 centralised, which hinders their scalability. The
                 primary objective of this article is to provide a
                 holistic overview of the state-of-the-art on indexing,
                 discovery, and ranking of IoT data. The article aims to
                 pave the way for researchers to design, develop,
                 implement, and evaluate techniques and approaches for
                 on-line large-scale distributed IoT applications and
                 services.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Siabato:2018:SMT,
  author =       "Willington Siabato and Christophe Claramunt and Sergio
                 Ilarri and Miguel Angel Manso-Callejo",
  title =        "A Survey of Modelling Trends in Temporal {GIS}",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "30:1--30:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3141772",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The main achievements of spatio-temporal modelling in
                 the field of Geographic Information Science that spans
                 the past three decades are surveyed. This article
                 offers an overview of: (i) the origins and history of
                 Temporal Geographic Information Systems (T-GIS); (ii)
                 relevant spatio-temporal data models proposed; (iii)
                 the evolution of spatio-temporal modelling trends; and
                 (iv) an analysis of the future trends and developments
                 in T-GIS. It also presents some current theories and
                 concepts that have emerged from the research performed,
                 as well as a summary of the current progress and the
                 upcoming challenges and potential research directions
                 for T-GIS. One relevant result of this survey is the
                 proposed taxonomy of spatio-temporal modelling trends,
                 which classifies 186 modelling proposals surveyed from
                 more than 1,450 articles.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shan:2018:PSC,
  author =       "Zihao Shan and Kui Ren and Marina Blanton and Cong
                 Wang",
  title =        "Practical Secure Computation Outsourcing: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "31:1--31:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3158363",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The rapid development of cloud computing promotes a
                 wide deployment of data and computation outsourcing to
                 cloud service providers by resource-limited entities.
                 Based on a pay-per-use model, a client without enough
                 computational power can easily outsource large-scale
                 computational tasks to a cloud. Nonetheless, the issue
                 of security and privacy becomes a major concern when
                 the customer's sensitive or confidential data is not
                 processed in a fully trusted cloud environment.
                 Recently, a number of publications have been proposed
                 to investigate and design specific secure outsourcing
                 schemes for different computational tasks. The aim of
                 this survey is to systemize and present the
                 cutting-edge technologies in this area. It starts by
                 presenting security threats and requirements, followed
                 with other factors that should be considered when
                 constructing secure computation outsourcing schemes. In
                 an organized way, we then dwell on the existing secure
                 outsourcing solutions to different computational tasks
                 such as matrix computations, mathematical optimization,
                 and so on, treating data confidentiality as well as
                 computation integrity. Finally, we provide a discussion
                 of the literature and a list of open challenges in the
                 area.",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zubiaga:2018:DRR,
  author =       "Arkaitz Zubiaga and Ahmet Aker and Kalina Bontcheva
                 and Maria Liakata and Rob Procter",
  title =        "Detection and Resolution of Rumours in Social Media: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "32:1--32:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3161603",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Despite the increasing use of social media platforms
                 for information and news gathering, its unmoderated
                 nature often leads to the emergence and spread of
                 rumours, i.e., items of information that are unverified
                 at the time of posting. At the same time, the openness
                 of social media platforms provides opportunities to
                 study how users share and discuss rumours, and to
                 explore how to automatically assess their veracity,
                 using natural language processing and data mining
                 techniques. In this article, we introduce and discuss
                 two types of rumours that circulate on social media:
                 long-standing rumours that circulate for long periods
                 of time, and newly emerging rumours spawned during
                 fast-paced events such as breaking news, where reports
                 are released piecemeal and often with an unverified
                 status in their early stages. We provide an overview of
                 research into social media rumours with the ultimate
                 goal of developing a rumour classification system that
                 consists of four components: rumour detection, rumour
                 tracking, rumour stance classification, and rumour
                 veracity classification. We delve into the approaches
                 presented in the scientific literature for the
                 development of each of these four components. We
                 summarise the efforts and achievements so far toward
                 the development of rumour classification systems and
                 conclude with suggestions for avenues for future
                 research in social media mining for the detection and
                 resolution of rumours.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dayarathna:2018:RAE,
  author =       "Miyuru Dayarathna and Srinath Perera",
  title =        "Recent Advancements in Event Processing",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "33:1--33:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3170432",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Event processing (EP) is a data processing technology
                 that conducts online processing of event information.
                 In this survey, we summarize the latest cutting-edge
                 work done on EP from both industrial and academic
                 research community viewpoints. We divide the entire
                 field of EP into three subareas: EP system
                 architectures, EP use cases, and EP open research
                 topics. Then we deep dive into the details of each
                 subsection. We investigate the system architecture
                 characteristics of novel EP platforms, such as Apache
                 Storm, Apache Spark, and Apache Flink. We found
                 significant advancements made on novel application
                 areas, such as the Internet of Things; streaming
                 machine learning (ML); and processing of complex data
                 types such as text, video data streams, and graphs.
                 Furthermore, there has been significant body of
                 contributions made on event ordering, system
                 scalability, development of EP languages and
                 exploration of use of heterogeneous devices for EP,
                 which we investigate in the latter half of this
                 article. Through our study, we found key areas that
                 require significant attention from the EP community,
                 such as Streaming ML, EP system benchmarking, and graph
                 stream processing.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Soo:2018:SLB,
  author =       "Wooi King Soo and Teck-Chaw Ling and Aung Htein Maw
                 and Su Thawda Win",
  title =        "Survey on Load-Balancing Methods in 802.11
                 Infrastructure Mode Wireless Networks for Improving
                 Quality of Service",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "34:1--34:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3172868",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Traffic load in any 802.11 infrastructure mode network
                 is typically distributed unevenly between access points
                 (APs), creating hotspots. This is due to the inherent
                 nature of wireless area networks (WLANs), where
                 stations are free to associate to any known AP they
                 desire, and the lack of control by the APs themselves.
                 This imbalance creates a condition where affected APs
                 in the network suffer traffic congestion while others
                 are underutilized, leading to stations experiencing
                 lower throughput, longer latency, and operating below
                 the network potential capacity. To alleviate this
                 problem, some form of load balancing is required to
                 redistribute the work load among other available APs in
                 the wireless network. This article presents a survey of
                 the various works done in performing load balancing in
                 an infrastructure mode wireless network and will cover
                 the common methods including admission control,
                 association management, cell breathing, and association
                 control. Updates to the IEEE standards are also
                 presented that support load-balancing efforts. Finally,
                 software-defined networks are investigated to determine
                 the extent of control integration to support managing
                 and load-balancing WLANs. Trends in load-balancing
                 research are also uncovered that indicate how the
                 introduction of new wireless standards influences the
                 amount of research.",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rossetti:2018:CDD,
  author =       "Giulio Rossetti and R{\'e}my Cazabet",
  title =        "Community Discovery in Dynamic Networks: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "35:1--35:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3172867",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Several research studies have shown that complex
                 networks modeling real-world phenomena are
                 characterized by striking properties: (i) they are
                 organized according to community structure, and (ii)
                 their structure evolves with time. Many researchers
                 have worked on methods that can efficiently unveil
                 substructures in complex networks, giving birth to the
                 field of community discovery. A novel and fascinating
                 problem started capturing researcher interest recently:
                 the identification of evolving communities. Dynamic
                 networks can be used to model the evolution of a
                 system: nodes and edges are mutable, and their
                 presence, or absence, deeply impacts the community
                 structure that composes them. This survey aims to
                 present the distinctive features and challenges of
                 dynamic community discovery and propose a
                 classification of published approaches. As a ``user
                 manual,'' this work organizes state-of-the-art
                 methodologies into a taxonomy, based on their
                 rationale, and their specific instantiation. Given a
                 definition of network dynamics, desired community
                 characteristics, and analytical needs, this survey will
                 support researchers to identify the set of approaches
                 that best fit their needs. The proposed classification
                 could also help researchers choose in which direction
                 to orient their future research.",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Toch:2018:PIC,
  author =       "Eran Toch and Claudio Bettini and Erez Shmueli and
                 Laura Radaelli and Andrea Lanzi and Daniele Riboni and
                 Bruno Lepri",
  title =        "The Privacy Implications of Cyber Security Systems: a
                 Technological Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "36:1--36:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3172869",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Cyber-security systems, which protect networks and
                 computers against cyber attacks, are becoming common
                 due to increasing threats and government regulation. At
                 the same time, the enormous amount of data gathered by
                 cyber-security systems poses a serious threat to the
                 privacy of the people protected by those systems. To
                 ground this threat, we survey common and novel
                 cyber-security technologies and analyze them according
                 to the potential for privacy invasion. We suggest a
                 taxonomy for privacy risks assessment of information
                 security technologies, based on the level of data
                 exposure, the level of identification of individual
                 users, the data sensitivity and the user control over
                 the monitoring, and collection and analysis of the
                 data. We discuss our results in light of the recent
                 technological trends and suggest several new directions
                 for making these mechanisms more privacy-aware.",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Saputra:2018:VSS,
  author =       "Muhamad Risqi U. Saputra and Andrew Markham and Niki
                 Trigoni",
  title =        "Visual {SLAM} and Structure from Motion in Dynamic
                 Environments: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "37:1--37:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3177853",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In the last few decades, Structure from Motion (SfM)
                 and visual Simultaneous Localization and Mapping
                 (visual SLAM) techniques have gained significant
                 interest from both the computer vision and robotic
                 communities. Many variants of these techniques have
                 started to make an impact in a wide range of
                 applications, including robot navigation and augmented
                 reality. However, despite some remarkable results in
                 these areas, most SfM and visual SLAM techniques
                 operate based on the assumption that the observed
                 environment is static. However, when faced with moving
                 objects, overall system accuracy can be jeopardized. In
                 this article, we present for the first time a survey of
                 visual SLAM and SfM techniques that are targeted toward
                 operation in dynamic environments. We identify three
                 main problems: how to perform reconstruction (robust
                 visual SLAM), how to segment and track dynamic objects,
                 and how to achieve joint motion segmentation and
                 reconstruction. Based on this categorization, we
                 provide a comprehensive taxonomy of existing
                 approaches. Finally, the advantages and disadvantages
                 of each solution class are critically discussed from
                 the perspective of practicality and robustness.",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ghanbari:2018:OQS,
  author =       "Hadi Ghanbari and Tero Vartiainen and Mikko Siponen",
  title =        "Omission of Quality Software Development Practices: a
                 Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "38:1--38:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3177746",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Software deficiencies are minimized by utilizing
                 recommended software development and quality assurance
                 practices. However, these recommended practices (i.e.,
                 quality practices) become ineffective if software
                 professionals purposefully ignore them. Conducting a
                 systematic literature review (n = 4,838), we discovered
                 that only a small number of previous studies, within
                 software engineering and information systems
                 literature, have investigated the omission of quality
                 practices. These studies explain the omission of
                 quality practices mainly as a result of organizational
                 decisions and trade-offs made under resource
                 constraints or market pressure. However, our study
                 indicates that different aspects of this phenomenon
                 deserve further research. In particular, future
                 research must investigate the conditions triggering the
                 omission of quality practices and the processes through
                 which this phenomenon occurs. Especially, since
                 software development is a human-centric phenomenon, the
                 psychological and behavioral aspects of this process
                 deserve in-depth empirical investigation. In addition,
                 futures research must clarify the social,
                 organizational, and economical consequences of ignoring
                 quality practices. Gaining in-depth theoretically sound
                 and empirically grounded understandings about different
                 aspects of this phenomenon enables research and
                 practice to suggest interventions to overcome this
                 issue.",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Li:2018:EOC,
  author =       "Chao Li and Yushu Xue and Jing Wang and Weigong Zhang
                 and Tao Li",
  title =        "Edge-Oriented Computing Paradigms: a Survey on
                 Architecture Design and System Management",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "39:1--39:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3154815",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "While cloud computing has brought paradigm shifts to
                 computing services, researchers and developers have
                 also found some problems inherent to its nature such as
                 bandwidth bottleneck, communication overhead, and
                 location blindness. The concept of fog/edge computing
                 is therefore coined to extend the services from the
                 core in cloud data centers to the edge of the network.
                 In recent years, many systems are proposed to better
                 serve ubiquitous smart devices closer to the user. This
                 article provides a complete and up-to-date review of
                 edge-oriented computing systems by encapsulating
                 relevant proposals on their architecture features,
                 management approaches, and design objectives.",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Davoudian:2018:SNS,
  author =       "Ali Davoudian and Liu Chen and Mengchi Liu",
  title =        "A Survey on {NoSQL} Stores",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "40:1--40:43",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3158661",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Recent demands for storing and querying big data have
                 revealed various shortcomings of traditional relational
                 database systems. This, in turn, has led to the
                 emergence of a new kind of complementary nonrelational
                 data store, named as NoSQL. This survey mainly aims at
                 elucidating the design decisions of NoSQL stores with
                 regard to the four nonorthogonal design principles of
                 distributed database systems: data model, consistency
                 model, data partitioning, and the CAP theorem. For each
                 principle, its available strategies and corresponding
                 features, strengths, and drawbacks are explained.
                 Furthermore, various implementations of each strategy
                 are exemplified and crystallized through a collection
                 of representative academic and industrial NoSQL
                 technologies. Finally, we disclose some existing
                 challenges in developing effective NoSQL stores, which
                 need attention of the research community, application
                 designers, and architects.",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rodrigues:2018:UGA,
  author =       "Davi Silva Rodrigues and M{\'a}rcio Eduardo Delamaro
                 and Cl{\'e}ber Gimenez Corr{\^e}a and F{\'a}tima L. S.
                 Nunes",
  title =        "Using Genetic Algorithms in Test Data Generation: a
                 Critical Systematic Mapping",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "41:1--41:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3182659",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Software testing activities account for a considerable
                 portion of systems development cost and, for this
                 reason, many studies have sought to automate these
                 activities. Test data generation has a high cost
                 reduction potential (especially for complex domain
                 systems), since it can decrease human effort. Although
                 several studies have been published about this subject,
                 articles of reviews covering this topic usually focus
                 only on specific domains. This article presents a
                 systematic mapping aiming at providing a broad, albeit
                 critical, overview of the literature in the topic of
                 test data generation using genetic algorithms. The
                 selected studies were categorized by software testing
                 technique (structural, functional, or mutation testing)
                 for which test data were generated and according to the
                 most significantly adapted genetic algorithms aspects.
                 The most used evaluation metrics and software testing
                 techniques were identified. The results showed that
                 genetic algorithms have been successfully applied to
                 simple test data generation, but are rarely used to
                 generate complex test data such as images, videos,
                 sounds, and 3D (three-dimensional) models. From these
                 results, we discuss some challenges and opportunities
                 for research in this area.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Antunes:2018:SSH,
  author =       "Rodolfo S. Antunes and Lucas A. Seewald and Vinicius
                 F. Rodrigues and Cristiano A. {Da Costa} and Luiz
                 {Gonzaga, Jr.} and Rodrigo R. Righi and Andreas Maier
                 and Bj{\"o}rn Eskofier and Malte Ollenschl{\"a}ger and
                 Farzad Naderi and Rebecca Fahrig and Sebastian Bauer
                 and Sigrun Klein and Gelson Campanatti",
  title =        "A Survey of Sensors in Healthcare Workflow
                 Monitoring",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "42:1--42:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3177852",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Activities of a clinical staff in healthcare
                 environments must regularly be adapted to new treatment
                 methods, medications, and technologies. This constant
                 evolution requires the monitoring of the workflow, or
                 the sequence of actions from actors involved in a
                 procedure, to ensure quality of medical services. In
                 this context, recent advances in sensing technologies,
                 including Real-time Location Systems and Computer
                 Vision, enable high-precision tracking of actors and
                 equipment. The current state-of-the-art about
                 healthcare workflow monitoring typically focuses on a
                 single technology and does not discuss its integration
                 with others. Such an integration can lead to better
                 solutions to evaluate medical workflows. This study
                 aims to fill the gap regarding the analysis of
                 monitoring technologies with a systematic literature
                 review about sensors for capturing the workflow of
                 healthcare environments. Its main scientific
                 contribution is to identify both current technologies
                 used to track activities in a clinical environment and
                 gaps on their combination to achieve better results. It
                 also proposes a taxonomy to classify work regarding
                 sensing technologies and methods. The literature review
                 does not present proposals that combine data obtained
                 from Real-time Location Systems and Computer Vision
                 sensors. Further analysis shows that a multimodal
                 analysis is more flexible and could yield better
                 results.",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Turilli:2018:CPP,
  author =       "Matteo Turilli and Mark Santcroos and Shantenu Jha",
  title =        "A Comprehensive Perspective on Pilot-Job Systems",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "2",
  pages =        "43:1--43:??",
  month =        jun,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3177851",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Pilot-Job systems play an important role in supporting
                 distributed scientific computing. They are used to
                 execute millions of jobs on several
                 cyberinfrastructures worldwide, consuming billions of
                 CPU hours a year. With the increasing importance of
                 task-level parallelism in high-performance computing,
                 Pilot-Job systems are also witnessing an adoption
                 beyond traditional domains. Notwithstanding the growing
                 impact on scientific research, there is no agreement on
                 a definition of Pilot-Job system and no clear
                 understanding of the underlying abstraction and
                 paradigm. Pilot-Job implementations have proliferated
                 with no shared best practices or open interfaces and
                 little interoperability. Ultimately, this is hindering
                 the realization of the full impact of Pilot-Jobs by
                 limiting their robustness, portability, and
                 maintainability. This article offers a comprehensive
                 analysis of Pilot-Job systems critically assessing
                 their motivations, evolution, properties, and
                 implementation. The three main contributions of this
                 article are as follows: (1) an analysis of the
                 motivations and evolution of Pilot-Job systems; (2) an
                 outline of the Pilot abstraction, its distinguishing
                 logical components and functionalities, its
                 terminology, and its architecture pattern; and (3) the
                 description of core and auxiliary properties of
                 Pilot-Jobs systems and the analysis of six exemplar
                 Pilot-Job implementations. Together, these
                 contributions illustrate the Pilot paradigm, its
                 generality, and how it helps to address some challenges
                 in distributed scientific computing.",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Brandt:2018:GS,
  author =       "Tobias Brandt and Marco Grawunder",
  title =        "{GeoStreams}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "44:1--44:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3177848",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Positional data from small and mobile Global
                 Positioning Systems has become ubiquitous and allows
                 for many new applications such as road traffic or
                 vessel monitoring as well as location-based services.
                 To make these applications possible, for which
                 information on location is more important than ever,
                 streaming spatial data needs to be managed, mined, and
                 used intelligently. This article provides an overview
                 of previous work in this evolving research field and
                 discusses different applications as well as common
                 problems and solutions. The conclusion indicates
                 promising directions for future research.",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Murthy:2018:CBM,
  author =       "Y. V. Srinivasa Murthy and Shashidhar G. Koolagudi",
  title =        "Content-Based Music Information Retrieval {(CB-MIR)}
                 and Its Applications toward the Music Industry: a
                 Review",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "45:1--45:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3177849",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A huge increase in the number of digital music tracks
                 has created the necessity to develop an automated tool
                 to extract the useful information from these tracks. As
                 this information has to be extracted from the contents
                 of the music, it is known as content-based music
                 information retrieval (CB-MIR). In the past two
                 decades, several research outcomes have been observed
                 in the area of CB-MIR. There is a need to consolidate
                 and critically analyze these research findings to
                 evolve future research directions. In this survey
                 article, various tasks of CB-MIR and their applications
                 are critically reviewed. In particular, the article
                 focuses on eight MIR-related tasks such as
                 vocal/non-vocal segmentation, artist identification,
                 genre classification, raga identification,
                 query-by-humming, emotion recognition, instrument
                 recognition, and music clip annotation. The fundamental
                 concepts of Indian classical music are detailed to
                 attract future research on this topic. The article
                 elaborates on the signal-processing techniques to
                 extract useful features for performing specific tasks
                 mentioned above and discusses their strengths as well
                 as weaknesses. This article also points to some general
                 research issues in CB-MIR and probable approaches
                 toward their solutions so as to improve the efficiency
                 of the existing CB-MIR systems.",
  acknowledgement = ack-nhfb,
  articleno =    "45",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Barmpatsalou:2018:CFT,
  author =       "Konstantia Barmpatsalou and Tiago Cruz and Edmundo
                 Monteiro and Paulo Simoes",
  title =        "Current and Future Trends in Mobile Device Forensics:
                 a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "46:1--46:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3177847",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Contemporary mobile devices are the result of an
                 evolution process, during which computational and
                 networking capabilities have been continuously pushed
                 to keep pace with the constantly growing workload
                 requirements. This has allowed devices such as
                 smartphones, tablets, and personal digital assistants
                 to perform increasingly complex tasks, up to the point
                 of efficiently replacing traditional options such as
                 desktop computers and notebooks. However, due to their
                 portability and size, these devices are more prone to
                 theft, to become compromised, or to be exploited for
                 attacks and other malicious activity. The need for
                 investigation of the aforementioned incidents resulted
                 in the creation of the Mobile Forensics (MF)
                 discipline. MF, a sub-domain of digital forensics, is
                 specialized in extracting and processing evidence from
                 mobile devices in such a way that attacking entities
                 and actions are identified and traced. Beyond its
                 primary research interest on evidence acquisition from
                 mobile devices, MF has recently expanded its scope to
                 encompass the organized and advanced evidence
                 representation and analysis of future malicious entity
                 behavior. Nonetheless, data acquisition still remains
                 its main focus. While the field is under continuous
                 research activity, new concepts such as the involvement
                 of cloud computing in the MF ecosystem and the
                 evolution of enterprise mobile solutions-particularly
                 mobile device management and bring your own
                 device-bring new opportunities and issues to the
                 discipline. The current article presents the research
                 conducted within the MF ecosystem during the last 7
                 years, identifies the gaps, and highlights the
                 differences from past research directions, and
                 addresses challenges and open issues in the field.",
  acknowledgement = ack-nhfb,
  articleno =    "46",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Saeed:2018:SMS,
  author =       "Nasir Saeed and Haewoon Nam and Mian Imtiaz {Ul Haq}
                 and Dost Bhatti Muhammad Saqib",
  title =        "A Survey on Multidimensional Scaling",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "47:1--47:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3178155",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "This survey presents multidimensional scaling (MDS)
                 methods and their applications in real world. MDS is an
                 exploratory and multivariate data analysis technique
                 becoming more and more popular. MDS is one of the
                 multivariate data analysis techniques, which tries to
                 represent the higher dimensional data into lower space.
                 The input data for MDS analysis is measured by the
                 dissimilarity or similarity of the objects under
                 observation. Once the MDS technique is applied to the
                 measured dissimilarity or similarity, MDS results in a
                 spatial map. In the spatial map, the dissimilar objects
                 are far apart while objects which are similar are
                 placed close to each other. In this survey article, MDS
                 is described in comprehensive fashion by explaining the
                 basic notions of classical MDS and how MDS can be
                 helpful to analyze the multidimensional data. Later on,
                 various special models based on MDS are described in a
                 more mathematical way followed by comparisons of
                 various MDS techniques.",
  acknowledgement = ack-nhfb,
  articleno =    "47",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Resende:2018:SRF,
  author =       "Paulo Angelo Alves Resende and Andr{\'e} Costa
                 Drummond",
  title =        "A Survey of Random Forest Based Methods for Intrusion
                 Detection Systems",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "48:1--48:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3178582",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Over the past decades, researchers have been proposing
                 different Intrusion Detection approaches to deal with
                 the increasing number and complexity of threats for
                 computer systems. In this context, Random Forest models
                 have been providing a notable performance on their
                 applications in the realm of the behaviour-based
                 Intrusion Detection Systems. Specificities of the
                 Random Forest model are used to provide classification,
                 feature selection, and proximity metrics. This work
                 provides a comprehensive review of the general basic
                 concepts related to Intrusion Detection Systems,
                 including taxonomies, attacks, data collection,
                 modelling, evaluation metrics, and commonly used
                 methods. It also provides a survey of Random Forest
                 based methods applied in this context, considering the
                 particularities involved in these models. Finally, some
                 open questions and challenges are posed combined with
                 possible directions to deal with them, which may guide
                 future works on the area.",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gomes:2018:CSS,
  author =       "Cl{\'a}udio Gomes and Casper Thule and David Broman
                 and Peter Gorm Larsen and Hans Vangheluwe",
  title =        "Co-Simulation: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "49:1--49:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3179993",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Modeling and simulation techniques are today
                 extensively used both in industry and science. Parts of
                 larger systems are, however, typically modeled and
                 simulated by different techniques, tools, and
                 algorithms. In addition, experts from different
                 disciplines use various modeling and simulation
                 techniques. Both these facts make it difficult to study
                 coupled heterogeneous systems. Co-simulation is an
                 emerging enabling technique, where global simulation of
                 a coupled system can be achieved by composing the
                 simulations of its parts. Due to its potential and
                 interdisciplinary nature, co-simulation is being
                 studied in different disciplines but with limited
                 sharing of findings. In this survey, we study and
                 survey the state-of-the-art techniques for
                 co-simulation, with the goal of enhancing future
                 research and highlighting the main challenges. To study
                 this broad topic, we start by focusing on
                 discrete-event-based co-simulation, followed by
                 continuous-time-based co-simulation. Finally, we
                 explore the interactions between these two paradigms,
                 in hybrid co-simulation. To survey the current
                 techniques, tools, and research challenges, we
                 systematically classify recently published research
                 literature on co-simulation, and summarize it into a
                 taxonomy. As a result, we identify the need for finding
                 generic approaches for modular, stable, and accurate
                 coupling of simulation units, as well as expressing the
                 adaptations required to ensure that the coupling is
                 correct.",
  acknowledgement = ack-nhfb,
  articleno =    "49",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Baldoni:2018:SSE,
  author =       "Roberto Baldoni and Emilio Coppa and Daniele Cono
                 D'Elia and Camil Demetrescu and Irene Finocchi",
  title =        "A Survey of Symbolic Execution Techniques",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "50:1--50:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3182657",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Many security and software testing applications
                 require checking whether certain properties of a
                 program hold for any possible usage scenario. For
                 instance, a tool for identifying software
                 vulnerabilities may need to rule out the existence of
                 any backdoor to bypass a program's authentication. One
                 approach would be to test the program using different,
                 possibly random inputs. As the backdoor may only be hit
                 for very specific program workloads, automated
                 exploration of the space of possible inputs is of the
                 essence. Symbolic execution provides an elegant
                 solution to the problem, by systematically exploring
                 many possible execution paths at the same time without
                 necessarily requiring concrete inputs. Rather than
                 taking on fully specified input values, the technique
                 abstractly represents them as symbols, resorting to
                 constraint solvers to construct actual instances that
                 would cause property violations. Symbolic execution has
                 been incubated in dozens of tools developed over the
                 past four decades, leading to major practical
                 breakthroughs in a number of prominent software
                 reliability applications. The goal of this survey is to
                 provide an overview of the main ideas, challenges, and
                 solutions developed in the area, distilling them for a
                 broad audience.",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shirazi:2018:SRA,
  author =       "Fatemeh Shirazi and Milivoj Simeonovski and Muhammad
                 Rizwan Asghar and Michael Backes and Claudia Diaz",
  title =        "A Survey on Routing in Anonymous Communication
                 Protocols",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "51:1--51:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3182658",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The Internet has undergone dramatic changes in the
                 past 2 decades and now forms a global communication
                 platform that billions of users rely on for their daily
                 activities. While this transformation has brought
                 tremendous benefits to society, it has also created new
                 threats to online privacy, such as omnipotent
                 governmental surveillance. As a result, public interest
                 in systems for anonymous communication has drastically
                 increased. In this work, we survey previous research on
                 designing, developing, and deploying systems for
                 anonymous communication. Our taxonomy and comparative
                 assessment provide important insights about the
                 differences between the existing classes of anonymous
                 communication protocols.",
  acknowledgement = ack-nhfb,
  articleno =    "51",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{VanDijkhuizen:2018:SNT,
  author =       "Niels {Van Dijkhuizen} and Jeroen {Van Der Ham}",
  title =        "A Survey of Network Traffic Anonymisation Techniques
                 and Implementations",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "52:1--52:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3182660",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Many networking research activities are dependent on
                 the availability of network captures. Even outside
                 academic research, there is a need for sharing network
                 captures to cooperate on threat assessments or for
                 debugging. However, most network captures cannot be
                 shared due to privacy concerns. Anonymisation of
                 network captures has been a subject of research for
                 quite some time, and many different techniques exist.
                 In this article, we present an overview of the
                 currently available techniques and implementations for
                 network capture anonymisation. There have been many
                 advances in the understanding of anonymisation and
                 cryptographic methods, which have changed the
                 perspective on the effectiveness of many anonymisation
                 techniques. However, these advances, combined with the
                 increase of computational abilities, may have also made
                 it feasible to perform anonymisation in real time. This
                 may make it easier to collect and distribute network
                 captures both for research and for other applications.
                 This article surveys the literature over the period of
                 1998-2017 on network traffic anonymisation techniques
                 and implementations. The aim is to provide an overview
                 of the current state of the art and to highlight how
                 advances in related fields have shed new light on
                 anonymisation and pseudonimisation methodologies. The
                 few currently maintained implementations are also
                 reviewed. Last, we identify future research directions
                 to enable easier sharing of network traffic, which in
                 turn can enable new insights in network traffic
                 analysis.",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Oliveira:2018:PAW,
  author =       "Wellington Oliveira and Daniel {De Oliveira} and
                 Vanessa Braganholo",
  title =        "Provenance Analytics for Workflow-Based Computational
                 Experiments: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "53:1--53:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3184900",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Until not long ago, manually capturing and storing
                 provenance from scientific experiments were constant
                 concerns for scientists. With the advent of
                 computational experiments (modeled as scientific
                 workflows) and Scientific Workflow Management Systems,
                 produced and consumed data, as well as the provenance
                 of a given experiment, are automatically managed, so
                 provenance capturing and storing in such a context is
                 no longer a major concern. Similarly to several
                 existing big data problems, the bottom line is now on
                 how to analyze the large amounts of provenance data
                 generated by workflow executions and how to be able to
                 extract useful knowledge of this data. In this context,
                 this article surveys the current state of the art on
                 provenance analytics by presenting the key initiatives
                 that have been taken to support provenance data
                 analysis. We also contribute by proposing a taxonomy to
                 classify elements related to provenance analytics.",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hanford:2018:SES,
  author =       "Nathan Hanford and Vishal Ahuja and Matthew K. Farrens
                 and Brian Tierney and Dipak Ghosal",
  title =        "A Survey of End-System Optimizations for High-Speed
                 Networks",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "54:1--54:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3184899",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The gap is widening between the processor clock speed
                 of end-system architectures and network throughput
                 capabilities. It is now physically possible to provide
                 single-flow throughput of speeds up to 100 Gbps, and
                 400 Gbps will soon be possible. Most current research
                 into high-speed data networking focuses on managing
                 expanding network capabilities within datacenter Local
                 Area Networks (LANs) or efficiently multiplexing
                 millions of relatively small flows through a Wide Area
                 Network (WAN). However, datacenter hyper-convergence
                 places high-throughput networking workloads on
                 general-purpose hardware, and distributed
                 High-Performance Computing (HPC) applications require
                 time-sensitive, high-throughput end-to-end flows (also
                 referred to as ``elephant flows'') to occur over WANs.
                 For these applications, the bottleneck is often the
                 end-system and not the intervening network. Since the
                 problem of the end-system bottleneck was uncovered,
                 many techniques have been developed which address this
                 mismatch with varying degrees of effectiveness. In this
                 survey, we describe the most promising techniques,
                 beginning with network architectures and NIC design,
                 continuing with operating and end-system architectures,
                 and concluding with clean-slate protocol design.",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ramaki:2018:SMS,
  author =       "Ali Ahmadian Ramaki and Abbas Rasoolzadegan and Abbas
                 Ghaemi Bafghi",
  title =        "A Systematic Mapping Study on Intrusion Alert Analysis
                 in Intrusion Detection Systems",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "55:1--55:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3184898",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Intrusion alert analysis is an attractive and active
                 topic in the area of intrusion detection systems. In
                 recent decades, many research communities have been
                 working in this field. The main objective of this
                 article is to achieve a taxonomy of research fields in
                 intrusion alert analysis by using a systematic mapping
                 study of 468 high-quality papers. The results show that
                 there are 10 different research topics in the field,
                 which can be classified into three broad groups:
                 pre-processing, processing, and post-processing. The
                 processing group contains most of the research works,
                 and the post-processing group is newer than others.",
  acknowledgement = ack-nhfb,
  articleno =    "55",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Venieris:2018:TMC,
  author =       "Stylianos I. Venieris and Alexandros Kouris and
                 Christos-Savvas Bouganis",
  title =        "Toolflows for Mapping Convolutional Neural Networks on
                 {FPGAs}: a Survey and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "56:1--56:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3186332",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In the past decade, Convolutional Neural Networks
                 (CNNs) have demonstrated state-of-the-art performance
                 in various Artificial Intelligence tasks. To accelerate
                 the experimentation and development of CNNs, several
                 software frameworks have been released, primarily
                 targeting power-hungry CPUs and GPUs. In this context,
                 reconfigurable hardware in the form of FPGAs
                 constitutes a potential alternative platform that can
                 be integrated in the existing deep-learning ecosystem
                 to provide a tunable balance between performance, power
                 consumption, and programmability. In this article, a
                 survey of the existing CNN-to-FPGA toolflows is
                 presented, comprising a comparative study of their key
                 characteristics, which include the supported
                 applications, architectural choices, design space
                 exploration methods, and achieved performance.
                 Moreover, major challenges and objectives introduced by
                 the latest trends in CNN algorithmic research are
                 identified and presented. Finally, a uniform evaluation
                 methodology is proposed, aiming at the comprehensive,
                 complete, and in-depth evaluation of CNN-to-FPGA
                 toolflows.",
  acknowledgement = ack-nhfb,
  articleno =    "56",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wagner:2018:TPM,
  author =       "Isabel Wagner and David Eckhoff",
  title =        "Technical Privacy Metrics: a Systematic Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "57:1--57:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3168389",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The goal of privacy metrics is to measure the degree
                 of privacy enjoyed by users in a system and the amount
                 of protection offered by privacy-enhancing
                 technologies. In this way, privacy metrics contribute
                 to improving user privacy in the digital world. The
                 diversity and complexity of privacy metrics in the
                 literature make an informed choice of metrics
                 challenging. As a result, instead of using existing
                 metrics, new metrics are proposed frequently, and
                 privacy studies are often incomparable. In this survey,
                 we alleviate these problems by structuring the
                 landscape of privacy metrics. To this end, we explain
                 and discuss a selection of over 80 privacy metrics and
                 introduce categorizations based on the aspect of
                 privacy they measure, their required inputs, and the
                 type of data that needs protection. In addition, we
                 present a method on how to choose privacy metrics based
                 on nine questions that help identify the right privacy
                 metrics for a given scenario, and highlight topics
                 where additional work on privacy metrics is needed. Our
                 survey spans multiple privacy domains and can be
                 understood as a general framework for privacy
                 measurement.",
  acknowledgement = ack-nhfb,
  articleno =    "57",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Meidan:2018:MSP,
  author =       "Ayman Meidan and Juli{\'a}n A. Garc{\'\i}a-Garc{\'\i}a
                 and Isabel Ramos and Mar{\'\i}a Jos{\'e} Escalona",
  title =        "Measuring Software Process: a Systematic Mapping
                 Study",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "58:1--58:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3186888",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Context: Measurement is essential to reach predictable
                 performance and high capability processes. It provides
                 support for better understanding, evaluation,
                 management, and control of the development process and
                 project, as well as the resulting product. It also
                 enables organizations to improve and predict its
                 process's performance, which places organizations in
                 better positions to make appropriate decisions.
                 Objective: This study aims to understand the
                 measurement of the software development process, to
                 identify studies, create a classification scheme based
                 on the identified studies, and then to map such studies
                 into the scheme to answer the research questions.
                 Method: Systematic mapping is the selected research
                 methodology for this study. Results: A total of 462
                 studies are included and classified into four topics
                 with respect to their focus and into three groups based
                 on the publishing date. Five abstractions and 64
                 attributes were identified, 25 methods/models and 17
                 contexts were distinguished. Conclusion: capability and
                 performance were the most measured process attributes,
                 while effort and performance were the most measured
                 project attributes. Goal Question Metric and Capability
                 Maturity Model Integration were the main methods and
                 models used in the studies, whereas agile/lean
                 development and small/medium-size enterprise were the
                 most frequently identified research contexts.",
  acknowledgement = ack-nhfb,
  articleno =    "58",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Son:2018:TSD,
  author =       "Jungmin Son and Rajkumar Buyya",
  title =        "A Taxonomy of Software-Defined Networking
                 ({SDN})-Enabled Cloud Computing",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "59:1--59:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3190617",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Software-Defined Networking (SDN) opened up new
                 opportunities in networking with its concept of the
                 segregated control plane from the data-forwarding
                 hardware, which enables the network to be programmable,
                 adjustable, and reconfigurable dynamically. These
                 characteristics can bring numerous benefits to cloud
                 computing, where dynamic changes and reconfiguration
                 are necessary with its on-demand usage pattern.
                 Although researchers have studied utilizing SDN in
                 cloud computing, gaps still exist and need to be
                 explored further. In this article, we propose a
                 taxonomy to depict different aspects of SDN-enabled
                 cloud computing and explain each element in details.
                 The detailed survey of studies utilizing SDN for cloud
                 computing is presented with focus on data center power
                 optimization, traffic engineering, network
                 virtualization, and security. We also present various
                 simulation and empirical evaluation methods that have
                 been developed for SDN-enabled clouds. Finally, we
                 analyze the gap in current research and propose future
                 directions.",
  acknowledgement = ack-nhfb,
  articleno =    "59",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Heidari:2018:SGP,
  author =       "Safiollah Heidari and Yogesh Simmhan and Rodrigo N.
                 Calheiros and Rajkumar Buyya",
  title =        "Scalable Graph Processing Frameworks: a Taxonomy and
                 Open Challenges",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "60:1--60:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3199523",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The world is becoming a more conjunct place and the
                 number of data sources such as social networks, online
                 transactions, web search engines, and mobile devices is
                 increasing even more than had been predicted. A large
                 percentage of this growing dataset exists in the form
                 of linked data, more generally, graphs, and of
                 unprecedented sizes. While today's data from social
                 networks contain hundreds of millions of nodes
                 connected by billions of edges, inter-connected data
                 from globally distributed sensors that forms the
                 Internet of Things can cause this to grow exponentially
                 larger. Although analyzing these large graphs is
                 critical for the companies and governments that own
                 them, big data tools designed for text and tuple
                 analysis such as MapReduce cannot process them
                 efficiently. So, graph distributed processing
                 abstractions and systems are developed to design
                 iterative graph algorithms and process large graphs
                 with better performance and scalability. These graph
                 frameworks propose novel methods or extend previous
                 methods for processing graph data. In this article, we
                 propose a taxonomy of graph processing systems and map
                 existing systems to this classification. This captures
                 the diversity in programming and computation models,
                 runtime aspects of partitioning and communication, both
                 for in-memory and distributed frameworks. Our effort
                 helps to highlight key distinctions in architectural
                 approaches, and identifies gaps for future research in
                 scalable graph systems.",
  acknowledgement = ack-nhfb,
  articleno =    "60",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chen:2018:STS,
  author =       "Tao Chen and Rami Bahsoon and Xin Yao",
  title =        "A Survey and Taxonomy of Self-Aware and Self-Adaptive
                 Cloud Autoscaling Systems",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "61:1--61:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3190507",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Autoscaling system can reconfigure cloud-based
                 services and applications, through various
                 configurations of cloud software and provisions of
                 hardware resources, to adapt to the changing
                 environment at runtime. Such a behavior offers the
                 foundation for achieving elasticity in a modern cloud
                 computing paradigm. Given the dynamic and uncertain
                 nature of the shared cloud infrastructure, the cloud
                 autoscaling system has been engineered as one of the
                 most complex, sophisticated, and intelligent artifacts
                 created by humans, aiming to achieve self-aware,
                 self-adaptive, and dependable runtime scaling. Yet the
                 existing Self-aware and Self-adaptive Cloud Autoscaling
                 System (SSCAS) is not at a state where it can be
                 reliably exploited in the cloud. In this article, we
                 survey the state-of-the-art research studies on SSCAS
                 and provide a comprehensive taxonomy for this field. We
                 present detailed analysis of the results and provide
                 insights on open challenges, as well as the promising
                 directions that are worth investigated in the future
                 work of this area of research. Our survey and taxonomy
                 contribute to the fundamentals of engineering more
                 intelligent autoscaling systems in the cloud.",
  acknowledgement = ack-nhfb,
  articleno =    "61",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Liu:2018:GSM,
  author =       "Yike Liu and Tara Safavi and Abhilash Dighe and Danai
                 Koutra",
  title =        "Graph Summarization Methods and Applications: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "62:1--62:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3186727",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "While advances in computing resources have made
                 processing enormous amounts of data possible, human
                 ability to identify patterns in such data has not
                 scaled accordingly. Efficient computational methods for
                 condensing and simplifying data are thus becoming vital
                 for extracting actionable insights. In particular,
                 while data summarization techniques have been studied
                 extensively, only recently has summarizing
                 interconnected data, or graphs, become popular. This
                 survey is a structured, comprehensive overview of the
                 state-of-the-art methods for summarizing graph data. We
                 first broach the motivation behind and the challenges
                 of graph summarization. We then categorize
                 summarization approaches by the type of graphs taken as
                 input and further organize each category by core
                 methodology. Finally, we discuss applications of
                 summarization on real-world graphs and conclude by
                 describing some open problems in the field.",
  acknowledgement = ack-nhfb,
  articleno =    "62",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ivie:2018:RSC,
  author =       "Peter Ivie and Douglas Thain",
  title =        "Reproducibility in Scientific Computing",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "63:1--63:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3186266",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Reproducibility is widely considered to be an
                 essential requirement of the scientific process.
                 However, a number of serious concerns have been raised
                 recently, questioning whether today's computational
                 work is adequately reproducible. In principle, it
                 should be possible to specify a computation to
                 sufficient detail that anyone should be able to
                 reproduce it exactly. But in practice, there are
                 fundamental, technical, and social barriers to doing
                 so. The many objectives and meanings of reproducibility
                 are discussed within the context of scientific
                 computing. Technical barriers to reproducibility are
                 described, extant approaches surveyed, and open areas
                 of research are identified.",
  acknowledgement = ack-nhfb,
  articleno =    "63",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Qi:2018:CSQ,
  author =       "Jianzhong Qi and Rui Zhang and Christian S. Jensen and
                 Kotagiri Ramamohanarao and Jiayuan He",
  title =        "Continuous Spatial Query Processing: a Survey of Safe
                 Region Based Techniques",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "64:1--64:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3193835",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In the past decade, positioning system-enabled devices
                 such as smartphones have become most prevalent. This
                 functionality brings the increasing popularity of
                 location-based services in business as well as daily
                 applications such as navigation, targeted advertising,
                 and location-based social networking. Continuous
                 spatial queries serve as a building block for
                 location-based services. As an example, an Uber driver
                 may want to be kept aware of the nearest customers or
                 service stations. Continuous spatial queries require
                 updates to the query result as the query or data
                 objects are moving. This poses challenges to the query
                 efficiency, which is crucial to the user experience of
                 a service. A large number of approaches address this
                 efficiency issue using the concept of safe region. A
                 safe region is a region within which arbitrary movement
                 of an object leaves the query result unchanged. Such a
                 region helps reduce the frequency of query result
                 update and hence improves query efficiency. As a
                 result, safe region-based approaches have been popular
                 for processing various types of continuous spatial
                 queries. Safe regions have interesting theoretical
                 properties and are worth in-depth analysis. We provide
                 a comparative study of safe region-based approaches. We
                 describe how safe regions are computed for different
                 types of continuous spatial queries, showing how they
                 improve query efficiency. We compare the different safe
                 region-based approaches and discuss possible further
                 improvements.",
  acknowledgement = ack-nhfb,
  articleno =    "64",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sundararajan:2018:DLB,
  author =       "Kalaivani Sundararajan and Damon L. Woodard",
  title =        "Deep Learning for Biometrics: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "65:1--65:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3190618",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "In the recent past, deep learning methods have
                 demonstrated remarkable success for supervised learning
                 tasks in multiple domains including computer vision,
                 natural language processing, and speech processing. In
                 this article, we investigate the impact of deep
                 learning in the field of biometrics, given its success
                 in other domains. Since biometrics deals with
                 identifying people by using their characteristics, it
                 primarily involves supervised learning and can leverage
                 the success of deep learning in other related domains.
                 In this article, we survey 100 different approaches
                 that explore deep learning for recognizing individuals
                 using various biometric modalities. We find that most
                 deep learning research in biometrics has been focused
                 on face and speaker recognition. Based on inferences
                 from these approaches, we discuss how deep learning
                 methods can benefit the field of biometrics and the
                 potential gaps that deep learning approaches need to
                 address for real-world biometric applications.",
  acknowledgement = ack-nhfb,
  articleno =    "65",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Quadrana:2018:SAR,
  author =       "Massimo Quadrana and Paolo Cremonesi and Dietmar
                 Jannach",
  title =        "Sequence-Aware Recommender Systems",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "66:1--66:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3190616",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Recommender systems are one of the most successful
                 applications of data mining and machine-learning
                 technology in practice. Academic research in the field
                 is historically often based on the matrix completion
                 problem formulation, where for each user-item-pair only
                 one interaction (e.g., a rating) is considered. In many
                 application domains, however, multiple user-item
                 interactions of different types can be recorded over
                 time. And, a number of recent works have shown that
                 this information can be used to build richer individual
                 user models and to discover additional behavioral
                 patterns that can be leveraged in the recommendation
                 process. In this work, we review existing works that
                 consider information from such sequentially ordered
                 user-item interaction logs in the recommendation
                 process. Based on this review, we propose a
                 categorization of the corresponding recommendation
                 tasks and goals, summarize existing algorithmic
                 solutions, discuss methodological approaches when
                 benchmarking what we call sequence-aware recommender
                 systems, and outline open challenges in the area.",
  acknowledgement = ack-nhfb,
  articleno =    "66",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhauniarovich:2018:SMD,
  author =       "Yury Zhauniarovich and Issa Khalil and Ting Yu and
                 Marc Dacier",
  title =        "A Survey on Malicious Domains Detection through {DNS}
                 Data Analysis",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "67:1--67:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3191329",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Malicious domains are one of the major resources
                 required for adversaries to run attacks over the
                 Internet. Due to the important role of the Domain Name
                 System (DNS), extensive research has been conducted to
                 identify malicious domains based on their unique
                 behavior reflected in different phases of the life
                 cycle of DNS queries and responses. Existing approaches
                 differ significantly in terms of intuitions, data
                 analysis methods as well as evaluation methodologies.
                 This warrants a thorough systematization of the
                 approaches and a careful review of the advantages and
                 limitations of every group. In this article, we perform
                 such an analysis. To achieve this goal, we present the
                 necessary background knowledge on DNS and malicious
                 activities leveraging DNS. We describe a general
                 framework of malicious domain detection techniques
                 using DNS data. Applying this framework, we categorize
                 existing approaches using several orthogonal
                 viewpoints, namely (1) sources of DNS data and their
                 enrichment, (2) data analysis methods, and (3)
                 evaluation strategies and metrics. In each aspect, we
                 discuss the important challenges that the research
                 community should address in order to fully realize the
                 power of DNS data analysis to fight against attacks
                 leveraging malicious domains.",
  acknowledgement = ack-nhfb,
  articleno =    "67",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{FarrUs:2018:VDA,
  author =       "Mireia Farr{\'U}s",
  title =        "Voice Disguise in Automatic Speaker Recognition",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "68:1--68:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3195832",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Humans are able to identify other people's voices even
                 in voice disguise conditions. However, we are not
                 immune to all voice changes when trying to identify
                 people from voice. Likewise, automatic speaker
                 recognition systems can also be deceived by voice
                 imitation and other types of disguise. Taking into
                 account the voice disguise classification into the
                 combination of two different categories
                 (deliberate/non-deliberate and
                 electronic/non-electronic), this survey provides a
                 literature review on the influence of voice disguise in
                 the automatic speaker recognition task and the
                 robustness of these systems to such voice changes.
                 Additionally, the survey addresses existing
                 applications dealing with voice disguise and analyzes
                 some issues for future research.",
  acknowledgement = ack-nhfb,
  articleno =    "68",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Botacin:2018:WWW,
  author =       "Marcus Botacin and Paulo L{\'\i}cio {De Geus} and
                 Andr{\'e} Gr{\'e}gio",
  title =        "Who Watches the Watchmen: a Security-focused Review on
                 Current State-of-the-art Techniques, Tools, and Methods
                 for Systems and Binary Analysis on Modern Platforms",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "69:1--69:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3199673",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Malicious software, a threat users face on a daily
                 basis, have evolved from simple bankers based on social
                 engineering to advanced persistent threats. Recent
                 research and discoveries reveal that malware developers
                 have been using a wide range of anti-analysis and
                 evasion techniques, in-memory attacks, and system
                 subversion, including BIOS and hypervisors. In
                 addition, code-reuse attacks like Returned Oriented
                 Programming emerge as highly potential remote code
                 execution threats. To counteract the broadness of
                 malicious codes, distinct techniques and tools have
                 been proposed, such as transparent malware tracers,
                 system-wide debuggers, live forensics tools, and
                 isolated execution rings. In this work, we present a
                 survey on state-of-the-art techniques that detect,
                 mitigate, and analyze the aforementioned attacks. We
                 show approaches based on Hardware Virtual Machines
                 introspection, System Management Mode instrumentation,
                 Hardware Performance Counters, isolated rings (e.g.,
                 Software Guard eXtensions), as well as others based on
                 external hardware. We also discuss upcoming threats
                 based on the very same technologies used for defense.
                 Our main goal is to provide the reader with a broader,
                 more comprehensive understanding of recently surfaced
                 tools and techniques aiming at binary analysis for
                 modern platforms.",
  acknowledgement = ack-nhfb,
  articleno =    "69",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Huang:2018:SUC,
  author =       "Keman Huang and Michael Siegel and Stuart Madnick",
  title =        "Systematically Understanding the Cyber Attack
                 Business: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "70:1--70:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3199674",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Cyber attacks are increasingly menacing businesses.
                 Based on the literature review and publicly available
                 reports, this article conducts an extensive and
                 consistent survey of the services used by the
                 cybercrime business, organized using the value chain
                 perspective, to understand cyber attack in a systematic
                 way. Understanding the specialization,
                 commercialization, and cooperation for cyber attacks
                 helps us to identify 24 key value-added activities and
                 their relations. These can be offered ``as a service''
                 for use in a cyber attack. This framework helps to
                 understand the cybercriminal service ecosystem and
                 hacking innovations. Finally, a few examples are
                 provided showing how this framework can help to build a
                 more cyber immune system, like targeting cybercrime
                 control-points and assigning defense responsibilities
                 to encourage collaboration.",
  acknowledgement = ack-nhfb,
  articleno =    "70",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Abdallah:2018:ARE,
  author =       "Zahraa S. Abdallah and Mohamed Medhat Gaber and Bala
                 Srinivasan and Shonali Krishnaswamy",
  title =        "Activity Recognition with Evolving Data Streams: a
                 Review",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "71:1--71:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3158645",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Activity recognition aims to provide accurate and
                 opportune information on people's activities by
                 leveraging sensory data available in today's sensory
                 rich environments. Nowadays, activity recognition has
                 become an emerging field in the areas of pervasive and
                 ubiquitous computing. A typical activity recognition
                 technique processes data streams that evolve from
                 sensing platforms such as mobile sensors, on body
                 sensors, and/or ambient sensors. This article surveys
                 the two overlapped areas of research of activity
                 recognition and data stream mining. The perspective of
                 this article is to review the adaptation capabilities
                 of activity recognition techniques in streaming
                 environment. Categories of techniques are identified
                 based on different features in both data streams and
                 activity recognition. The pros and cons of the
                 algorithms in each category are analysed, and the
                 possible directions of future research are indicated.",
  acknowledgement = ack-nhfb,
  articleno =    "71",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Vipin:2018:FDP,
  author =       "Kizheppatt Vipin and Suhaib A. Fahmy",
  title =        "{FPGA} Dynamic and Partial Reconfiguration: a Survey
                 of Architectures, Methods, and Applications",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "72:1--72:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3193827",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Dynamic and partial reconfiguration are key
                 differentiating capabilities of field programmable gate
                 arrays (FPGAs). While they have been studied
                 extensively in academic literature, they find limited
                 use in deployed systems. We review FPGA
                 reconfiguration, looking at architectures built for the
                 purpose, and the properties of modern commercial
                 architectures. We then investigate design flows and
                 identify the key challenges in making reconfigurable
                 FPGA systems easier to design. Finally, we look at
                 applications where reconfiguration has found use, as
                 well as proposing new areas where this capability
                 places FPGAs in a unique position for adoption.",
  acknowledgement = ack-nhfb,
  articleno =    "72",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Qu:2018:ASW,
  author =       "Chenhao Qu and Rodrigo N. Calheiros and Rajkumar
                 Buyya",
  title =        "Auto-Scaling {Web} Applications in Clouds: a Taxonomy
                 and Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "73:1--73:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3148149",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Web application providers have been migrating their
                 applications to cloud data centers, attracted by the
                 emerging cloud computing paradigm. One of the appealing
                 features of the cloud is elasticity. It allows cloud
                 users to acquire or release computing resources on
                 demand, which enables web application providers to
                 automatically scale the resources provisioned to their
                 applications without human intervention under a dynamic
                 workload to minimize resource cost while satisfying
                 Quality of Service (QoS) requirements. In this article,
                 we comprehensively analyze the challenges that remain
                 in auto-scaling web applications in clouds and review
                 the developments in this field. We present a taxonomy
                 of auto-scalers according to the identified challenges
                 and key properties. We analyze the surveyed works and
                 map them to the taxonomy to identify the weaknesses in
                 this field. Moreover, based on the analysis, we propose
                 new future directions that can be explored in this
                 area.",
  acknowledgement = ack-nhfb,
  articleno =    "73",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Siow:2018:AIT,
  author =       "Eugene Siow and Thanassis Tiropanis and Wendy Hall",
  title =        "Analytics for the {Internet of Things}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "74:1--74:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3204947",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The Internet of Things (IoT) envisions a world-wide,
                 interconnected network of smart physical entities.
                 These physical entities generate a large amount of data
                 in operation, and as the IoT gains momentum in terms of
                 deployment, the combined scale of those data seems
                 destined to continue to grow. Increasingly,
                 applications for the IoT involve analytics. Data
                 analytics is the process of deriving knowledge from
                 data, generating value like actionable insights from
                 them. This article reviews work in the IoT and big data
                 analytics from the perspective of their utility in
                 creating efficient, effective, and innovative
                 applications and services for a wide spectrum of
                 domains. We review the broad vision for the IoT as it
                 is shaped in various communities, examine the
                 application of data analytics across IoT domains,
                 provide a categorisation of analytic approaches, and
                 propose a layered taxonomy from IoT data to analytics.
                 This taxonomy provides us with insights on the
                 appropriateness of analytical techniques, which in turn
                 shapes a survey of enabling technology and
                 infrastructure for IoT analytics. Finally, we look at
                 some tradeoffs for analytics in the IoT that can shape
                 future research.",
  acknowledgement = ack-nhfb,
  articleno =    "74",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ochieng:2018:LSO,
  author =       "Peter Ochieng and Swaib Kyanda",
  title =        "Large-Scale Ontology Matching: State-of-the-Art
                 Analysis",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "75:1--75:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3211871",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Ontologies have become a popular means of knowledge
                 sharing and reuse. This has motivated the development
                 of large-sized independent ontologies within the same
                 or different domains with some overlapping information
                 among them. To integrate such large ontologies,
                 automatic matchers become an inevitable solution.
                 However, the process of matching large ontologies has
                 high space and time complexities. Therefore, for a tool
                 to efficiently and accurately match these large
                 ontologies within the limited computing resources, it
                 must have techniques that can significantly reduce the
                 high space and time complexities associated with the
                 ontology matching process. This article provides a
                 review of the state-of-the-art techniques being applied
                 by ontology matching tools to achieve scalability and
                 produce high-quality mappings when matching large
                 ontologies. In addition, we provide a direct comparison
                 of the techniques to gauge their effectiveness in
                 achieving scalability. A review of the state-of-the-art
                 ontology matching tools that employ each strategy is
                 also provided. We also evaluate the state-of-the-art
                 tools to gauge the progress they have made over the
                 years in improving alignment's quality and reduction of
                 execution time when matching large ontologies.",
  acknowledgement = ack-nhfb,
  articleno =    "75",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Giraldo:2018:SPB,
  author =       "Jairo Giraldo and David Urbina and Alvaro Cardenas and
                 Junia Valente and Mustafa Faisal and Justin Ruths and
                 Nils Ole Tippenhauer and Henrik Sandberg and Richard
                 Candell",
  title =        "A Survey of Physics-Based Attack Detection in
                 Cyber-Physical Systems",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "76:1--76:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3203245",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Monitoring the ``physics'' of cyber-physical systems
                 to detect attacks is a growing area of research. In its
                 basic form, a security monitor creates time-series
                 models of sensor readings for an industrial control
                 system and identifies anomalies in these measurements
                 to identify potentially false control commands or false
                 sensor readings. In this article, we review previous
                 work on physics-based anomaly detection based on a
                 unified taxonomy that allows us to identify limitations
                 and unexplored challenges and to propose new
                 solutions.",
  acknowledgement = ack-nhfb,
  articleno =    "76",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Toth:2018:GDD,
  author =       "Edward Toth and Sanjay Chawla",
  title =        "Group Deviation Detection Methods: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "77:1--77:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3203246",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Pointwise anomaly detection and change detection focus
                 on the study of individual data instances; however, an
                 emerging area of research involves groups or
                 collections of observations. From applications of
                 high-energy particle physics to health care collusion,
                 group deviation detection techniques result in novel
                 research discoveries, mitigation of risks, prevention
                 of malicious collaborative activities, and other
                 interesting explanatory insights. In particular, static
                 group anomaly detection is the process of identifying
                 groups that are not consistent with regular group
                 patterns, while dynamic group change detection assesses
                 significant differences in the state of a group over a
                 period of time. Since both group anomaly detection and
                 group change detection share fundamental ideas, this
                 survey article provides a clearer and deeper
                 understanding of group deviation detection research in
                 static and dynamic situations.",
  acknowledgement = ack-nhfb,
  articleno =    "77",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tamine:2018:ECI,
  author =       "Lynda Tamine and Mariam Daoud",
  title =        "Evaluation in Contextual Information Retrieval:
                 Foundations and Recent Advances within the Challenges
                 of Context Dynamicity and Data Privacy",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "78:1--78:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3204940",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Context such as the user's search history,
                 demographics, devices, and surroundings, has become
                 prevalent in various domains of information seeking and
                 retrieval such as mobile search, task-based search, and
                 social search. While evaluation is central and has a
                 long history in information retrieval, it faces the big
                 challenge of designing an appropriate methodology that
                 embeds the context into evaluation settings. In this
                 article, we present a unified summary of a wide range
                 of main and recent progress in contextual information
                 retrieval evaluation that leverages diverse context
                 dimensions and uses different principles,
                 methodologies, and levels of measurements. More
                 specifically, this survey article aims to fill two main
                 gaps in the literature: First, it provides a critical
                 summary and comparison of existing contextual
                 information retrieval evaluation methodologies and
                 metrics according to a simple stratification model;
                 second, it points out the impact of context dynamicity
                 and data privacy on the evaluation design. Finally, we
                 recommend promising research directions for future
                 investigations.",
  acknowledgement = ack-nhfb,
  articleno =    "78",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Acar:2018:SHE,
  author =       "Abbas Acar and Hidayet Aksu and A. Selcuk Uluagac and
                 Mauro Conti",
  title =        "A Survey on Homomorphic Encryption Schemes: Theory and
                 Implementation",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "79:1--79:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3214303",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Legacy encryption systems depend on sharing a key
                 (public or private) among the peers involved in
                 exchanging an encrypted message. However, this approach
                 poses privacy concerns. The users or service providers
                 with the key have exclusive rights on the data.
                 Especially with popular cloud services, control over
                 the privacy of the sensitive data is lost. Even when
                 the keys are not shared, the encrypted material is
                 shared with a third party that does not necessarily
                 need to access the content. Moreover, untrusted
                 servers, providers, and cloud operators can keep
                 identifying elements of users long after users end the
                 relationship with the services. Indeed, Homomorphic
                 Encryption (HE), a special kind of encryption scheme,
                 can address these concerns as it allows any third party
                 to operate on the encrypted data without decrypting it
                 in advance. Although this extremely useful feature of
                 the HE scheme has been known for over 30 years, the
                 first plausible and achievable Fully Homomorphic
                 Encryption (FHE) scheme, which allows any computable
                 function to perform on the encrypted data, was
                 introduced by Craig Gentry in 2009. Even though this
                 was a major achievement, different implementations so
                 far demonstrated that FHE still needs to be improved
                 significantly to be practical on every platform.
                 Therefore, this survey focuses on HE and FHE schemes.
                 First, we present the basics of HE and the details of
                 the well-known Partially Homomorphic Encryption (PHE)
                 and Somewhat Homomorphic Encryption (SWHE), which are
                 important pillars for achieving FHE. Then, the main FHE
                 families, which have become the base for the other
                 follow-up FHE schemes, are presented. Furthermore, the
                 implementations and recent improvements in Gentry-type
                 FHE schemes are also surveyed. Finally, further
                 research directions are discussed. This survey is
                 intended to give a clear knowledge and foundation to
                 researchers and practitioners interested in knowing,
                 applying, and extending the state-of-the-art HE, PHE,
                 SWHE, and FHE systems.",
  acknowledgement = ack-nhfb,
  articleno =    "79",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Han:2018:DTC,
  author =       "Xiao Han and Nizar Kheir and Davide Balzarotti",
  title =        "Deception Techniques in Computer Security: a Research
                 Perspective",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "80:1--80:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3214305",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "A recent trend both in academia and industry is to
                 explore the use of deception techniques to achieve
                 proactive attack detection and defense-to the point of
                 marketing intrusion deception solutions as
                 zero-false-positive intrusion detection. However, there
                 is still a general lack of understanding of deception
                 techniques from a research perspective, and it is not
                 clear how the effectiveness of these solutions can be
                 measured and compared with other security approaches.
                 To shed light on this topic, we introduce a
                 comprehensive classification of existing solutions and
                 survey the current application of deception techniques
                 in computer security. Furthermore, we discuss the
                 limitations of existing solutions, and we analyze
                 several open research directions, including the design
                 of strategies to help defenders to design and integrate
                 deception within a target architecture, the study of
                 automated ways to deploy deception in complex systems,
                 the update and re-deployment of deception, and, most
                 importantly, the design of new techniques and
                 experiments to evaluate the effectiveness of the
                 existing deception techniques.",
  acknowledgement = ack-nhfb,
  articleno =    "80",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Allamanis:2018:SML,
  author =       "Miltiadis Allamanis and Earl T. Barr and Premkumar
                 Devanbu and Charles Sutton",
  title =        "A Survey of Machine Learning for Big Code and
                 Naturalness",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "81:1--81:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3212695",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Research at the intersection of machine learning,
                 programming languages, and software engineering has
                 recently taken important steps in proposing learnable
                 probabilistic models of source code that exploit the
                 abundance of patterns of code. In this article, we
                 survey this work. We contrast programming languages
                 against natural languages and discuss how these
                 similarities and differences drive the design of
                 probabilistic models. We present a taxonomy based on
                 the underlying design principles of each model and use
                 it to navigate the literature. Then, we review how
                 researchers have adapted these models to application
                 areas and discuss cross-cutting and
                 application-specific challenges and opportunities.",
  acknowledgement = ack-nhfb,
  articleno =    "81",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Singh:2018:SMM,
  author =       "Harcharan Jit Singh and Seema Bawa",
  title =        "Scalable Metadata Management Techniques for
                 Ultra-Large Distributed Storage Systems --- A
                 Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "82:1--82:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3212686",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The provisioning of an efficient ultra-large scalable
                 distributed storage system for expanding cloud
                 applications has been a challenging job for researchers
                 in academia and industry. In such an ultra-large-scale
                 storage system, data are distributed on multiple
                 storage nodes for performance, scalability, and
                 availability. The access to this distributed data is
                 through its metadata, maintained by multiple metadata
                 servers. The metadata carries information about the
                 physical address of data and access privileges. The
                 efficiency of a storage system highly depends on
                 effective metadata management. This research presents
                 an extensive systematic literature analysis of metadata
                 management techniques in storage systems. This research
                 work will help researchers to find the significance of
                 metadata management and important parameters of
                 metadata management techniques for storage systems.
                 Methodical examination of metadata management
                 techniques developed by various industry and research
                 groups is described. The different metadata
                 distribution techniques lead to various taxonomies.
                 Furthermore, the article investigates techniques based
                 on distribution structures and key parameters of
                 metadata management. It also presents strengths and
                 weaknesses of individual existing techniques that will
                 help researchers to select the most appropriate
                 technique for specific applications. Finally, it
                 discusses existing challenges and significant research
                 directions in metadata management for researchers.",
  acknowledgement = ack-nhfb,
  articleno =    "82",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Atluri:2018:STD,
  author =       "Gowtham Atluri and Anuj Karpatne and Vipin Kumar",
  title =        "Spatio-Temporal Data Mining: a Survey of Problems and
                 Methods",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "83:1--83:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3161602",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Large volumes of spatio-temporal data are increasingly
                 collected and studied in diverse domains, including
                 climate science, social sciences, neuroscience,
                 epidemiology, transportation, mobile health, and Earth
                 sciences. Spatio-temporal data differ from relational
                 data for which computational approaches are developed
                 in the data-mining community for multiple decades in
                 that both spatial and temporal attributes are available
                 in addition to the actual measurements/attributes. The
                 presence of these attributes introduces additional
                 challenges that needs to be dealt with. Approaches for
                 mining spatio-temporal data have been studied for over
                 a decade in the data-mining community. In this article,
                 we present a broad survey of this relatively young
                 field of spatio-temporal data mining. We discuss
                 different types of spatio-temporal data and the
                 relevant data-mining questions that arise in the
                 context of analyzing each of these datasets. Based on
                 the nature of the data-mining problem studied, we
                 classify literature on spatio-temporal data mining into
                 six major categories: clustering, predictive learning,
                 change detection, frequent pattern mining, anomaly
                 detection, and relationship mining. We discuss the
                 various forms of spatio-temporal data-mining problems
                 in each of these categories.",
  acknowledgement = ack-nhfb,
  articleno =    "83",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wylot:2018:RDS,
  author =       "Marcin Wylot and Manfred Hauswirth and Philippe
                 Cudr{\'e}-Mauroux and Sherif Sakr",
  title =        "{RDF} Data Storage and Query Processing Schemes: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "84:1--84:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3177850",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The Resource Description Framework (RDF) represents a
                 main ingredient and data representation format for
                 Linked Data and the Semantic Web. It supports a generic
                 graph-based data model and data representation format
                 for describing things, including their relationships
                 with other things. As the size of RDF datasets is
                 growing fast, RDF data management systems must be able
                 to cope with growing amounts of data. Even though
                 physically handling RDF data using a relational table
                 is possible, querying a giant triple table becomes very
                 expensive because of the multiple nested joins required
                 for answering graph queries. In addition, the
                 heterogeneity of RDF Data poses entirely new challenges
                 to database systems. This article provides a
                 comprehensive study of the state of the art in handling
                 and querying RDF data. In particular, we focus on data
                 storage techniques, indexing strategies, and query
                 execution mechanisms. Moreover, we provide a
                 classification of existing systems and approaches. We
                 also provide an overview of the various benchmarking
                 efforts in this context and discuss some of the open
                 problems in this domain.",
  acknowledgement = ack-nhfb,
  articleno =    "84",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fortuna:2018:SAD,
  author =       "Paula Fortuna and S{\'e}rgio Nunes",
  title =        "A Survey on Automatic Detection of Hate Speech in
                 Text",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "85:1--85:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3232676",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "The scientific study of hate speech, from a computer
                 science point of view, is recent. This survey organizes
                 and describes the current state of the field, providing
                 a structured overview of previous approaches, including
                 core algorithms, methods, and main features used. This
                 work also discusses the complexity of the concept of
                 hate speech, defined in many platforms and contexts,
                 and provides a unifying definition. This area has an
                 unquestionable potential for societal impact,
                 particularly in online communities and digital media
                 platforms. The development and systematization of
                 shared resources, such as guidelines, annotated
                 datasets in multiple languages, and algorithms, is a
                 crucial step in advancing the automatic detection of
                 hate speech.",
  acknowledgement = ack-nhfb,
  articleno =    "85",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Czajka:2018:PAD,
  author =       "Adam Czajka and Kevin W. Bowyer",
  title =        "Presentation Attack Detection for Iris Recognition: an
                 Assessment of the State-of-the-Art",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "86:1--86:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3232849",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Iris recognition is increasingly used in large-scale
                 applications. As a result, presentation attack
                 detection for iris recognition takes on fundamental
                 importance. This survey covers the diverse research
                 literature on this topic. Different categories of
                 presentation attack are described and placed in an
                 application-relevant framework, and the state of the
                 art in detecting each category of attack is summarized.
                 One conclusion from this is that presentation attack
                 detection for iris recognition is not yet a solved
                 problem. Datasets available for research are described,
                 research directions for the near- and medium-term
                 future are outlined, and a short list of recommended
                 readings is suggested.",
  acknowledgement = ack-nhfb,
  articleno =    "86",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gupta:2018:ART,
  author =       "Nishant Gupta and Vibhash Yadav and Mayank Singh",
  title =        "Automated Regression Test Case Generation for {Web}
                 Application: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "87:1--87:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3232520",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  abstract =     "Testing is one of the most important phases in the
                 development of any product or software. Various types
                 of software testing exist that have to be done to meet
                 the need of the software. Regression testing is one of
                 the crucial phases of testing where testing of a
                 program is done for the original test build along with
                 the modifications. In this article, various studies
                 proposed by the authors have been analysed focusing on
                 test cases generation and their approach toward web
                 application. A detailed study was conducted on
                 Regression Test Case Generation and its approaches
                 toward web application. From our detailed study, we
                 have found that very few approaches and methodologies
                 have been found that provide the real tool for test
                 case generation. There is a need of an automated
                 regression testing tool to generate the regression test
                 cases directly based on user requirements. These test
                 cases have to be generated and implemented by the tool
                 so that the reduction in the overall effort and cost
                 can be achieved. From our study, we have also found
                 that regression testing for web applications was not
                 investigated much, but in today's scenario web
                 applications are an integral part of our daily life and
                 so that needs to be tested for regression testing.",
  acknowledgement = ack-nhfb,
  articleno =    "87",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rastgoo:2019:CRP,
  author =       "Mohammad Naim Rastgoo and Bahareh Nakisa and Andry
                 Rakotonirainy and Vinod Chandran and Dian
                 Tjondronegoro",
  title =        "A Critical Review of Proactive Detection of Driver
                 Stress Levels Based on Multimodal Measurements",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "88:1--88:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3186585",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3186585",
  abstract =     "Stress is a major concern in daily life, as it imposes
                 significant and growing health and economic costs on
                 society every year. Stress and driving are a dangerous
                 combination and can lead to life-threatening
                 situations, evidenced by the large number of road
                 traffic crashes that occur every year due to driver
                 stress. In addition, the rate of general health issues
                 caused by work-related chronic stress in drivers who
                 work in public and private transport is greater than in
                 many other occupational groups. An in-vehicle warning
                 system for driver stress levels is needed to
                 continuously predict dangerous driving situations and
                 proactively alert drivers to ensure safe and
                 comfortable driving. As a result of the recent
                 developments in ambient intelligence, such as sensing
                 technologies, pervasive devices, context recognition,
                 and communications, driver stress can be automatically
                 detected using multimodal measurements. This critical
                 review investigates the state of the art of techniques
                 and achievements for automatic driver stress level
                 detection based on multimodal sensors and data. In this
                 work, the most widely used data followed by frequent
                 and highly performed selected features to detect driver
                 stress levels are analyzed and presented. This review
                 also discusses key methodological issues and gaps that
                 hinder the implementation of driver stress detection
                 systems and offers insights into future research
                 directions.",
  acknowledgement = ack-nhfb,
  articleno =    "88",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wan:2019:SGR,
  author =       "Changsheng Wan and Li Wang and Vir V. Phoha",
  title =        "A Survey on Gait Recognition",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "89:1--89:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3230633",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3230633",
  abstract =     "Recognizing people by their gait has become more and
                 more popular nowadays due to the following reasons.
                 First, gait recognition can work well remotely. Second,
                 gait recognition can be done from low-resolution videos
                 and with simple instrumentation. Third, gait
                 recognition can be done without the cooperation of
                 individuals. Fourth, gait recognition can work well
                 while other features such as faces and fingerprints are
                 hidden. Finally, gait features are typically difficult
                 to be impersonated. Recent ubiquity of smartphones that
                 capture gait patterns through accelerometers and
                 gyroscope and advances in machine learning have opened
                 new research directions and applications in gait
                 recognition. A timely survey that addresses current
                 advances is missing. In this article, we survey
                 research works in gait recognition. In addition to
                 recognition based on video, we address new modalities,
                 such as recognition based on floor sensors, radars, and
                 accelerometers; new approaches that include machine
                 learning methods; and examine challenges and
                 vulnerabilities in this field. In addition, we propose
                 a set of future research directions. Our review reveals
                 the current state-of-art and can be helpful to both
                 experts and newcomers of gait recognition. Moreover, it
                 lists future works and publicly available databases in
                 gait recognition for researchers.",
  acknowledgement = ack-nhfb,
  articleno =    "89",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kiennert:2019:SGT,
  author =       "Christophe Kiennert and Ziad Ismail and Herve Debar
                 and Jean Leneutre",
  title =        "A Survey on Game-Theoretic Approaches for Intrusion
                 Detection and Response Optimization",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "90:1--90:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3232848",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3232848",
  abstract =     "Intrusion Detection Systems (IDS) are key components
                 for securing critical infrastructures, capable of
                 detecting malicious activities on networks or hosts.
                 However, the efficiency of an IDS depends primarily on
                 both its configuration and its precision. The large
                 amount of network traffic that needs to be analyzed, in
                 addition to the increase in attacks' sophistication,
                 renders the optimization of intrusion detection an
                 important requirement for infrastructure security, and
                 a very active research subject. In the state of the
                 art, a number of approaches have been proposed to
                 improve the efficiency of intrusion detection and
                 response systems. In this article, we review the works
                 relying on decision-making techniques focused on game
                 theory and Markov decision processes to analyze the
                 interactions between the attacker and the defender, and
                 classify them according to the type of the optimization
                 problem they address. While these works provide
                 valuable insights for decision-making, we discuss the
                 limitations of these solutions as a whole, in
                 particular regarding the hypotheses in the models and
                 the validation methods. We also propose future research
                 directions to improve the integration of game-theoretic
                 approaches into IDS optimization techniques.",
  acknowledgement = ack-nhfb,
  articleno =    "90",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Covaci:2019:MMR,
  author =       "Alexandra Covaci and Longhao Zou and Irina Tal and
                 Gabriel-Miro Muntean and Gheorghita Ghinea",
  title =        "Is Multimedia Multisensorial? --- {A} Review of
                 Mulsemedia Systems",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "91:1--91:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3233774",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3233774",
  abstract =     "Mulsemedia-multiple sensorial media-makes possible the
                 inclusion of layered sensory stimulation and
                 interaction through multiple sensory channels. The
                 recent upsurge in technology and wearables provides
                 mulsemedia researchers a vehicle for potentially
                 boundless choice. However, in order to build systems
                 that integrate various senses, there are still some
                 issues that need to be addressed. This review deals
                 with mulsemedia topics that remain insufficiently
                 explored by previous work, with a focus on the
                 multi-multi (multiple media-multiple senses)
                 perspective, where multiple types of media engage
                 multiple senses. Moreover, it addresses the evolution
                 of previously identified challenges in this area and
                 formulates new exploration directions.",
  acknowledgement = ack-nhfb,
  articleno =    "91",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pouyanfar:2019:SDL,
  author =       "Samira Pouyanfar and Saad Sadiq and Yilin Yan and
                 Haiman Tian and Yudong Tao and Maria Presa Reyes and
                 Mei-Ling Shyu and Shu-Ching Chen and S. S. Iyengar",
  title =        "A Survey on Deep Learning: Algorithms, Techniques, and
                 Applications",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "92:1--92:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3234150",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3234150",
  abstract =     "The field of machine learning is witnessing its golden
                 era as deep learning slowly becomes the leader in this
                 domain. Deep learning uses multiple layers to represent
                 the abstractions of data to build computational models.
                 Some key enabler deep learning algorithms such as
                 generative adversarial networks, convolutional neural
                 networks, and model transfers have completely changed
                 our perception of information processing. However,
                 there exists an aperture of understanding behind this
                 tremendously fast-paced domain, because it was never
                 previously represented from a multiscope perspective.
                 The lack of core understanding renders these powerful
                 methods as black-box machines that inhibit development
                 at a fundamental level. Moreover, deep learning has
                 repeatedly been perceived as a silver bullet to all
                 stumbling blocks in machine learning, which is far from
                 the truth. This article presents a comprehensive review
                 of historical and recent state-of-the-art approaches in
                 visual, audio, and text processing; social network
                 analysis; and natural language processing, followed by
                 the in-depth analysis on pivoting and groundbreaking
                 advances in deep learning applications. It was also
                 undertaken to review the issues faced in deep learning
                 such as unsupervised learning, black-box models, and
                 online learning and to illustrate how these challenges
                 can be transformed into prolific future research
                 avenues.",
  acknowledgement = ack-nhfb,
  articleno =    "92",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Guidotti:2019:SME,
  author =       "Riccardo Guidotti and Anna Monreale and Salvatore
                 Ruggieri and Franco Turini and Fosca Giannotti and Dino
                 Pedreschi",
  title =        "A Survey of Methods for Explaining Black Box Models",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "93:1--93:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3236009",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3236009",
  abstract =     "In recent years, many accurate decision support
                 systems have been constructed as black boxes, that is
                 as systems that hide their internal logic to the user.
                 This lack of explanation constitutes both a practical
                 and an ethical issue. The literature reports many
                 approaches aimed at overcoming this crucial weakness,
                 sometimes at the cost of sacrificing accuracy for
                 interpretability. The applications in which black box
                 decision systems can be used are various, and each
                 approach is typically developed to provide a solution
                 for a specific problem and, as a consequence, it
                 explicitly or implicitly delineates its own definition
                 of interpretability and explanation. The aim of this
                 article is to provide a classification of the main
                 problems addressed in the literature with respect to
                 the notion of explanation and the type of black box
                 system. Given a problem definition, a black box type,
                 and a desired explanation, this survey should help the
                 researcher to find the proposals more useful for his
                 own work. The proposed classification of approaches to
                 open black box models should also be useful for putting
                 the many research open questions in perspective.",
  acknowledgement = ack-nhfb,
  articleno =    "93",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Avoine:2019:SDB,
  author =       "Gildas Avoine and Muhammed Ali Bing{\"o}l and Ioana
                 Boureanu and Srdjan Capkun and Gerhard Hancke and
                 S{\"u}leyman Kardas and Chong Hee Kim and C{\'e}dric
                 Lauradoux and Benjamin Martin and Jorge Munilla and
                 Alberto Peinado and Kasper Bonne Rasmussen and Dave
                 Singel{\'e}e and Aslan Tchamkerten and Rolando
                 Trujillo-Rasua and Serge Vaudenay",
  title =        "Security of Distance-Bounding: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "94:1--94:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3264628",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3264628",
  abstract =     "Distance-bounding protocols allow a verifier to both
                 authenticate a prover and evaluate whether the latter
                 is located in his vicinity. These protocols are of
                 particular interest in contactless systems, e.g.,
                 electronic payment or access control systems, which are
                 vulnerable to distance-based frauds. This survey
                 analyzes and compares in a unified manner many existing
                 distance-bounding protocols with respect to several key
                 security and complexity features.",
  acknowledgement = ack-nhfb,
  articleno =    "94",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Henriques:2019:TAT,
  author =       "Rui Henriques and Sara C. Madeira",
  title =        "Triclustering Algorithms for Three-Dimensional Data
                 Analysis: a Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "95:1--95:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3195833",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3195833",
  abstract =     "Three-dimensional data are increasingly prevalent
                 across biomedical and social domains. Notable examples
                 are gene-sample-time, individual-feature-time, or
                 node-node-time data, generally referred to as
                 observation-attribute-context data. The unsupervised
                 analysis of three-dimensional data can be pursued to
                 discover putative biological modules, disease
                 progression profiles, and communities of individuals
                 with coherent behavior, among other patterns of
                 interest. It is thus key to enhance the understanding
                 of complex biological, individual, and societal
                 systems. In this context, although clustering can be
                 applied to group observations, its relevance is limited
                 since observations in three-dimensional data domains
                 are typically only meaningfully correlated on subspaces
                 of the overall space. Biclustering tackles this
                 challenge but disregards the third dimension. In this
                 scenario, triclustering-the discovery of coherent
                 subspaces within three-dimensional data-has been
                 largely researched to tackle these problems. Despite
                 the diversity of contributions in this field, there
                 still lacks a structured view on the major requirements
                 of triclustering, desirable forms of homogeneity
                 (including coherency, structure, quality, locality, and
                 orthonormality criteria), and algorithmic approaches.
                 This work formalizes the triclustering task and its
                 scope, introduces a taxonomy to categorize the
                 contributions in the field, provides a comprehensive
                 comparison of state-of-the-art triclustering algorithms
                 according to their behavior and output, and lists
                 relevant real-world applications. Finally, it
                 highlights challenges and opportunities to advance the
                 field of triclustering and its applicability to complex
                 three-dimensional data analysis.",
  acknowledgement = ack-nhfb,
  articleno =    "95",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ashouri:2019:SCA,
  author =       "Amir H. Ashouri and William Killian and John Cavazos
                 and Gianluca Palermo and Cristina Silvano",
  title =        "A Survey on Compiler Autotuning using Machine
                 Learning",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "96:1--96:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3197978",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3197978",
  abstract =     "Since the mid-1990s, researchers have been trying to
                 use machine-learning-based approaches to solve a number
                 of different compiler optimization problems. These
                 techniques primarily enhance the quality of the
                 obtained results and, more importantly, make it
                 feasible to tackle two main compiler optimization
                 problems: optimization selection (choosing which
                 optimizations to apply) and phase-ordering (choosing
                 the order of applying optimizations). The compiler
                 optimization space continues to grow due to the
                 advancement of applications, increasing number of
                 compiler optimizations, and new target architectures.
                 Generic optimization passes in compilers cannot fully
                 leverage newly introduced optimizations and, therefore,
                 cannot keep up with the pace of increasing options.
                 This survey summarizes and classifies the recent
                 advances in using machine learning for the compiler
                 optimization field, particularly on the two major
                 problems of (1) selecting the best optimizations, and
                 (2) the phase-ordering of optimizations. The survey
                 highlights the approaches taken so far, the obtained
                 results, the fine-grain classification among different
                 approaches, and finally, the influential papers of the
                 field.",
  acknowledgement = ack-nhfb,
  articleno =    "96",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kumar:2019:KAC,
  author =       "Dileep Kumar and Akash Gandhamal and Sanjay Talbar and
                 Ahmad Fadzil Mohd Hani",
  title =        "Knee Articular Cartilage Segmentation from {MR}
                 Images: a Review",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "97:1--97:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3230631",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3230631",
  abstract =     "Articular cartilage (AC) is a flexible and soft yet
                 stiff tissue that can be visualized and interpreted
                 using magnetic resonance (MR) imaging for the
                 assessment of knee osteoarthritis. Segmentation of AC
                 from MR images is a challenging task that has been
                 investigated widely. The development of computational
                 methods to segment AC is highly dependent on various
                 image parameters, quality, tissue structure, and
                 acquisition protocol involved. This review focuses on
                 the challenges faced during AC segmentation from MR
                 images followed by the discussion on computational
                 methods for semi/fully automated approaches, whilst
                 performances parameters and their significances have
                 also been explored. Furthermore, hybrid approaches used
                 to segment AC are reviewed. This review indicates that
                 despite the challenges in AC segmentation, the
                 semi-automated method utilizing advanced computational
                 methods such as active contour and clustering have
                 shown significant accuracy. Fully automated AC
                 segmentation methods have obtained moderate accuracy
                 and show suitability for extensive clinical studies
                 whilst advanced methods are being investigated that
                 have led to achieving significantly better sensitivity.
                 In conclusion, this review indicates that research in
                 AC segmentation from MR images is moving towards the
                 development of fully automated methods using advanced
                 multi-level, multi-data, and multi-approach techniques
                 to provide assistance in clinical studies.",
  acknowledgement = ack-nhfb,
  articleno =    "97",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Liu:2019:HBI,
  author =       "Ming Liu and Zhi Xue and Xianghua Xu and Changmin
                 Zhong and Jinjun Chen",
  title =        "Host-Based Intrusion Detection System with System
                 Calls: Review and Future Trends",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "98:1--98:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3214304",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3214304",
  abstract =     "In a contemporary data center, Linux applications
                 often generate a large quantity of real-time system
                 call traces, which are not suitable for traditional
                 host-based intrusion detection systems deployed on
                 every single host. Training data mining models with
                 system calls on a single host that has static computing
                 and storage capacity is time-consuming, and
                 intermediate datasets are not capable of being
                 efficiently handled. It is cumbersome for the
                 maintenance and updating of host-based intrusion
                 detection systems (HIDS) installed on every physical or
                 virtual host, and comprehensive system call analysis
                 can hardly be performed to detect complex and
                 distributed attacks among multiple hosts. Considering
                 these limitations of current system-call-based HIDS, in
                 this article, we provide a review of the development of
                 system-call-based HIDS and future research trends.
                 Algorithms and techniques relevant to system-call-based
                 HIDS are investigated, including feature extraction
                 methods and various data mining algorithms. The HIDS
                 dataset issues are discussed, including currently
                 available datasets with system calls and approaches for
                 researchers to generate new datasets. The application
                 of system-call-based HIDS on current embedded systems
                 is studied, and related works are investigated.
                 Finally, future research trends are forecast regarding
                 three aspects, namely, the reduction of the
                 false-positive rate, the improvement of detection
                 efficiency, and the enhancement of collaborative
                 security.",
  acknowledgement = ack-nhfb,
  articleno =    "98",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Doherty:2019:EHC,
  author =       "Kevin Doherty and Gavin Doherty",
  title =        "Engagement in {HCI}: Conception, Theory and
                 Measurement",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "99:1--99:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3234149",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3234149",
  abstract =     "Engaging users is a priority for designers of products
                 and services of every kind. The need to understand
                 users' experiences has motivated a focus on user
                 engagement across computer science. However, to date,
                 there has been limited review of how Human--Computer
                 Interaction and computer science research interprets
                 and employs the concept. Questions persist concerning
                 its conception, abstraction, and measurement. This
                 article presents a systematic review of engagement
                 spanning a corpus of 351 articles and 102 definitions.
                 We map the current state of engagement research,
                 including the diverse interpretation, theory, and
                 measurement of the concept. We describe the ecology of
                 engagement and strategies for the design of engaging
                 experiences, discuss the value of the concept and its
                 relationship to other terms, and present a set of
                 guidelines and opportunities for future research.",
  acknowledgement = ack-nhfb,
  articleno =    "99",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tziakouris:2019:SSA,
  author =       "Giannis Tziakouris and Rami Bahsoon and Muhammad Ali
                 Babar",
  title =        "A Survey on Self-Adaptive Security for Large-scale
                 Open Environments",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "100:1--100:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3234148",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3234148",
  abstract =     "Contemporary software systems operate in
                 heterogeneous, dynamic, and distributed environments,
                 where security needs change at runtime. The security
                 solutions for such systems need to be adaptive for the
                 continuous satisfaction of the software systems'
                 security goals. Whilst the existing research on
                 self-adaptive security has made notable advancement
                 towards designing and engineering self-adaptive
                 security solutions, there exists little work on the
                 taxonomic analysis of the architectures of the reported
                 research and its applicability for open and ultra-large
                 environments. We propose an architecture-centric
                 taxonomy for mapping and comparing the current research
                 and identifying the future research directions in this
                 field. The proposed taxonomy has been used to review
                 the representative work on the architectural
                 characteristics that self-adaptive security systems
                 must maintain for their effective application in
                 large-scale open environments. We reflect on the
                 findings from the taxonomic analysis and discuss the
                 design principles, research challenges and limitations
                 reported in the state of the art and practice. We
                 outline the directions for the future research on
                 architectural level support for self-adaptive security
                 systems for large-scale open environments.",
  acknowledgement = ack-nhfb,
  articleno =    "100",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{DeSiqueiraBraga:2019:SCT,
  author =       "Diego {De Siqueira Braga} and Marco Niemann and Bernd
                 Hellingrath and Fernando Buarque {De Lima Neto}",
  title =        "Survey on Computational Trust and Reputation Models",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "101:1--101:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3236008",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3236008",
  abstract =     "Over the recent years, computational trust and
                 reputation models have become an invaluable method to
                 improve computer-computer and human-computer
                 interaction. As a result, a considerable amount of
                 research has been published trying to solve open
                 problems and improving existing models. This survey
                 will bring additional structure into the already
                 conducted research on both topics. After recapitulating
                 the major underlying concepts, a new integrated review
                 and analysis scheme for reputation and trust models is
                 put forward. Using highly recognized review papers in
                 this domain as a basis, this article will also
                 introduce additional evaluation metrics to account for
                 characteristics so far unstudied. A subsequent
                 application of the new review schema on 40 top recent
                 publications in this scientific field revealed
                 interesting insights. While the area of computational
                 trust and reputation models is still a very active
                 research branch, the analysis carried out here was able
                 to show that some aspects have already started to
                 converge, whereas others are still subject to vivid
                 discussions.",
  acknowledgement = ack-nhfb,
  articleno =    "101",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Grando:2019:MLN,
  author =       "Felipe Grando and Lisandro Z. Granville and Luis C.
                 Lamb",
  title =        "Machine Learning in Network Centrality Measures:
                 Tutorial and Outlook",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "102:1--102:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3237192",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3237192",
  abstract =     "Complex networks are ubiquitous to several computer
                 science domains. Centrality measures are an important
                 analysis mechanism to uncover vital elements of complex
                 networks. However, these metrics have high
                 computational costs and requirements that hinder their
                 applications in large real-world networks. In this
                 tutorial, we explain how the use of neural network
                 learning algorithms can render the application of the
                 metrics in complex networks of arbitrary size.
                 Moreover, the tutorial describes how to identify the
                 best configuration for neural network training and
                 learning such for tasks, besides presenting an easy way
                 to generate and acquire training data. We do so by
                 means of a general methodology, using complex network
                 models adaptable to any application. We show that a
                 regression model generated by the neural network
                 successfully approximates the metric values and
                 therefore is a robust, effective alternative in
                 real-world applications. The methodology and proposed
                 machine-learning model use only a fraction of time with
                 respect to other approximation algorithms, which is
                 crucial in complex network applications.",
  acknowledgement = ack-nhfb,
  articleno =    "102",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Moustaka:2019:SRS,
  author =       "Vaia Moustaka and Athena Vakali and Leonidas G.
                 Anthopoulos",
  title =        "A Systematic Review for Smart City Data Analytics",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "103:1--103:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3239566",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3239566",
  abstract =     "Smart cities (SCs) are becoming highly sophisticated
                 ecosystems at which innovative solutions and smart
                 services are being deployed. These ecosystems consider
                 SCs as data production and sharing engines, setting new
                 challenges for building effective SC architectures and
                 novel services. The aim of this article is to ``connect
                 the pieces'' among Data Science and SC domains, with a
                 systematic literature review which identifies the core
                 topics, services, and methods applied in SC data
                 monitoring. The survey focuses on data harvesting and
                 data mining processes over repeated SC data cycles. A
                 survey protocol is followed to reach both quantitative
                 and semantically important entities. The review results
                 generate useful taxonomies for data scientists in the
                 SC context, which offers clear guidelines for
                 corresponding future works. In particular, a taxonomy
                 is proposed for each of the main SC data entities,
                 namely, the ``D Taxonomy'' for the data production, the
                 ``M Taxonomy'' for data analytics methods, and the ``S
                 Taxonomy'' for smart services. Each of these taxonomies
                 clearly places entities in a classification which is
                 beneficial for multiple stakeholders and for multiple
                 domains in urban smartness targeting. Such indicative
                 scenarios are outlined and conclusions are quite
                 promising for systemizing.",
  acknowledgement = ack-nhfb,
  articleno =    "103",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gill:2019:TFD,
  author =       "Sukhpal Singh Gill and Rajkumar Buyya",
  title =        "A Taxonomy and Future Directions for Sustainable Cloud
                 Computing: 360 Degree View",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "104:1--104:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3241038",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3241038",
  abstract =     "The cloud-computing paradigm offers on-demand services
                 over the Internet and supports a wide variety of
                 applications. With the recent growth of Internet of
                 Things (IoT)--based applications, the use of cloud
                 services is increasing exponentially. The next
                 generation of cloud computing must be energy efficient
                 and sustainable to fulfill end-user requirements, which
                 are changing dynamically. Presently, cloud providers
                 are facing challenges to ensure the energy efficiency
                 and sustainability of their services. The use of a
                 large number of cloud datacenters increases cost as
                 well as carbon footprints, which further affects the
                 sustainability of cloud services. In this article, we
                 propose a comprehensive taxonomy of sustainable cloud
                 computing. The taxonomy is used to investigate the
                 existing techniques for sustainability that need
                 careful attention and investigation as proposed by
                 several academic and industry groups. The current
                 research on sustainable cloud computing is organized
                 into several categories: application design,
                 sustainability metrics, capacity planning, energy
                 management, virtualization, thermal-aware scheduling,
                 cooling management, renewable energy, and waste heat
                 utilization. The existing techniques have been compared
                 and categorized based on common characteristics and
                 properties. A conceptual model for sustainable cloud
                 computing has been presented along with a discussion on
                 future research directions.",
  acknowledgement = ack-nhfb,
  articleno =    "104",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Buyya:2019:MFG,
  author =       "Rajkumar Buyya and Satish Narayana Srirama and
                 Giuliano Casale and Rodrigo Calheiros and Yogesh
                 Simmhan and Blesson Varghese and Erol Gelenbe and
                 Bahman Javadi and Luis Miguel Vaquero and Marco A. S.
                 Netto and Adel Nadjaran Toosi and Maria Alejandra
                 Rodriguez and Ignacio M. Llorente and Sabrina {De
                 Capitani Di Vimercati} and Pierangela Samarati and
                 Dejan Milojicic and Carlos Varela and Rami Bahsoon and
                 Marcos {Dias De Assun{\c{c}}{\~a}o} and Omer Rana and
                 Wanlei Zhou and Hai Jin and Wolfgang Gentzsch and
                 Albert Y. Zomaya and Haiying Shen",
  title =        "A Manifesto for Future Generation Cloud Computing:
                 Research Directions for the Next Decade",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "105:1--105:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3241737",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3241737",
  abstract =     "The Cloud computing paradigm has revolutionised the
                 computer science horizon during the past decade and has
                 enabled the emergence of computing as the fifth
                 utility. It has captured significant attention of
                 academia, industries, and government bodies. Now, it
                 has emerged as the backbone of modern economy by
                 offering subscription-based services anytime, anywhere
                 following a pay-as-you-go model. This has instigated
                 (1) shorter establishment times for start-ups, (2)
                 creation of scalable global enterprise applications,
                 (3) better cost-to-value associativity for scientific
                 and high-performance computing applications, and (4)
                 different invocation/execution models for pervasive and
                 ubiquitous applications. The recent technological
                 developments and paradigms such as serverless
                 computing, software-defined networking, Internet of
                 Things, and processing at network edge are creating new
                 opportunities for Cloud computing. However, they are
                 also posing several new challenges and creating the
                 need for new approaches and research strategies, as
                 well as the re-evaluation of the models that were
                 developed to address issues such as scalability,
                 elasticity, reliability, security, sustainability, and
                 application models. The proposed manifesto addresses
                 them by identifying the major open challenges in Cloud
                 computing, emerging trends, and impact areas. It then
                 offers research directions for the next decade, thus
                 helping in the realisation of Future Generation Cloud
                 Computing.",
  acknowledgement = ack-nhfb,
  articleno =    "105",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Smirnova:2019:REU,
  author =       "Alisa Smirnova and Philippe Cudr{\'e}-Mauroux",
  title =        "Relation Extraction Using Distant Supervision: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "106:1--106:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3241741",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3241741",
  abstract =     "Relation extraction is a subtask of information
                 extraction where semantic relationships are extracted
                 from natural language text and then classified. In
                 essence, it allows us to acquire structured knowledge
                 from unstructured text. In this article, we present a
                 survey of relation extraction methods that leverage
                 pre-existing structured or semi-structured data to
                 guide the extraction process. We introduce a taxonomy
                 of existing methods and describe distant supervision
                 approaches in detail. We describe, in addition, the
                 evaluation methodologies and the datasets commonly used
                 for quality assessment. Finally, we give a high-level
                 outlook on the field, highlighting open problems as
                 well as the most promising research directions.",
  acknowledgement = ack-nhfb,
  articleno =    "106",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nayyer:2019:SCB,
  author =       "M. Ziad Nayyer and Imran Raza and Syed Asad Hussain",
  title =        "A Survey of Cloudlet-Based Mobile Augmentation
                 Approaches for Resource Optimization",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "107:1--107:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3241738",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3241738",
  abstract =     "Mobile devices (MDs) face resource scarcity challenges
                 owing to limited energy and computational resources.
                 Mobile cloud computing (MCC) offers a resource-rich
                 environment to MDs for offloading compute-intensive
                 tasks encountering resource scarcity challenges.
                 However, users are unable to exploit its full potential
                 owing to challenges of distance, limited bandwidth, and
                 seamless connectivity between the remote cloud (RC) and
                 MDs in the conventional MCC model. The cloudlet-based
                 solution is widely used to address these challenges.
                 The response of the cloudlet-based solution is faster
                 than the conventional mobile cloud-computing model,
                 rendering it suitable for the Internet of Things (IoT)
                 and Smart Cities (SC). However, with the increase in
                 devices and workloads, the cloudlet-based solution has
                 to deal with resource-scarcity challenges, thus,
                 forwarding the requests to remote clouds. This study
                 has been carried out to provide an insight into
                 existing cloudlet-based mobile augmentation (CtMA)
                 approaches and highlights the underlying limitations
                 for resource optimization. Furthermore, numerous
                 performance parameters have been identified and their
                 detailed comparative analysis has been used to quantify
                 the efficiency of CtMA approaches.",
  acknowledgement = ack-nhfb,
  articleno =    "107",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Biorn-Hansen:2019:STC,
  author =       "Andreas Bi{\o}rn-Hansen and Tor-Morten Gr{\o}nli and
                 Gheorghita Ghinea",
  title =        "A Survey and Taxonomy of Core Concepts and Research
                 Challenges in Cross-Platform Mobile Development",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "108:1--108:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3241739",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3241739",
  abstract =     "Developing applications targeting mobile devices is a
                 complex task involving numerous options, technologies,
                 and trade-offs, mostly due to the proliferation and
                 fragmentation of devices and platforms. As a result of
                 this, cross-platform app development has enjoyed the
                 attention of practitioners and academia for the
                 previous decade. Throughout this review, we assess the
                 academic body of knowledge and report on the state of
                 research on the field. We do so with a particular
                 emphasis on core concepts, including those of user
                 experience, device features, performance, and security.
                 Our findings illustrate that the state of research
                 demand for empirical verification of an array of
                 unbacked claims, and that a particular focus on
                 qualitative user-oriented research is essential.
                 Through our outlined taxonomy and state of research
                 overview, we identify research gaps and challenges, and
                 provide numerous suggestions for further research.",
  acknowledgement = ack-nhfb,
  articleno =    "108",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Khan:2019:SPN,
  author =       "Yasir Imtiaz Khan and Alexandros Konios and Nicolas
                 Guelfi",
  title =        "A Survey of {Petri} Nets Slicing",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "109:1--109:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3241736",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3241736",
  abstract =     "Petri nets slicing is a technique that aims to improve
                 the verification of systems modeled in Petri nets.
                 Petri nets slicing was first developed to facilitate
                 debugging, but then was used for the alleviation of the
                 state space explosion problem for the model checking of
                 Petri nets. In this article, different slicing
                 techniques are studied along with their algorithms
                 introducing: (i) a classification of Petri nets slicing
                 algorithms based on their construction methodology and
                 objective (such as improving state space analysis or
                 testing); (ii) a qualitative and quantitative
                 discussion and comparison of major differences such as
                 accuracy and efficiency: (iii) a syntactic unification
                 of slicing algorithms that improve state space analysis
                 for easy and clear understanding; and (iv) applications
                 of slicing for multiple perspectives. Furthermore, some
                 recent improvements to slicing algorithms are
                 presented, which can certainly reduce the slice size
                 even for strongly connected nets. A noteworthy use of
                 this survey is for the selection and improvement of
                 slicing techniques for optimizing the verification of
                 state event models.",
  acknowledgement = ack-nhfb,
  articleno =    "109",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wang:2019:MLS,
  author =       "Ping Wang and Yan Li and Chandan K. Reddy",
  title =        "Machine Learning for Survival Analysis: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "110:1--110:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3214306",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3214306",
  abstract =     "Survival analysis is a subfield of statistics where
                 the goal is to analyze and model data where the outcome
                 is the time until an event of interest occurs. One of
                 the main challenges in this context is the presence of
                 instances whose event outcomes become unobservable
                 after a certain time point or when some instances do
                 not experience any event during the monitoring period.
                 This so-called censoring can be handled most
                 effectively using survival analysis techniques.
                 Traditionally, statistical approaches have been widely
                 developed in the literature to overcome the issue of
                 censoring. In addition, many machine learning
                 algorithms have been adapted to deal with such censored
                 data and tackle other challenging problems that arise
                 in real-world data. In this survey, we provide a
                 comprehensive and structured review of the statistical
                 methods typically used and the machine learning
                 techniques developed for survival analysis, along with
                 a detailed taxonomy of the existing methods. We also
                 discuss several topics that are closely related to
                 survival analysis and describe several successful
                 applications in a variety of real-world application
                 domains. We hope that this article will give readers a
                 more comprehensive understanding of recent advances in
                 survival analysis and offer some guidelines for
                 applying these approaches to solve new problems arising
                 in applications involving censored data.",
  acknowledgement = ack-nhfb,
  articleno =    "110",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ferrer:2019:TDC,
  author =       "Ana Juan Ferrer and Joan Manuel Marqu{\`e}s and Josep
                 Jorba",
  title =        "Towards the Decentralised Cloud: Survey on Approaches
                 and Challenges for Mobile, Ad hoc, and Edge Computing",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "111:1--111:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3243929",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3243929",
  abstract =     "Cloud computing emerged as a centralised paradigm that
                 made ``infinite'' computing resources available on
                 demand. Nevertheless, the ever-increasing computing
                 capacities present on smart connected things and
                 devices calls for the decentralisation of Cloud
                 computing to avoid unnecessary latencies and fully
                 exploit accessible computing capacities at the edges of
                 the network. Whilst these decentralised Cloud models
                 represent a significant breakthrough from a Cloud
                 perspective, they are rooted in existing research areas
                 such as Mobile Cloud Computing, Mobile Ad hoc
                 Computing, and Edge computing. This article analyses
                 the pre-existing works to determine their role in
                 Decentralised Cloud and future computing development.",
  acknowledgement = ack-nhfb,
  articleno =    "111",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gui:2019:SBB,
  author =       "Qiong Gui and Maria V. Ruiz-Blondet and Sarah Laszlo
                 and Zhanpeng Jin",
  title =        "A Survey on Brain Biometrics",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "112:1--112:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3230632",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3230632",
  abstract =     "Brainwaves, which reflect brain electrical activity
                 and have been studied for a long time in the domain of
                 cognitive neuroscience, have recently been proposed as
                 a promising biometric approach due to their unique
                 advantages of confidentiality, resistance to
                 spoofing/circumvention, sensitivity to emotional and
                 mental state, continuous nature, and cancelability.
                 Recent research efforts have explored many possible
                 ways of using brain biometrics and demonstrated that
                 they are a promising candidate for more robust and
                 secure personal identification and authentication.
                 Although existing research on brain biometrics has
                 obtained some intriguing insights, much work is still
                 necessary to achieve a reliable ready-to-deploy brain
                 biometric system. This article aims to provide a
                 detailed survey of the current literature and outline
                 the scientific work conducted on brain biometric
                 systems. It provides an up-to-date review of
                 state-of-the-art acquisition, collection, processing,
                 and analysis of brainwave signals, publicly available
                 databases, feature extraction and selection, and
                 classifiers. Furthermore, it highlights some of the
                 emerging open research problems for brain biometrics,
                 including multimodality, security, permanence, and
                 stability.",
  acknowledgement = ack-nhfb,
  articleno =    "112",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Israelsen:2019:DCA,
  author =       "Brett W. Israelsen and Nisar R. Ahmed",
  title =        "``{Dave} \ldots{} {I} can assure you \ldots{} that
                 it's going to be all right \ldots{}'' {A} Definition,
                 Case for, and Survey of Algorithmic Assurances in
                 Human--Autonomy Trust Relationships",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "113:1--113:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3267338",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3267338",
  abstract =     "People who design, use, and are affected by autonomous
                 artificially intelligent agents want to be able to
                 trust such agents-that is, to know that these agents
                 will perform correctly, to understand the reasoning
                 behind their actions, and to know how to use them
                 appropriately. Many techniques have been devised to
                 assess and influence human trust in artificially
                 intelligent agents. However, these approaches are
                 typically ad hoc and have not been formally related to
                 each other or to formal trust models. This article
                 presents a survey of algorithmic assurances, i.e.,
                 programmed components of agent operation that are
                 expressly designed to calibrate user trust in
                 artificially intelligent agents. Algorithmic assurances
                 are first formally defined and classified from the
                 perspective of formally modeled human-artificially
                 intelligent agent trust relationships. Building on
                 these definitions, a synthesis of research across
                 communities such as machine learning, human-computer
                 interaction, robotics, e-commerce, and others reveals
                 that assurance algorithms naturally fall along a
                 spectrum in terms of their impact on an agent's core
                 functionality, with seven notable classes ranging from
                 integral assurances (which impact an agent's core
                 functionality) to supplemental assurances (which have
                 no direct effect on agent performance). Common
                 approaches within each of these classes are identified
                 and discussed; benefits and drawbacks of different
                 approaches are also investigated.",
  acknowledgement = ack-nhfb,
  articleno =    "113",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bonfim:2019:INS,
  author =       "Michel S. Bonfim and Kelvin L. Dias and Stenio F. L.
                 Fernandes",
  title =        "Integrated {NFV\slash SDN} Architectures: a Systematic
                 Literature Review",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "114:1--114:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3172866",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3172866",
  abstract =     "Network Functions Virtualization (NFV) and
                 Software-Defined Networking (SDN) are new paradigms in
                 the move towards open software and network hardware.
                 While NFV aims to virtualize network functions and
                 deploy them into general purpose hardware, SDN makes
                 networks programmable by separating the control and
                 data planes. NFV and SDN are complementary technologies
                 capable of providing one network solution. SDN can
                 provide connectivity between Virtual Network Functions
                 (VNFs) in a flexible and automated way, whereas NFV can
                 use SDN as part of a service function chain. There are
                 many studies designing NFV/SDN architectures in
                 different environments. Researchers have been trying to
                 address reliability, performance, and scalability
                 problems using different architectural designs. This
                 Systematic Literature Review (SLR) focuses on
                 integrated NFV/SDN architectures, with the following
                 goals: (i) to investigate and provide an in-depth
                 review of the state of the art of NFV/SDN
                 architectures, (ii) to synthesize their architectural
                 designs, and (iii) to identify areas for further
                 improvements. Broadly, this SLR will encourage
                 researchers to advance the current stage of development
                 (i.e., the state of the practice) of integrated NFV/SDN
                 architectures and shed some light on future research
                 efforts and the challenges faced.",
  acknowledgement = ack-nhfb,
  articleno =    "114",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bashir:2019:SCO,
  author =       "Janibul Bashir and Eldhose Peter and Smruti R.
                 Sarangi",
  title =        "A Survey of On-Chip Optical Interconnects",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "115:1--115:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3267934",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3267934",
  abstract =     "Numerous challenges present themselves when scaling
                 traditional on-chip electrical networks to large
                 manycore processors. Some of these challenges include
                 high latency, limitations on bandwidth, and power
                 consumption. Researchers have therefore been looking
                 for alternatives. As a result, on-chip nanophotonics
                 has emerged as a strong substitute for traditional
                 electrical NoCs. As of 2017, on-chip optical networks
                 have moved out of textbooks and found commercial
                 applicability in short-haul networks such as links
                 between servers on the same rack or between two
                 components on the motherboard. It is widely
                 acknowledged that in the near future, optical
                 technologies will move beyond research prototypes and
                 find their way into the chip. Optical networks already
                 feature in the roadmaps of major processor
                 manufacturers and most on-chip optical devices are
                 beginning to show signs of maturity. This article is
                 designed to provide a survey of on-chip optical
                 technologies covering the basic physics underlying the
                 operation of optical technologies, optical devices,
                 popular architectures, power reduction techniques, and
                 applications. The aim of this survey article is to
                 start from the fundamental concepts and move on to the
                 latest in the field of on-chip optical interconnects.",
  acknowledgement = ack-nhfb,
  articleno =    "115",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dizdarevic:2019:SCP,
  author =       "Jasenka Dizdarevi{\'c} and Francisco Carpio and Admela
                 Jukan and Xavi Masip-Bruin",
  title =        "A Survey of Communication Protocols for {Internet of
                 Things} and Related Challenges of Fog and Cloud
                 Computing Integration",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "116:1--116:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3292674",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3292674",
  abstract =     "The fast increment in the number of IoT (Internet of
                 Things) devices is accelerating the research on new
                 solutions to make cloud services scalable. In this
                 context, the novel concept of fog computing as well as
                 the combined fog-to-cloud computing paradigm is
                 becoming essential to decentralize the cloud, while
                 bringing the services closer to the end-system. This
                 article surveys e application layer communication
                 protocols to fulfill the IoT communication
                 requirements, and their potential for implementation in
                 fog- and cloud-based IoT systems. To this end, the
                 article first briefly presents potential protocol
                 candidates, including request-reply and
                 publish-subscribe protocols. After that, the article
                 surveys these protocols based on their main
                 characteristics, as well as the main performance
                 issues, including latency, energy consumption, and
                 network throughput. These findings are thereafter used
                 to place the protocols in each segment of the system
                 (IoT, fog, cloud), and thus opens up the discussion on
                 their choice, interoperability, and wider system
                 integration. The survey is expected to be useful to
                 system architects and protocol designers when choosing
                 the communication protocols in an integrated
                 IoT-to-fog-to-cloud system architecture.",
  acknowledgement = ack-nhfb,
  articleno =    "116",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Diaz:2019:PAH,
  author =       "Moises Diaz and Miguel A. Ferrer and Donato Impedovo
                 and Muhammad Imran Malik and Giuseppe Pirlo and
                 R{\'e}jean Plamondon",
  title =        "A Perspective Analysis of Handwritten Signature
                 Technology",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "117:1--117:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3274658",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3274658",
  abstract =     "Handwritten signatures are biometric traits at the
                 center of debate in the scientific community. Over the
                 last 40 years, the interest in signature studies has
                 grown steadily, having as its main reference the
                 application of automatic signature verification, as
                 previously published reviews in 1989, 2000, and 2008
                 bear witness. Ever since, and over the last 10 years,
                 the application of handwritten signature technology has
                 strongly evolved and much research has focused on the
                 possibility of applying systems based on handwritten
                 signature analysis and processing to a multitude of new
                 fields. After several years of haphazard growth of this
                 research area, it is time to assess its current
                 developments for their applicability in order to draw a
                 structured way forward. This perspective reports a
                 systematic review of the last 10 years of the
                 literature on handwritten signatures with respect to
                 the new scenario, focusing on the most promising
                 domains of research and trying to elicit possible
                 future research directions in this subject.",
  acknowledgement = ack-nhfb,
  articleno =    "117",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hossain:2019:CSD,
  author =       "MD. Zakir Hossain and Ferdous Sohel and Mohd Fairuz
                 Shiratuddin and Hamid Laga",
  title =        "A Comprehensive Survey of Deep Learning for Image
                 Captioning",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "118:1--118:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3295748",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3295748",
  abstract =     "Generating a description of an image is called image
                 captioning. Image captioning requires recognizing the
                 important objects, their attributes, and their
                 relationships in an image. It also needs to generate
                 syntactically and semantically correct sentences.
                 Deep-learning-based techniques are capable of handling
                 the complexities and challenges of image captioning. In
                 this survey article, we aim to present a comprehensive
                 review of existing deep-learning-based image captioning
                 techniques. We discuss the foundation of the techniques
                 to analyze their performances, strengths, and
                 limitations. We also discuss the datasets and the
                 evaluation metrics popularly used in
                 deep-learning-based automatic image captioning.",
  acknowledgement = ack-nhfb,
  articleno =    "118",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Elhabbash:2019:CBS,
  author =       "Abdessalam Elhabbash and Faiza Samreen and James
                 Hadley and Yehia Elkhatib",
  title =        "Cloud Brokerage: a Systematic Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "119:1--119:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3274657",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3274657",
  abstract =     "Background -The proliferation of cloud services has
                 opened a space for cloud brokerage services. Brokers
                 intermediate between cloud customers and providers to
                 assist the customer in selecting the most suitable
                 service, helping to manage the dimensionality,
                 heterogeneity, and uncertainty associated with cloud
                 services. Objective -Unlike other surveys, this survey
                 focuses on the customer perspective. The survey
                 systematically analyses the literature to identify and
                 classify approaches to realise cloud brokerage,
                 presenting an understanding of the state-of-the-art and
                 a novel taxonomy to characterise cloud brokers. Method
                 -A systematic literature survey was conducted to
                 compile studies related to cloud brokerage and explore
                 how cloud brokers are engineered. These studies are
                 then analysed from multiple perspectives, such as
                 motivation, functionality, engineering approach, and
                 evaluation methodology. Results -The survey resulted in
                 a knowledge base of current proposals for realising
                 cloud brokers. The survey identified differences
                 between the studies' implementations, with engineering
                 efforts directed at combinations of market-based
                 solutions, middlewares, toolkits, algorithms, semantic
                 frameworks, and conceptual frameworks. Conclusion -Our
                 comprehensive meta-analysis shows that cloud brokerage
                 is still a formative field. Although significant
                 progress has been achieved in this field, considerable
                 challenges remain to be addressed, which are also
                 identified in this survey.",
  acknowledgement = ack-nhfb,
  articleno =    "119",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kumar:2019:ICL,
  author =       "Pawan Kumar and Rakesh Kumar",
  title =        "Issues and Challenges of Load Balancing Techniques in
                 Cloud Computing: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "120:1--120:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3281010",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3281010",
  abstract =     "With the growth in computing technologies, cloud
                 computing has added a new paradigm to user services
                 that allows accessing Information Technology services
                 on the basis of pay-per-use at any time and any
                 location. Owing to flexibility in cloud services,
                 numerous organizations are shifting their business to
                 the cloud and service providers are establishing more
                 data centers to provide services to users. However, it
                 is essential to provide cost-effective execution of
                 tasks and proper utilization of resources. Several
                 techniques have been reported in the literature to
                 improve performance and resource use based on load
                 balancing, task scheduling, resource management,
                 quality of service, and workload management. Load
                 balancing in the cloud allows data centers to avoid
                 overloading/underloading in virtual machines, which
                 itself is a challenge in the field of cloud computing.
                 Therefore, it becomes a necessity for developers and
                 researchers to design and implement a suitable load
                 balancer for parallel and distributed cloud
                 environments. This survey presents a state-of-the-art
                 review of issues and challenges associated with
                 existing load-balancing techniques for researchers to
                 develop more effective algorithms.",
  acknowledgement = ack-nhfb,
  articleno =    "120",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jabal:2019:MTP,
  author =       "Amani Abu Jabal and Maryam Davari and Elisa Bertino
                 and Christian Makaya and Seraphin Calo and Dinesh Verma
                 and Alessandra Russo and Christopher Williams",
  title =        "Methods and Tools for Policy Analysis",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "121:1--121:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3295749",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3295749",
  abstract =     "Policy-based management of computer systems, computer
                 networks and devices is a critical technology
                 especially for present and future systems characterized
                 by large-scale systems with autonomous devices, such as
                 robots and drones. Maintaining reliable policy systems
                 requires efficient and effective analysis approaches to
                 ensure that the policies verify critical properties,
                 such as correctness and consistency. In this paper, we
                 present an extensive overview of methods for policy
                 analysis. Then, we survey policy analysis systems and
                 frameworks that have been proposed and compare them
                 under various dimensions. We conclude the paper by
                 outlining novel research directions in the area of
                 policy analysis.",
  acknowledgement = ack-nhfb,
  articleno =    "121",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Manazir:2019:RDC,
  author =       "Abdul Manazir and Khalid Raza",
  title =        "Recent Developments in {Cartesian} Genetic Programming
                 and its Variants",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "122:1--122:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3275518",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3275518",
  abstract =     "Cartesian Genetic Programming (CGP) is a variant of
                 Genetic Programming with several advantages. During the
                 last one and a half decades, CGP has been further
                 extended to several other forms with lots of promising
                 advantages and applications. This article formally
                 discusses the classical form of CGP and its six
                 different variants proposed so far, which include
                 Embedded CGP, Self-Modifying CGP, Recurrent CGP,
                 Mixed-Type CGP, Balanced CGP, and Differential CGP.
                 Also, this article makes a comparison among these
                 variants in terms of population representations,
                 various constraints in representation, operators and
                 functions applied, and algorithms used. Further, future
                 work directions and open problems in the area have been
                 discussed.",
  acknowledgement = ack-nhfb,
  articleno =    "122",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Tavara:2019:PCS,
  author =       "Shirin Tavara",
  title =        "Parallel Computing of Support Vector Machines: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "123:1--123:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3280989",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3280989",
  abstract =     "The immense amount of data created by digitalization
                 requires parallel computing for machine-learning
                 methods. While there are many parallel implementations
                 for support vector machines (SVMs), there is no clear
                 suggestion for every application scenario. Many
                 factor-including optimization algorithm, problem size
                 and dimension, kernel function, parallel programming
                 stack, and hardware architecture-impact the efficiency
                 of implementations. It is up to the user to balance
                 trade-offs, particularly between computation time and
                 classification accuracy. In this survey, we review the
                 state-of-the-art implementations of SVMs, their pros
                 and cons, and suggest possible avenues for future
                 research.",
  acknowledgement = ack-nhfb,
  articleno =    "123",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Testa:2019:SFE,
  author =       "Rafael Luiz Testa and Cl{\'e}ber Gimenez Corr{\^e}a
                 and Ariane Machado-Lima and F{\'a}tima L. S. Nunes",
  title =        "Synthesis of Facial Expressions in Photographs:
                 Characteristics, Approaches, and Challenges",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "124:1--124:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3292652",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3292652",
  abstract =     "The synthesis of facial expressions has applications
                 in areas such as interactive games, biometrics systems,
                 and training of people with disorders, among others.
                 Although this is an area relatively well explored in
                 the literature, there are no recent studies proposing
                 to systematize an overview of research in the area.
                 This systematic review analyzes the approaches to the
                 synthesis of facial expressions in photographs, as well
                 as important aspects of the synthesis process, such as
                 preprocessing techniques, databases, and evaluation
                 metrics. Forty-eight studies from three different
                 scientific databases were analyzed. From these studies,
                 we established an overview of the process, including
                 all the stages used to synthesize expressions in facial
                 images. We also analyze important aspects involved in
                 these stages such as methods and techniques of each
                 stage, databases, and evaluation metrics. We observed
                 that machine learning approaches are the most widely
                 used to synthesize expressions. Landmark
                 identification, deformation, mapping, fusion, and
                 training are common tasks considered in the approaches.
                 We also found that few studies used metrics to evaluate
                 the results, and most studies used public databases.
                 Although the studies analyzed generated consistent and
                 realistic results while preserving the identity of the
                 subject, there are still research themes to be
                 exploited.",
  acknowledgement = ack-nhfb,
  articleno =    "124",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Patrignani:2019:FAS,
  author =       "Marco Patrignani and Amal Ahmed and Dave Clarke",
  title =        "Formal Approaches to Secure Compilation: a Survey of
                 Fully Abstract Compilation and Related Work",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "125:1--125:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3280984",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3280984",
  abstract =     "Secure compilation is a discipline aimed at developing
                 compilers that preserve the security properties of the
                 source programs they take as input in the target
                 programs they produce as output. This discipline is
                 broad in scope, targeting languages with a variety of
                 features (including objects, higher-order functions,
                 dynamic memory allocation, call/cc, concurrency) and
                 employing a range of different techniques to ensure
                 that source-level security is preserved at the target
                 level. This article provides a survey of the existing
                 literature on formal approaches to secure compilation
                 with a focus on those that prove fully abstract
                 compilation, which has been the criterion adopted by
                 much of the literature thus far. This article then
                 describes the formal techniques employed to prove
                 secure compilation in existing work, introducing
                 relevant terminology, and discussing the merits and
                 limitations of each work. Finally, this article
                 discusses open challenges and possible directions for
                 future work in secure compilation.",
  acknowledgement = ack-nhfb,
  articleno =    "125",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rico-Gallego:2019:SCP,
  author =       "Juan A. Rico-Gallego and Juan C. D{\'\i}az-Mart{\'\i}n
                 and Ravi Reddy Manumachu and Alexey L. Lastovetsky",
  title =        "A Survey of Communication Performance Models for
                 High-Performance Computing",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "126:1--126:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3284358",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3284358",
  abstract =     "This survey aims to present the state of the art in
                 analytic communication performance models, providing
                 sufficiently detailed descriptions of particularly
                 noteworthy efforts. Modeling the cost of communications
                 in computer clusters is an important and challenging
                 problem. It provides insights into the design of the
                 communication pattern of parallel scientific
                 applications and mathematical kernels and sets a clear
                 ground for optimization of their deployment in the
                 increasingly complex high-performance computing
                 infrastructure. The survey provides background
                 information on how different performance models
                 represent the underlying platform and shows the
                 evolution of these models over time from early clusters
                 of single-core processors to present-day multi-core and
                 heterogeneous platforms. Prospective directions for
                 future research in the area of analytic communication
                 performance modeling conclude the survey.",
  acknowledgement = ack-nhfb,
  articleno =    "126",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kolbe:2019:LVR,
  author =       "Niklas Kolbe and Sylvain Kubler and J{\'e}r{\'e}my
                 Robert and Yves {Le Traon} and Arkady Zaslavsky",
  title =        "Linked Vocabulary Recommendation Tools for {Internet
                 of Things}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "127:1--127:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3284316",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3284316",
  abstract =     "The Semantic Web emerged with the vision of eased
                 integration of heterogeneous, distributed data on the
                 Web. The approach fundamentally relies on the linkage
                 between and reuse of previously published vocabularies
                 to facilitate semantic interoperability. In recent
                 years, the Semantic Web has been perceived as a
                 potential enabling technology to overcome
                 interoperability issues in the Internet of Things
                 (IoT), especially for service discovery and
                 composition. Despite the importance of making
                 vocabulary terms discoverable and selecting the most
                 suitable ones in forthcoming IoT applications, no
                 state-of-the-art survey of tools achieving such
                 recommendation tasks exists to date. This survey covers
                 this gap by specifying an extensive evaluation
                 framework and assessing linked vocabulary
                 recommendation tools. Furthermore, we discuss
                 challenges and opportunities of vocabulary
                 recommendation and related tools in the context of
                 emerging IoT ecosystems. Overall, 40 recommendation
                 tools for linked vocabularies were evaluated, both
                 empirically and experimentally. Some of the key
                 findings include that (i) many tools neglect to
                 thoroughly address both the curation of a vocabulary
                 collection and effective selection mechanisms, (ii)
                 modern information retrieval techniques are
                 underrepresented, and (iii) the reviewed tools that
                 emerged from Semantic Web use cases are not yet
                 sufficiently extended to fit today's IoT projects.",
  acknowledgement = ack-nhfb,
  articleno =    "127",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cho:2019:SMT,
  author =       "Jin-Hee Cho and Shouhuai Xu and Patrick M. Hurley and
                 Matthew Mackay and Trevor Benjamin and Mark Beaumont",
  title =        "{STRAM}: Measuring the Trustworthiness of
                 Computer-Based Systems",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "128:1--128:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3277666",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3277666",
  abstract =     "Various system metrics have been proposed for
                 measuring the quality of computer-based systems, such
                 as dependability and security metrics for estimating
                 their performance and security characteristics. As
                 computer-based systems grow in complexity with many
                 subsystems or components, measuring their quality in
                 multiple dimensions is a challenging task. In this
                 work, we tackle the problem of measuring the quality of
                 computer-based systems based on the four key attributes
                 of trustworthiness we developed: security, trust,
                 resilience, and agility. In addition to conducting a
                 systematic survey on metrics, measurements, attributes
                 of metrics, and associated ontologies, we propose a
                 system-level trustworthiness metric framework that
                 accommodates four submetrics, called STRAM (Security,
                 Trust, Resilience, and Agility Metrics). The proposed
                 STRAM framework offers a hierarchical ontology
                 structure where each submetric is defined as a
                 sub-ontology. Moreover, this work proposes developing
                 and incorporating metrics describing key assessment
                 tools, including vulnerability assessment, risk
                 assessment, and red teaming, to provide additional
                 evidence in the measurement and quality of trustworthy
                 systems. We further discuss how assessment tools are
                 related to measuring the quality of computer-based
                 systems and the limitations of the state-of-the-art
                 metrics and measurements. Finally, we suggest future
                 research directions for system-level metrics research
                 toward measuring fundamental attributes of the quality
                 of computer-based systems and improving the current
                 metric and measurement methodologies.",
  acknowledgement = ack-nhfb,
  articleno =    "128",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nejatollahi:2019:PQL,
  author =       "Hamid Nejatollahi and Nikil Dutt and Sandip Ray and
                 Francesco Regazzoni and Indranil Banerjee and Rosario
                 Cammarota",
  title =        "Post-Quantum Lattice-Based Cryptography
                 Implementations: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "129:1--129:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3292548",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3292548",
  abstract =     "The advent of quantum computing threatens to break
                 many classical cryptographic schemes, leading to
                 innovations in public key cryptography that focus on
                 post-quantum cryptography primitives and protocols
                 resistant to quantum computing threats. Lattice-based
                 cryptography is a promising post-quantum cryptography
                 family, both in terms of foundational properties as
                 well as in its application to both traditional and
                 emerging security problems such as encryption, digital
                 signature, key exchange, and homomorphic encryption.
                 While such techniques provide guarantees, in theory,
                 their realization on contemporary computing platforms
                 requires careful design choices and tradeoffs to manage
                 both the diversity of computing platforms (e.g.,
                 high-performance to resource constrained), as well as
                 the agility for deployment in the face of emerging and
                 changing standards. In this work, we survey trends in
                 lattice-based cryptographic schemes, some recent
                 fundamental proposals for the use of lattices in
                 computer security, challenges for their implementation
                 in software and hardware, and emerging needs for their
                 adoption. The survey means to be informative about the
                 math to allow the reader to focus on the mechanics of
                 the computation ultimately needed for mapping schemes
                 on existing hardware or synthesizing part or all of a
                 scheme on special-purpose hardware.",
  acknowledgement = ack-nhfb,
  articleno =    "129",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pinto:2019:DAT,
  author =       "Sandro Pinto and Nuno Santos",
  title =        "Demystifying {Arm TrustZone}: a Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "130:1--130:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3291047",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3291047",
  abstract =     "The world is undergoing an unprecedented technological
                 transformation, evolving into a state where ubiquitous
                 Internet-enabled ``things'' will be able to generate
                 and share large amounts of security- and
                 privacy-sensitive data. To cope with the security
                 threats that are thus foreseeable, system designers can
                 find in Arm TrustZone hardware technology a most
                 valuable resource. TrustZone is a System-on-Chip and
                 CPU system-wide security solution, available on today's
                 Arm application processors and present in the new
                 generation Arm microcontrollers, which are expected to
                 dominate the market of smart ``things.'' Although this
                 technology has remained relatively underground since
                 its inception in 2004, over the past years, numerous
                 initiatives have significantly advanced the state of
                 the art involving Arm TrustZone. Motivated by this
                 revival of interest, this paper presents an in-depth
                 study of TrustZone technology. We provide a
                 comprehensive survey of relevant work from academia and
                 industry, presenting existing systems into two main
                 areas, namely, Trusted Execution Environments and
                 hardware-assisted virtualization. Furthermore, we
                 analyze the most relevant weaknesses of existing
                 systems and propose new research directions within the
                 realm of tiniest devices and the Internet of Things,
                 which we believe to have potential to yield high-impact
                 contributions in the future.",
  acknowledgement = ack-nhfb,
  articleno =    "130",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Xiao:2019:SAB,
  author =       "Jiajian Xiao and Philipp Andelfinger and David Eckhoff
                 and Wentong Cai and Alois Knoll",
  title =        "A Survey on Agent-based Simulation Using Hardware
                 Accelerators",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "131:1--131:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3291048",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3291048",
  abstract =     "Due to decelerating gains in single-core CPU
                 performance, computationally expensive simulations are
                 increasingly executed on highly parallel hardware
                 platforms. Agent-based simulations, where simulated
                 entities act with a certain degree of autonomy,
                 frequently provide ample opportunities for
                 parallelisation. Thus, a vast variety of approaches
                 proposed in the literature demonstrated considerable
                 performance gains using hardware platforms such as
                 many-core CPUs and GPUs, merged CPU-GPU chips as well
                 as Field Programmable Gate Arrays. Typically, a
                 combination of techniques is required to achieve high
                 performance for a given simulation model, putting
                 substantial burden on modellers. To the best of our
                 knowledge, no systematic overview of techniques for
                 agent-based simulations on hardware accelerators has
                 been given in the literature. To close this gap, we
                 provide an overview and categorisation of the
                 literature according to the applied techniques. Since,
                 at the current state of research, challenges such as
                 the partitioning of a model for execution on
                 heterogeneous hardware are still addressed in a largely
                 manual process, we sketch directions for future
                 research towards automating the hardware mapping and
                 execution. This survey targets modellers seeking an
                 overview of suitable hardware platforms and execution
                 techniques for a specific simulation model, as well as
                 methodology researchers interested in potential
                 research gaps requiring further exploration.",
  acknowledgement = ack-nhfb,
  articleno =    "131",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Malla:2019:SPM,
  author =       "Sulav Malla and Ken Christensen",
  title =        "A Survey on Power Management Techniques for
                 Oversubscription of Multi-Tenant Data Centers",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "1:1--1:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3291049",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3291049",
  abstract =     "Power management for data centers has been extensively
                 studied in the past 10 years. Most research has focused
                 on owner-operated data centers with less focus on
                 Multi-Tenant Data Centers (MTDC) or colocation data
                 centers. In an MTDC, an operator owns the building and
                 leases out space, power, and cooling to tenants to
                 install their own IT equipment. MTDC's present new
                 challenges for data center power management due to an
                 inherent lack of coordination between the operator and
                 tenants. In this article, we conduct a comprehensive
                 survey of existing MTDC power management techniques for
                 demand response programs, sustainability, and/or power
                 hierarchy oversubscription. Power oversubscription is
                 of particular interest, as it can maximize resource
                 utilization, increase operator profit, and reduce
                 tenant costs. We create a taxonomy to classify and
                 compare key works. Our taxonomy and review differ from
                 existing works in that our emphasis is on safe power
                 oversubscription, which has been neglected in previous
                 surveys. We propose future research for prediction and
                 control of power overload events in an oversubscribed
                 MTDC.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wang:2019:ECO,
  author =       "Jianyu Wang and Jianli Pan and Flavio Esposito and
                 Prasad Calyam and Zhicheng Yang and Prasant Mohapatra",
  title =        "Edge Cloud Offloading Algorithms: Issues, Methods, and
                 Perspectives",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "2:1--2:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3284387",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3284387",
  abstract =     "Mobile devices supporting the ``Internet of Things''
                 often have limited capabilities in computation, battery
                 energy, and storage space, especially to support
                 resource-intensive applications involving virtual
                 reality, augmented reality, multimedia delivery, and
                 artificial intelligence, which could require broad
                 bandwidth, low response latency, and large
                 computational power. Edge cloud or edge computing is an
                 emerging topic and a technology that can tackle the
                 deficiencies of the currently centralized-only cloud
                 computing model and move the computation and storage
                 resources closer to the devices in support of the
                 above-mentioned applications. To make this happen,
                 efficient coordination mechanisms and ``offloading''
                 algorithms are needed to allow mobile devices and the
                 edge cloud to work together smoothly. In this survey
                 article, we investigate the key issues, methods, and
                 various state-of-the-art efforts related to the
                 offloading problem. We adopt a new characterizing model
                 to study the whole process of offloading from mobile
                 devices to the edge cloud. Through comprehensive
                 discussions, we aim to draw an overall ``big picture''
                 on the existing efforts and research directions. Our
                 study also indicates that the offloading algorithms in
                 the edge cloud have demonstrated profound potentials
                 for future technology and application development.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kalgutkar:2019:CAA,
  author =       "Vaibhavi Kalgutkar and Ratinder Kaur and Hugo Gonzalez
                 and Natalia Stakhanova and Alina Matyukhina",
  title =        "Code Authorship Attribution: Methods and Challenges",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "3:1--3:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3292577",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3292577",
  abstract =     "Code authorship attribution is the process of
                 identifying the author of a given code. With increasing
                 numbers of malware and advanced mutation techniques,
                 the authors of malware are creating a large number of
                 malware variants. To better deal with this problem,
                 methods for examining the authorship of malicious code
                 are necessary. Code authorship attribution techniques
                 can thus be utilized to identify and categorize the
                 authors of malware. This information can help predict
                 the types of tools and techniques that the author of a
                 specific malware uses, as well as the manner in which
                 the malware spreads and evolves. In this article, we
                 present the first comprehensive review of research on
                 code authorship attribution. The article summarizes
                 various methods of authorship attribution and
                 highlights challenges in the field.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Didimo:2019:SGD,
  author =       "Walter Didimo and Giuseppe Liotta and Fabrizio
                 Montecchiani",
  title =        "A Survey on Graph Drawing Beyond Planarity",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "4:1--4:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3301281",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3301281",
  abstract =     "Graph Drawing Beyond Planarity is a rapidly growing
                 research area that classifies and studies geometric
                 representations of nonplanar graphs in terms of
                 forbidden crossing configurations. The aim of this
                 survey is to describe the main research directions in
                 this area, the most prominent known results, and some
                 of the most challenging open problems.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhang:2019:DLB,
  author =       "Shuai Zhang and Lina Yao and Aixin Sun and Yi Tay",
  title =        "Deep Learning Based Recommender System: a Survey and
                 New Perspectives",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "5:1--5:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3285029",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3285029",
  abstract =     "With the growing volume of online information,
                 recommender systems have been an effective strategy to
                 overcome information overload. The utility of
                 recommender systems cannot be overstated, given their
                 widespread adoption in many web applications, along
                 with their potential impact to ameliorate many problems
                 related to over-choice. In recent years, deep learning
                 has garnered considerable interest in many research
                 fields such as computer vision and natural language
                 processing, owing not only to stellar performance but
                 also to the attractive property of learning feature
                 representations from scratch. The influence of deep
                 learning is also pervasive, recently demonstrating its
                 effectiveness when applied to information retrieval and
                 recommender systems research. The field of deep
                 learning in recommender system is flourishing. This
                 article aims to provide a comprehensive review of
                 recent research efforts on deep learning-based
                 recommender systems. More concretely, we provide and
                 devise a taxonomy of deep learning-based recommendation
                 models, along with a comprehensive summary of the state
                 of the art. Finally, we expand on current trends and
                 provide new perspectives pertaining to this new and
                 exciting development of the field.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{MendonCa:2019:GBS,
  author =       "Matheus R. F. Mendon{\c{C}}a and Artur Ziviani and
                 Andr{\'E} M. S. Barreto",
  title =        "Graph-Based Skill Acquisition For Reinforcement
                 Learning",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "6:1--6:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3291045",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3291045",
  abstract =     "In machine learning, Reinforcement Learning (RL) is an
                 important tool for creating intelligent agents that
                 learn solely through experience. One particular subarea
                 within the RL domain that has received great attention
                 is how to define macro-actions, which are temporal
                 abstractions composed of a sequence of primitive
                 actions. This subarea, loosely called skill
                 acquisition, has been under development for several
                 years and has led to better results in a diversity of
                 RL problems. Among the many skill acquisition
                 approaches, graph-based methods have received
                 considerable attention. This survey presents an
                 overview of graph-based skill acquisition methods for
                 RL. We cover a diversity of these approaches and
                 discuss how they evolved throughout the years. Finally,
                 we also discuss the current challenges and open issues
                 in the area of graph-based skill acquisition for RL.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhang:2019:RAT,
  author =       "Jing Zhang and Wanqing Li and Philip Ogunbona and Dong
                 Xu",
  title =        "Recent Advances in Transfer Learning for Cross-Dataset
                 Visual Recognition: a Problem-Oriented Perspective",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "7:1--7:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3291124",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3291124",
  abstract =     "This article takes a problem-oriented perspective and
                 presents a comprehensive review of transfer-learning
                 methods, both shallow and deep, for cross-dataset
                 visual recognition. Specifically, it categorises the
                 cross-dataset recognition into 17 problems based on a
                 set of carefully chosen data and label attributes. Such
                 a problem-oriented taxonomy has allowed us to examine
                 how different transfer-learning approaches tackle each
                 problem and how well each problem has been researched
                 to date. The comprehensive problem-oriented review of
                 the advances in transfer learning with respect to the
                 problem has not only revealed the challenges in
                 transfer learning for visual recognition but also the
                 problems (e.g., 8 of the 17 problems) that have been
                 scarcely studied. This survey not only presents an
                 up-to-date technical review for researchers but also a
                 systematic approach and a reference for a
                 machine-learning practitioner to categorise a real
                 problem and to look up for a possible solution
                 accordingly.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Xu:2019:BAA,
  author =       "Minxian Xu and Rajkumar Buyya",
  title =        "Brownout Approach for Adaptive Management of Resources
                 and Applications in Cloud Computing Systems: a Taxonomy
                 and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "8:1--8:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3234151",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3234151",
  abstract =     "Cloud computing has been regarded as an emerging
                 approach to provisioning resources and managing
                 applications. It provides attractive features, such as
                 an on-demand model, scalability enhancement, and
                 management cost reduction. However, cloud computing
                 systems continue to face problems such as hardware
                 failures, overloads caused by unexpected workloads, or
                 the waste of energy due to inefficient resource
                 utilization, which all result in resource shortages and
                 application issues such as delays or saturation. A
                 paradigm, the brownout, has been applied to handle
                 these issues by adaptively activating or deactivating
                 optional parts of applications or services to manage
                 resource usage in cloud computing system. Brownout has
                 successfully shown that it can avoid overloads due to
                 changes in workload and achieve better load balancing
                 and energy saving effects. This article proposes a
                 taxonomy of the brownout approach for managing
                 resources and applications adaptively in cloud
                 computing systems and carries out a comprehensive
                 survey. It identifies open challenges and offers future
                 research directions.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Xiao:2019:CRC,
  author =       "Ping Xiao and Hannu Toivonen and Oskar Gross and
                 Am{\'\i}lcar Cardoso and Jo{\~a}o Correia and Penousal
                 Machado and Pedro Martins and Hugo Goncalo Oliveira and
                 Rahul Sharma and Alexandre Miguel Pinto and Alberto
                 D{\'\i}az and Virginia Francisco and Pablo Gerv{\'a}s
                 and Raquel Herv{\'a}s and Carlos Le{\'o}n and Jamie
                 Forth and Matthew Purver and Geraint A. Wiggins and
                 Dragana Miljkovi{\'c} and Vid Podpecan and Senja Pollak
                 and Jan Kralj and Martin Znidarsic and Marko Bohanec
                 and Nada Lavrac and Tanja Urbancic and Frank {Van Der
                 Velde} and Stuart Battersby",
  title =        "Conceptual Representations for Computational Concept
                 Creation",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "9:1--9:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3186729",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3186729",
  abstract =     "Computational creativity seeks to understand
                 computational mechanisms that can be characterized as
                 creative. The creation of new concepts is a central
                 challenge for any creative system. In this article, we
                 outline different approaches to computational concept
                 creation and then review conceptual representations
                 relevant to concept creation, and therefore to
                 computational creativity. The conceptual
                 representations are organized in accordance with two
                 important perspectives on the distinctions between
                 them. One distinction is between symbolic, spatial and
                 connectionist representations. The other is between
                 descriptive and procedural representations.
                 Additionally, conceptual representations used in
                 particular creative domains, such as language, music,
                 image and emotion, are reviewed separately. For every
                 representation reviewed, we cover the inference it
                 affords, the computational means of building it, and
                 its application in concept creation.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hong:2019:HGA,
  author =       "Yongjun Hong and Uiwon Hwang and Jaeyoon Yoo and
                 Sungroh Yoon",
  title =        "How Generative Adversarial Networks and Their Variants
                 Work: an Overview",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "10:1--10:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3301282",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3301282",
  abstract =     "Generative Adversarial Networks (GANs) have received
                 wide attention in the machine learning field for their
                 potential to learn high-dimensional, complex real data
                 distribution. Specifically, they do not rely on any
                 assumptions about the distribution and can generate
                 real-like samples from latent space in a simple manner.
                 This powerful property allows GANs to be applied to
                 various applications such as image synthesis, image
                 attribute editing, image translation, domain
                 adaptation, and other academic fields. In this article,
                 we discuss the details of GANs for those readers who
                 are familiar with, but do not comprehend GANs deeply or
                 who wish to view GANs from various perspectives. In
                 addition, we explain how GANs operates and the
                 fundamental meaning of various objective functions that
                 have been suggested recently. We then focus on how the
                 GAN can be combined with an autoencoder framework.
                 Finally, we enumerate the GAN variants that are applied
                 to various tasks and other fields for those who are
                 interested in exploiting GANs for their research.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Boukerche:2019:SOM,
  author =       "Azzedine Boukerche and Shichao Guan and Robson E. {De
                 Grande}",
  title =        "Sustainable Offloading in Mobile Cloud Computing:
                 Algorithmic Design and Implementation",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "11:1--11:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3286688",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3286688",
  abstract =     "Mobile Cloud Computing (MCC) has been extensively
                 explored to be applied as a vital tool to enhance the
                 capabilities of mobile devices, increasing computing
                 power, expanding storage capacity, and prolonging
                 battery life. Offloading works as the fundamental
                 feature that enables MCC to relieve task load and
                 extend data storage through an accessible cloud
                 resource pool. Several initiatives have drawn attention
                 to delivering MCC-supported energy-oriented offloading
                 as a method to cope with a lately steep increase in the
                 number of rich mobile applications and the enduring
                 limitations of battery technologies. However, MCC
                 offloading relieves only the burden of energy
                 consumption of mobile devices; performance concerns
                 about Cloud resources, in most cases, are not
                 considered when dynamically allocating them for dealing
                 with mobile tasks. The application context of MCC,
                 encompassing urban computing, aggravates the situation
                 with very large-scale scenarios, posing as a challenge
                 for achieving greener solutions in the scope of Cloud
                 resources. Thus, this article gathers and analyzes
                 recent energy-aware offloading protocols and
                 architectures, as well as scheduling and balancing
                 algorithms employed toward Cloud green computing. This
                 survey provides a comparison among system architectures
                 by identifying their most notable advantages and
                 disadvantages. The existing enabling frameworks are
                 categorized and compared based on the stage of the task
                 offloading process and resource management types,
                 describing current open challenges and future research
                 directions.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Patil:2019:ESS,
  author =       "Rajendra Patil and Chirag Modi",
  title =        "An Exhaustive Survey on Security Concerns and
                 Solutions at Different Components of Virtualization",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "12:1--12:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3287306",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3287306",
  abstract =     "Virtualization is a key enabler of various modern
                 computing technologies. However, it brings additional
                 vulnerabilities that can be exploited to affect the
                 availability, integrity, and confidentiality of the
                 underlying resources and services. The dynamic and
                 shared nature of the virtualization poses additional
                 challenges to the traditional security solutions. This
                 article explores the vulnerabilities, threats, and
                 attacks relevant to virtualization. We analyze the
                 existing security solutions and identify the research
                 gaps that can help the research community to develop a
                 secured virtualization platform for current and future
                 computing technologies.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Xuan:2019:SBN,
  author =       "Junyu Xuan and Jie Lu and Guangquan Zhang",
  title =        "A Survey on {Bayesian} Nonparametric Learning",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "13:1--13:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3291044",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3291044",
  abstract =     "Bayesian (machine) learning has been playing a
                 significant role in machine learning for a long time
                 due to its particular ability to embrace uncertainty,
                 encode prior knowledge, and endow interpretability. On
                 the back of Bayesian learning's great success, Bayesian
                 nonparametric learning (BNL) has emerged as a force for
                 further advances in this field due to its greater
                 modelling flexibility and representation power. Instead
                 of playing with the fixed-dimensional probabilistic
                 distributions of Bayesian learning, BNL creates a new
                 ``game'' with infinite-dimensional stochastic
                 processes. BNL has long been recognised as a research
                 subject in statistics, and, to date, several
                 state-of-the-art pilot studies have demonstrated that
                 BNL has a great deal of potential to solve real-world
                 machine-learning tasks. However, despite these
                 promising results, BNL has not created a huge wave in
                 the machine-learning community. Esotericism may account
                 for this. The books and surveys on BNL written by
                 statisticians are overcomplicated and filled with
                 tedious theories and proofs. Each is certainly
                 meaningful but may scare away new researchers,
                 especially those with computer science backgrounds.
                 Hence, the aim of this article is to provide a
                 plain-spoken, yet comprehensive, theoretical survey of
                 BNL in terms that researchers in the machine-learning
                 community can understand. It is hoped this survey will
                 serve as a starting point for understanding and
                 exploiting the benefits of BNL in our current scholarly
                 endeavours. To achieve this goal, we have collated the
                 extant studies in this field and aligned them with the
                 steps of a standard BNL procedure-from selecting the
                 appropriate stochastic processes through manipulation
                 to executing the model inference algorithms. At each
                 step, past efforts have been thoroughly summarised and
                 discussed. In addition, we have reviewed the common
                 methods for implementing BNL in various
                 machine-learning tasks along with its diverse
                 applications in the real world as examples to motivate
                 future studies.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cazorla:2019:PWC,
  author =       "Francisco J. Cazorla and Leonidas Kosmidis and Enrico
                 Mezzetti and Carles Hernandez and Jaume Abella and
                 Tullio Vardanega",
  title =        "Probabilistic Worst-Case Timing Analysis: Taxonomy and
                 Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "14:1--14:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3301283",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3301283",
  abstract =     "The unabated increase in the complexity of the
                 hardware and software components of modern embedded
                 real-time systems has given momentum to a host of
                 research in the use of probabilistic and statistical
                 techniques for timing analysis. In the last few years,
                 that front of investigation has yielded a body of
                 scientific literature vast enough to warrant some
                 comprehensive taxonomy of motivations, strategies of
                 application, and directions of research. This survey
                 addresses this very need, singling out the principal
                 techniques in the state of the art of timing analysis
                 that employ probabilistic reasoning at some level,
                 building a taxonomy of them, discussing their relative
                 merit and limitations, and the relations among them. In
                 addition to offering a comprehensive foundation to
                 savvy probabilistic timing analysis, this article also
                 identifies the key challenges to be addressed to
                 consolidate the scientific soundness and industrial
                 viability of this emerging field.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Abdulahhad:2019:MIR,
  author =       "Karam Abdulahhad and Catherine Berrut and Jean-Pierre
                 Chevallet and Gabriella Pasi",
  title =        "Modeling Information Retrieval by Formal Logic: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "15:1--15:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3291043",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3291043",
  abstract =     "Several mathematical frameworks have been used to
                 model the information retrieval (IR) process, among
                 them, formal logics. Logic-based IR models upgrade the
                 IR process from document-query comparison to an
                 inference process, in which both documents and queries
                 are expressed as sentences of the selected formal
                 logic. The underlying formal logic also permits one to
                 represent and integrate knowledge in the IR process.
                 One of the main obstacles that has prevented the
                 adoption and large-scale diffusion of logic-based IR
                 systems is their complexity. However, several
                 logic-based IR models have been recently proposed that
                 are applicable to large-scale data collections. In this
                 survey, we present an overview of the most prominent
                 logical IR models that have been proposed in the
                 literature. The considered logical models are
                 categorized under different axes, which include the
                 considered logics and the way in which uncertainty has
                 been modeled, for example, degrees of belief or degrees
                 of truth. Accordingly, the main contribution of the
                 article is to categorize the state-of-the-art logical
                 models on a fine-grained basis, and for the considered
                 models the related implementation aspects are
                 described. Consequently, the proposed survey is
                 finalized to better understand and compare the
                 different logical IR models. Last, but not least, this
                 article aims at reconsidering the potentials of logical
                 approaches to IR by outlining the advances of
                 logic-based approaches in close research areas.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Cormode:2019:STA,
  author =       "Graham Cormode and Hossein Jowhari",
  title =        "{$ L_p $} Samplers and Their Applications: a Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "16:1--16:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3297715",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3297715",
  abstract =     "The notion of L$_p$ sampling, and corresponding
                 algorithms known as L$_p$ samplers, has found a wide
                 range of applications in the design of data stream
                 algorithms and beyond. In this survey, we present some
                 of the core algorithms to achieve this sampling
                 distribution based on ideas from hashing, sampling, and
                 sketching. We give results for the special cases of
                 insertion-only inputs, lower bounds for the sampling
                 problems, and ways to efficiently sample multiple
                 elements. We describe a range of applications of L$_p$
                 sampling, drawing on problems across the domain of
                 computer science, from matrix and graph computations,
                 as well as to geometric and vector streaming
                 problems.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Silva:2019:UCL,
  author =       "Thiago H. Silva and Aline Carneiro Viana and
                 Fabr{\'\i}cio Benevenuto and Leandro Villas and Juliana
                 Salles and Antonio Loureiro and Daniele Quercia",
  title =        "Urban Computing Leveraging Location-Based Social
                 Network Data: a Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "17:1--17:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3301284",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3301284",
  abstract =     "Urban computing is an emerging area of investigation
                 in which researchers study cities using digital data.
                 Location-Based Social Networks (LBSNs) generate one
                 specific type of digital data that offers unprecedented
                 geographic and temporal resolutions. We discuss
                 fundamental concepts of urban computing leveraging LBSN
                 data and present a survey of recent urban computing
                 studies that make use of LBSN data. We also point out
                 the opportunities and challenges that those studies
                 open.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Reghenzani:2019:RTL,
  author =       "Federico Reghenzani and Giuseppe Massari and William
                 Fornaciari",
  title =        "The Real-Time {Linux} Kernel: a Survey on
                 {PREEMPT\_RT}",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "18:1--18:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3297714",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3297714",
  abstract =     "The increasing functional and nonfunctional
                 requirements of real-time applications, the advent of
                 mixed criticality computing, and the necessity of
                 reducing costs are leading to an increase in the
                 interest for employing COTS hardware in real-time
                 domains. In this scenario, the Linux kernel is emerging
                 as a valuable solution on the software side, thanks to
                 the rich support for hardware devices and peripherals,
                 along with a well-established programming environment.
                 However, Linux has been developed as a general-purpose
                 operating system, followed by several approaches to
                 introduce actual real-time capabilities in the kernel.
                 Among these, the PREEMPT\_RT patch, developed by the
                 kernel maintainers, has the goal to increase the
                 predictability and reduce the latencies of the kernel
                 directly modifying the existent kernel code. This
                 article aims at providing a survey of the
                 state-of-the-art approaches for building real-time
                 Linux-based systems, with a focus on PREEMPT\_RT, its
                 evolution, and the challenges that should be addressed
                 in order to move PREEMPT\_RT one step ahead. Finally,
                 we present some applications and use cases that have
                 already benefited from the introduction of this
                 patch.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ahmed:2019:TEC,
  author =       "Usama Ahmed and Imran Raza and Syed Asad Hussain",
  title =        "Trust Evaluation in Cross-Cloud Federation: Survey and
                 Requirement Analysis",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "19:1--19:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3292499",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3292499",
  abstract =     "Cross-Cloud Federation (CCF) is beneficial for
                 heterogeneous Cloud Service Providers (CSPs) for
                 leasing additional resources from each other. Despite
                 the benefits of on-demand scalability and enhanced
                 service footprints for better service quality, the
                 adoption of CCF is however mainly hindered due to the
                 lack of a comprehensive trust model. The basic aim of
                 such a model should be to address the security and
                 performance concerns of a home CSP on its foreign peers
                 before placing its users' data and applications in
                 their premises. A transitivity of users' trust on home
                 CSP and home CSP's trust on its foreign CSPs marks the
                 uniqueness of trust paradigm in CCF. Addressing the
                 concerns of cloud-to-cloud trust paradigm is inevitable
                 to achieve users' trust in a federation. Various trust
                 models have been proposed in literature for
                 conventional and multi-cloud computing environments.
                 They focus on user requirements but none on federation
                 perspective. Their applicability to CCF for addressing
                 the concerns of cloud-to-cloud trust paradigm requires
                 further consideration. For this reason, we have first
                 outlined the general characteristics of CCF as being
                 dynamic, multi-level and heterogeneous. Afterwards,
                 cloud-to-cloud trust paradigm is proposed based on a
                 set of unique principles identified as (i) trust
                 bi-directionality, (ii) trust composition, (iii)
                 delegation control, and (iv) Resource awareness. An
                 insightful review of Trust Management Systems (TMS)
                 proposed in literature reveals their shortcomings in
                 addressing the requirements of cloud-to-cloud trust
                 paradigm. To overcome these shortcomings, we suggest
                 that some challenges can be merely addressed by
                 aligning the existing methods to the nature of CCF. The
                 remaining challenges require entirely new mechanisms to
                 be introduced. A demonstration of this concept is
                 presented in the form of a requirement matrix
                 suggesting how the characteristics and properties of
                 both CCF and the TMS are influenced by each other. This
                 requirement matrix reveals the potential avenues of
                 research for a TMS aimed specifically for CCF.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bablani:2019:SBC,
  author =       "Annushree Bablani and Damodar Reddy Edla and Diwakar
                 Tripathi and Ramalingaswamy Cheruku",
  title =        "Survey on Brain-Computer Interface: an Emerging
                 Computational Intelligence Paradigm",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "20:1--20:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3297713",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3297713",
  abstract =     "A brain-computer interface (BCI) provides a way to
                 develop interaction between a brain and a computer. The
                 communication is developed as a result of neural
                 responses generated in the brain because of motor
                 movements or cognitive activities. The means of
                 communication here includes muscular and non-muscular
                 actions. These actions generate brain activities or
                 brain waves that are directed to a hardware device to
                 perform a specific task. BCI initially was developed as
                 the communication device for patients suffering from
                 neuromuscular disorders. Owing to recent advancements
                 in BCI devices-such as passive electrodes, wireless
                 headsets, adaptive software, and decreased costs-it is
                 also being used for developing communication between
                 the general public. The BCI device records brain
                 responses using various invasive and non-invasive
                 acquisition techniques such as electrocorticography
                 (ECoG), electroencephalography (EEG),
                 magnetoencephalography (MEG), and magnetic resonance
                 imaging (MRI). In this article, a survey on these
                 techniques has been provided. The brain response needs
                 to be translated using machine learning and pattern
                 recognition methods to control any application. A brief
                 review of various existing feature extraction
                 techniques and classification algorithms applied on
                 data recorded from the brain has been included in this
                 article. A significant comparative analysis of popular
                 existing BCI techniques is presented and possible
                 future directives are provided.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bhat:2019:SVT,
  author =       "Parnika Bhat and Kamlesh Dutta",
  title =        "A Survey on Various Threats and Current State of
                 Security in {Android} Platform",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "21:1--21:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3301285",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3301285",
  abstract =     "The advent of the Android system has brought
                 smartphone technology to the doorsteps of the masses.
                 The latest technologies have made it affordable for
                 every section of the society. However, the emergence of
                 the Android platform has also escalated the growth of
                 cybercrime through the mobile platform. Its open source
                 operating system has made it a center of attraction for
                 the attackers. This article provides a comprehensive
                 study of the state of the Android Security domain. This
                 article classifies the attacks on the Android system in
                 four categories (i) hardware-based attacks, (ii)
                 kernel-based attacks, (iii) hardware abstraction
                 layer-based attacks, and (iv) application-based
                 attacks. The study deals with various threats and
                 security measures relating to these categories and
                 presents an in-depth analysis of the underlying
                 problems in the Android security domain. The article
                 also stresses the role of Android application
                 developers in realizing a more secure Android
                 environment. This article attempts to provide a
                 comparative analysis of various malware detection
                 techniques concerning their methods and limitations.
                 The study can help researchers gain knowledge of the
                 Android security domain from various aspects and build
                 a more comprehensive, robust, and efficient solution to
                 the threats that Android is facing.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bian:2019:ITK,
  author =       "Ranran Bian and Yun Sing Koh and Gillian Dobbie and
                 Anna Divoli",
  title =        "Identifying Top-$k$ Nodes in Social Networks: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "1",
  pages =        "22:1--22:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3301286",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3301286",
  abstract =     "Top- k nodes are the important actors for a
                 subjectively determined topic in a social network. To
                 some extent, a topic is taken as a ranking criteria for
                 identifying top- k nodes. Within a viral marketing
                 network, subjectively selected topics can include the
                 following: Who can promote a new product to the largest
                 number of people, and who are the highest spending
                 customers? Based on these questions, there has been a
                 growing interest in top- k nodes research to
                 effectively identify key players. In this article, we
                 review and classify existing literature on top- k nodes
                 identification into two major categories: top- k
                 influential nodes and top- k significant nodes. We
                 survey both theoretical and applied work in the field
                 and describe promising research directions based on our
                 review. This research area has proven to be beneficial
                 for data analysis on online social networks as well as
                 practical applications on real-life networks.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dinakarrao:2019:CAA,
  author =       "Sai Manoj Pudukotai Dinakarrao and Axel Jantsch and
                 Muhammad Shafique",
  title =        "Computer-aided Arrhythmia Diagnosis with Bio-signal
                 Processing: a Survey of Trends and Techniques",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "23:1--23:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3297711",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3297711",
  abstract =     "Signals obtained from a patient, i.e., bio-signals,
                 are utilized to analyze the health of patient. One such
                 bio-signal of paramount importance is the
                 electrocardiogram (ECG), which represents the
                 functioning of the heart. Any abnormal behavior in the
                 ECG signal is an indicative measure of a malfunctioning
                 of the heart, termed an arrhythmia condition. Due to
                 the involved complexities such as lack of human
                 expertise and high probability to misdiagnose,
                 long-term monitoring based on computer-aided diagnosis
                 (CADiag) is preferred. There exist various CADiag
                 techniques for arrhythmia diagnosis with their own
                 benefits and limitations. In this work, we classify the
                 arrhythmia detection approaches that make use of CADiag
                 based on the utilized technique. A vast number of
                 techniques useful for arrhythmia detection, their
                 performances, the involved complexities, and comparison
                 among different variants of same technique and across
                 different techniques are discussed. The comparison of
                 different techniques in terms of their performance for
                 arrhythmia detection and its suitability for hardware
                 implementation toward body-wearable devices is
                 discussed in this work.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Djenouri:2019:MLS,
  author =       "Djamel Djenouri and Roufaida Laidi and Youcef Djenouri
                 and Ilangko Balasingham",
  title =        "Machine Learning for Smart Building Applications:
                 Review and Taxonomy",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "24:1--24:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3311950",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3311950",
  abstract =     "The use of machine learning (ML) in smart building
                 applications is reviewed in this article. We split
                 existing solutions into two main classes:
                 occupant-centric versus energy/devices-centric. The
                 first class groups solutions that use ML for aspects
                 related to the occupants, including (1) occupancy
                 estimation and identification, (2) activity
                 recognition, and (3) estimating preferences and
                 behavior. The second class groups solutions that use ML
                 to estimate aspects related either to energy or
                 devices. They are divided into three categories: (1)
                 energy profiling and demand estimation, (2) appliances
                 profiling and fault detection, and (3) inference on
                 sensors. Solutions in each category are presented,
                 discussed, and compared; open perspectives and research
                 trends are discussed as well. Compared to related
                 state-of-the-art survey papers, the contribution herein
                 is to provide a comprehensive and holistic review from
                 the ML perspectives rather than architectural and
                 technical aspects of existing building management
                 systems. This is by considering all types of ML tools,
                 buildings, and several categories of applications, and
                 by structuring the taxonomy accordingly. The article
                 ends with a summary discussion of the presented works,
                 with focus on lessons learned, challenges, open and
                 future directions of research in this field.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Constantin:2019:CUV,
  author =       "Mihai Gabriel Constantin and Miriam Redi and Gloria
                 Zen and Bogdan Ionescu",
  title =        "Computational Understanding of Visual Interestingness
                 Beyond Semantics: Literature Survey and Analysis of
                 Covariates",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "25:1--25:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3301299",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3301299",
  abstract =     "Understanding visual interestingness is a challenging
                 task addressed by researchers in various disciplines
                 ranging from humanities and psychology to, more
                 recently, computer vision and multimedia. The rise of
                 infographics and the visual information overload that
                 we are facing today have given this task a crucial
                 importance. Automatic systems are increasingly needed
                 to help users navigate through the growing amount of
                 visual information available, either on the web or our
                 personal devices, for instance by selecting relevant
                 and interesting content. Previous studies indicate that
                 visual interest is highly related to concepts like
                 arousal, unusualness, or complexity, where these
                 connections are found based on psychological theories,
                 user studies, or computational approaches. However, the
                 link between visual interestingness and other related
                 concepts has been only partially explored so far, for
                 example, by considering only a limited subset of
                 covariates at a time. In this article, we present a
                 comprehensive survey on visual interestingness and
                 related concepts, aiming to bring together works based
                 on different approaches, highlighting controversies,
                 and identifying links that have not been fully
                 investigated yet. Finally, we present some open
                 questions that may be addressed in future works. Our
                 work aims to support researchers interested in visual
                 interestingness and related subjective or abstract
                 concepts, providing an in-depth overlook at
                 state-of-the-art theories in humanities and methods in
                 computational approaches, as well as providing an
                 extended list of datasets.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Li:2019:QES,
  author =       "Miqing Li and Xin Yao",
  title =        "Quality Evaluation of Solution Sets in Multiobjective
                 Optimisation: a Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "26:1--26:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3300148",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3300148",
  abstract =     "Complexity and variety of modern multiobjective
                 optimisation problems result in the emergence of
                 numerous search techniques, from traditional
                 mathematical programming to various randomised
                 heuristics. A key issue raised consequently is how to
                 evaluate and compare solution sets generated by these
                 multiobjective search techniques. In this article, we
                 provide a comprehensive review of solution set quality
                 evaluation. Starting with an introduction of basic
                 principles and concepts of set quality evaluation, this
                 article summarises and categorises 100 state-of-the-art
                 quality indicators, with the focus on what quality
                 aspects these indicators reflect. This is accompanied
                 in each category by detailed descriptions of several
                 representative indicators and in-depth analyses of
                 their strengths and weaknesses. Furthermore, issues
                 regarding attributes that indicators possess and
                 properties that indicators are desirable to have are
                 discussed, in the hope of motivating researchers to
                 look into these important issues when designing quality
                 indicators and of encouraging practitioners to bear
                 these issues in mind when selecting/using quality
                 indicators. Finally, future trends and potential
                 research directions in the area are suggested, together
                 with some guidelines on these directions.",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Oz:2019:SMA,
  author =       "Isil Oz and Sanem Arslan",
  title =        "A Survey on Multithreading Alternatives for Soft Error
                 Fault Tolerance",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "27:1--27:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3302255",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/multithreading.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3302255",
  abstract =     "Smaller transistor sizes and reduction in voltage
                 levels in modern microprocessors induce higher soft
                 error rates. This trend makes reliability a primary
                 design constraint for computer systems. Redundant
                 multithreading (RMT) makes use of parallelism in modern
                 systems by employing thread-level time redundancy for
                 fault detection and recovery. RMT can detect faults by
                 running identical copies of the program as separate
                 threads in parallel execution units with identical
                 inputs and comparing their outputs. In this article, we
                 present a survey of RMT implementations at different
                 architectural levels with several design
                 considerations. We explain the implementations in
                 seminal papers and their extensions and discuss the
                 design choices employed by the techniques. We review
                 both hardware and software approaches by presenting the
                 main characteristics and analyze the studies with
                 different design choices regarding their strengths and
                 weaknesses. We also present a classification to help
                 potential users find a suitable method for their
                 requirement and to guide researchers planning to work
                 on this area by providing insights into the future
                 trend.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Swami:2019:SDN,
  author =       "Rochak Swami and Mayank Dave and Virender Ranga",
  title =        "Software-defined Networking-based {DDoS} Defense
                 Mechanisms",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "28:1--28:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3301614",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3301614",
  abstract =     "Distributed Denial of Service attack (DDoS) is
                 recognized to be one of the most catastrophic attacks
                 against various digital communication entities.
                 Software-defined networking (SDN) is an emerging
                 technology for computer networks that uses open
                 protocols for controlling switches and routers placed
                 at the network edges by using specialized open
                 programmable interfaces. In this article, a detailed
                 study on DDoS threats prevalent in SDN is presented.
                 First, SDN features are examined from the perspective
                 of security, and then a discussion on SDN security
                 features is done. Further, two viewpoints on protecting
                 networks against DDoS attacks are presented. In the
                 first view, SDN utilizes its abilities to secure
                 conventional networks. In the second view, SDN may
                 become a victim of the threat itself because of the
                 centralized control mechanism. The main focus of this
                 research work is on discovering critical security
                 implications in SDN while reviewing the current ongoing
                 research studies. By emphasizing the available
                 state-of-the-art techniques, an extensive review of the
                 advancement of SDN security is provided to the research
                 and IT communities.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rizk:2019:CHM,
  author =       "Yara Rizk and Mariette Awad and Edward W. Tunstel",
  title =        "Cooperative Heterogeneous Multi-Robot Systems: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "29:1--29:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3303848",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3303848",
  abstract =     "The emergence of the Internet of things and the
                 widespread deployment of diverse computing systems have
                 led to the formation of heterogeneous multi-agent
                 systems (MAS) to complete a variety of tasks. Motivated
                 to highlight the state of the art on existing MAS while
                 identifying their limitations, remaining challenges,
                 and possible future directions, we survey recent
                 contributions to the field. We focus on robot agents
                 and emphasize the challenges of MAS sub-fields
                 including task decomposition, coalition formation, task
                 allocation, perception, and multi-agent planning and
                 control. While some components have seen more
                 advancements than others, more research is required
                 before effective autonomous MAS can be deployed in real
                 smart city settings that are less restrictive than the
                 assumed validation environments of MAS. Specifically,
                 more autonomous end-to-end solutions need to be
                 experimentally tested and developed while incorporating
                 natural language ontology and dictionaries to automate
                 complex task decomposition and leveraging big data
                 advancements to improve perception algorithms for
                 robotics.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Homoliak:2019:III,
  author =       "Ivan Homoliak and Flavio Toffalini and Juan Guarnizo
                 and Yuval Elovici and Mart{\'\i}n Ochoa",
  title =        "Insight Into Insiders and {IT}: a Survey of Insider
                 Threat Taxonomies, Analysis, Modeling, and
                 Countermeasures",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "30:1--30:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3303771",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3303771",
  abstract =     "Insider threats are one of today's most challenging
                 cybersecurity issues that are not well addressed by
                 commonly employed security solutions. In this work, we
                 propose structural taxonomy and novel categorization of
                 research that contribute to the organization and
                 disambiguation of insider threat incidents and the
                 defense solutions used against them. The objective of
                 our categorization is to systematize knowledge in
                 insider threat research while using an existing
                 grounded theory method for rigorous literature review.
                 The proposed categorization depicts the workflow among
                 particular categories that include incidents and
                 datasets, analysis of incidents, simulations, and
                 defense solutions. Special attention is paid to the
                 definitions and taxonomies of the insider threat; we
                 present a structural taxonomy of insider threat
                 incidents that is based on existing taxonomies and the
                 5W1H questions of the information gathering problem.
                 Our survey will enhance researchers' efforts in the
                 domain of insider threat because it provides (1) a
                 novel structural taxonomy that contributes to
                 orthogonal classification of incidents and defining the
                 scope of defense solutions employed against them, (2)
                 an overview on publicly available datasets that can be
                 used to test new detection solutions against other
                 works, (3) references of existing case studies and
                 frameworks modeling insiders' behaviors for the purpose
                 of reviewing defense solutions or extending their
                 coverage, and (4) a discussion of existing trends and
                 further research directions that can be used for
                 reasoning in the insider threat domain.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rateke:2019:PVR,
  author =       "Thiago Rateke and Karla A. Justen and Vito F.
                 Chiarella and Antonio C. Sobieranski and Eros Comunello
                 and Aldo {Von Wangenheim}",
  title =        "Passive Vision Region-Based Road Detection: a
                 Literature Review",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "31:1--31:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3311951",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3311951",
  abstract =     "We present a literature review to analyze the state of
                 the art in the area of road detection based upon
                 frontal images. For this purpose, a systematic
                 literature review (SLR) was conducted that focuses on
                 analyzing region-based works, since they can adapt to
                 different surface types and do not depend on road
                 geometry or lane markings. Through the comprehensive
                 study of publications in a 11-year time frame, we
                 analyze the methods that are being used, on which types
                 of surface they are applied, whether they are adaptive
                 in relation to surface changes, and whether they are
                 able to distinguish possible faults or changes in the
                 road, such as potholes, shadows, and puddles.",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wang:2019:NSA,
  author =       "Wei Wang and Longbing Cao",
  title =        "Negative Sequence Analysis: a Review",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "32:1--32:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3311952",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3311952",
  abstract =     "Negative sequential patterns (NSPs) produced by
                 negative sequence analysis (NSA) capture more
                 informative and actionable knowledge than classic
                 positive sequential patterns (PSPs) due to involving
                 both occurring and nonoccurring items, which appear in
                 many applications. However, the research on NSA is
                 still at an early stage, and NSP mining involves very
                 high computational complexity and a very large search
                 space, there is no widely accepted problem statement on
                 NSP mining, and different settings on constraints and
                 negative containment have been proposed in existing
                 work. Among existing NSP mining algorithms, there are
                 no general and systemic evaluation criteria available
                 to assess them comprehensively. This article conducts a
                 comprehensive technical review of existing NSA
                 research. We explore and formalize a generic problem
                 statement of NSA; investigate, compare, and consolidate
                 the definitions of constraints and negative
                 containment; and compare the working mechanisms and
                 efficiency of existing NSP mining algorithms. The
                 review is concluded by discussing new research
                 opportunities in NSA.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nambiar:2019:GBP,
  author =       "Athira Nambiar and Alexandre Bernardino and Jacinto C.
                 Nascimento",
  title =        "Gait-based Person Re-identification: a Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "33:1--33:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3243043",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3243043",
  abstract =     "The way people walk is a strong correlate of their
                 identity. Several studies have shown that both humans
                 and machines can recognize individuals just by their
                 gait, given that proper measurements of the observed
                 motion patterns are available. For surveillance
                 applications, gait is also attractive, because it does
                 not require active collaboration from users and is hard
                 to fake. However, the acquisition of good-quality
                 measures of a person's motion patterns in unconstrained
                 environments, (e.g., in person re-identification
                 applications) has proved very challenging in practice.
                 Existing technology (video cameras) suffer from changes
                 in viewpoint, daylight, clothing, accessories, and
                 other variations in the person's appearance. Novel
                 three-dimensional sensors are bringing new promises to
                 the field, but still many research issues are open.
                 This article presents a survey of the work done in gait
                 analysis for re-identification in the past decade,
                 looking at the main approaches, datasets, and
                 evaluation methodologies. We identify several relevant
                 dimensions of the problem and provide a taxonomic
                 analysis of the current state of the art. Finally, we
                 discuss the levels of performance achievable with the
                 current technology and give a perspective of the most
                 challenging and promising directions of research for
                 the future.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Boukerche:2019:CAW,
  author =       "Azzedine Boukerche and Qi Zhang",
  title =        "Countermeasures against Worm Spreading: a New
                 Challenge for Vehicular Networks",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "34:1--34:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3284748",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3284748",
  abstract =     "Vehicular ad hoc networks (VANETs) are essential
                 components of the intelligent transport systems. They
                 are attracting an increasing amount of interest in
                 research and industrial sectors. Vehicular nodes are
                 capable of transporting, sensing, processing
                 information, and wireless communication, which makes
                 them more vulnerable to worm infections than
                 conventional hosts. This survey provides an overview on
                 worm spreading over VANETs. We first briefly introduce
                 the computer worms. Then the V2X communication and
                 applications are discussed from malware and worms
                 propagation perspective to show the indispensability of
                 studying the characteristics of worm propagating on
                 VANETs. The recent literature on worm spreading and
                 containment on VANETs are categorized based on their
                 research methods. The improvements and limitations of
                 the existing studies are discussed. Next, the main
                 factors influencing worm spreading in vehicular
                 networks are discussed followed by a summary of
                 countermeasure strategies designed to deal with these
                 worms.",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Afzalan:2019:IPB,
  author =       "Milad Afzalan and Farrokh Jazizadeh",
  title =        "Indoor Positioning Based on Visible Light
                 Communication: a Performance-based Survey of Real-world
                 Prototypes",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "35:1--35:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3299769",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3299769",
  abstract =     "The emergent context-aware applications in ubiquitous
                 computing demands for obtaining accurate location
                 information of humans or objects in real-time. Indoor
                 location-based services can be delivered through
                 implementing different types of technology, among which
                 is a recent approach that utilizes LED lighting as a
                 medium for Visible Light Communication (VLC). The
                 ongoing development of solid-state lighting (SSL) is
                 resulting in the wide increase of using LED lights and
                 thereby building the ground for a ubiquitous wireless
                 communication network from lighting systems.
                 Considering the recent advances in implementing Visible
                 Light Positioning (VLP) systems, this article presents
                 a review of VLP systems and focuses on the performance
                 evaluation of experimental achievements on location
                 sensing through LED lights. We have outlined the
                 performance evaluation of different prototypes by
                 introducing new performance metrics, their underlying
                 principles, and their notable findings. Furthermore,
                 the study synthesizes the fundamental characteristics
                 of VLC-based positioning systems that need to be
                 considered, presents several technology gaps based on
                 the current state-of-the-art for future research
                 endeavors, and summarizes our lessons learned towards
                 the standardization of the performance evaluation.",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Roger:2019:CSP,
  author =       "Henriette R{\"o}ger and Ruben Mayer",
  title =        "A Comprehensive Survey on Parallelization and
                 Elasticity in Stream Processing",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "36:1--36:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3303849",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3303849",
  abstract =     "Stream Processing (SP) has evolved as the leading
                 paradigm to process and gain value from the high volume
                 of streaming data produced, e.g., in the domain of the
                 Internet of Things. An SP system is a middleware that
                 deploys a network of operators between data sources,
                 such as sensors, and the consuming applications. SP
                 systems typically face intense and highly dynamic data
                 streams. Parallelization and elasticity enable SP
                 systems to process these streams with continuous high
                 quality of service. The current research landscape
                 provides a broad spectrum of methods for
                 parallelization and elasticity in SP. Each method makes
                 specific assumptions and focuses on particular aspects.
                 However, the literature lacks a comprehensive overview
                 and categorization of the state of the art in SP
                 parallelization and elasticity, which is necessary to
                 consolidate the state of the research and to plan
                 future research directions on this basis. Therefore, in
                 this survey, we study the literature and develop a
                 classification of current methods for both
                 parallelization and elasticity in SP systems.",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Islam:2019:MVR,
  author =       "Chadni Islam and Muhammad Ali Babar and Surya Nepal",
  title =        "A Multi-Vocal Review of Security Orchestration",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "37:1--37:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3305268",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3305268",
  abstract =     "Organizations use diverse types of security solutions
                 to prevent cyber-attacks. Multiple vendors provide
                 security solutions developed using heterogeneous
                 technologies and paradigms. Hence, it is a challenging
                 rather impossible to easily make security solutions to
                 work an integrated fashion. Security orchestration aims
                 at smoothly integrating multivendor security tools that
                 can effectively and efficiently interoperate to support
                 security staff of a Security Operation Centre (SOC).
                 Given the increasing role and importance of security
                 orchestration, there has been an increasing amount of
                 literature on different aspects of security
                 orchestration solutions. However, there has been no
                 effort to systematically review and analyze the
                 reported solutions. We report a Multivocal Literature
                 Review that has systematically selected and reviewed
                 both academic and grey (blogs, web pages, white papers)
                 literature on different aspects of security
                 orchestration published from January 2007 until July
                 2017. The review has enabled us to provide a working
                 definition of security orchestration and classify the
                 main functionalities of security orchestration into
                 three main areas-unification, orchestration, and
                 automation. We have also identified the core components
                 of a security orchestration platform and categorized
                 the drivers of security orchestration based on
                 technical and socio-technical aspects. We also provide
                 a taxonomy of security orchestration based on the
                 execution environment, automation strategy, deployment
                 type, mode of task and resource type. This review has
                 helped us to reveal several areas of further research
                 and development in security orchestration.",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Taha:2019:ADM,
  author =       "Ayman Taha and Ali S. Hadi",
  title =        "Anomaly Detection Methods for Categorical Data: a
                 Review",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "38:1--38:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3312739",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3312739",
  abstract =     "Anomaly detection has numerous applications in diverse
                 fields. For example, it has been widely used for
                 discovering network intrusions and malicious events. It
                 has also been used in numerous other applications such
                 as identifying medical malpractice or credit fraud.
                 Detection of anomalies in quantitative data has
                 received a considerable attention in the literature and
                 has a venerable history. By contrast, and despite the
                 widespread availability use of categorical data in
                 practice, anomaly detection in categorical data has
                 received relatively little attention as compared to
                 quantitative data. This is because detection of
                 anomalies in categorical data is a challenging problem.
                 Some anomaly detection techniques depend on identifying
                 a representative pattern then measuring distances
                 between objects and this pattern. Objects that are far
                 from this pattern are declared as anomalies. However,
                 identifying patterns and measuring distances are not
                 easy in categorical data compared with quantitative
                 data. Fortunately, several papers focussing on the
                 detection of anomalies in categorical data have been
                 published in the recent literature. In this article, we
                 provide a comprehensive review of the research on the
                 anomaly detection problem in categorical data. Previous
                 review articles focus on either the statistics
                 literature or the machine learning and computer science
                 literature. This review article combines both
                 literatures. We review 36 methods for the detection of
                 anomalies in categorical data in both literatures and
                 classify them into 12 different categories based on the
                 conceptual definition of anomalies they use. For each
                 approach, we survey anomaly detection methods, and then
                 show the similarities and differences among them. We
                 emphasize two important issues, the number of
                 parameters each method requires and its time
                 complexity. The first issue is critical, because the
                 performance of these methods are sensitive to the
                 choice of these parameters. The time complexity is also
                 very important in real applications especially in big
                 data applications. We report the time complexity if it
                 is reported by the authors of the methods. If it is
                 not, then we derive it ourselves and report it in this
                 article. In addition, we discuss the common problems
                 and the future directions of the anomaly detection in
                 categorical data.",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sundararajan:2019:SMC,
  author =       "Aditya Sundararajan and Arif I. Sarwat and Alexander
                 Pons",
  title =        "A Survey on Modality Characteristics, Performance
                 Evaluation Metrics, and Security for Traditional and
                 Wearable Biometric Systems",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "39:1--39:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3309550",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3309550",
  abstract =     "Biometric research is directed increasingly toward
                 Wearable Biometric Systems (WBS) for user
                 authentication and identification. However, prior to
                 engaging in WBS research, how their operational
                 dynamics and design considerations differ from those of
                 Traditional Biometric Systems (TBS) must be understood.
                 While the current literature is cognizant of those
                 differences, there is no effective work that summarizes
                 the factors where TBS and WBS differ, namely, their
                 modality characteristics, performance, security, and
                 privacy. To bridge the gap, this article accordingly
                 reviews and compares the key characteristics of
                 modalities, contrasts the metrics used to evaluate
                 system performance, and highlights the divergence in
                 critical vulnerabilities, attacks, and defenses for TBS
                 and WBS. It further discusses how these factors affect
                 the design considerations for WBS, the open challenges,
                 and future directions of research in these areas. In
                 doing so, the article provides a big-picture overview
                 of the important avenues of challenges and potential
                 solutions that researchers entering the field should be
                 aware of. Hence, this survey aims to be a starting
                 point for researchers in comprehending the fundamental
                 differences between TBS and WBS before understanding
                 the core challenges associated with WBS and its
                 design.",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wang:2019:DNN,
  author =       "Erwei Wang and James J. Davis and Ruizhe Zhao and
                 Ho-Cheung Ng and Xinyu Niu and Wayne Luk and Peter Y.
                 K. Cheung and George A. Constantinides",
  title =        "Deep Neural Network Approximation for Custom Hardware:
                 Where We've Been, Where We're Going",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "40:1--40:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3309551",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3309551",
  abstract =     "Deep neural networks have proven to be particularly
                 effective in visual and audio recognition tasks.
                 Existing models tend to be computationally expensive
                 and memory intensive, however, and so methods for
                 hardware-oriented approximation have become a hot
                 topic. Research has shown that custom hardware-based
                 neural network accelerators can surpass their
                 general-purpose processor equivalents in terms of both
                 throughput and energy efficiency. Application-tailored
                 accelerators, when co-designed with approximation-based
                 network training methods, transform large, dense, and
                 computationally expensive networks into small, sparse,
                 and hardware-efficient alternatives, increasing the
                 feasibility of network deployment. In this article, we
                 provide a comprehensive evaluation of approximation
                 methods for high-performance network inference along
                 with in-depth discussion of their effectiveness for
                 custom hardware implementation. We also include
                 proposals for future research based on a thorough
                 analysis of current trends. This article represents the
                 first survey providing detailed comparisons of custom
                 hardware accelerators featuring approximation for both
                 convolutional and recurrent neural networks, through
                 which we hope to inspire exciting new developments in
                 the field.",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Habibzadeh:2019:SCS,
  author =       "Hadi Habibzadeh and Cem Kaptan and Tolga Soyata and
                 Burak Kantarci and Azzedine Boukerche",
  title =        "Smart City System Design: a Comprehensive Study of the
                 Application and Data Planes",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "41:1--41:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3309545",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3309545",
  abstract =     "Recent global smart city efforts resemble the
                 establishment of electricity networks when electricity
                 was first invented, which meant the start of a new era
                 to sell electricity as a utility. A century later, in
                 the smart era, the network to deliver services goes far
                 beyond a single entity like electricity. Supplemented
                 by a well-established Internet infrastructure that can
                 run an endless number of applications, abundant
                 processing and storage capabilities of clouds,
                 resilient edge computing, and sophisticated data
                 analysis like machine learning and deep learning, an
                 already-booming Internet of Things movement makes this
                 new era far more exciting. In this article, we present
                 a multi-faceted survey of machine intelligence in
                 modern implementations. We partition smart city
                 infrastructure into application, sensing,
                 communication, security, and data planes and put an
                 emphasis on the data plane as the mainstay of computing
                 and data storage. We investigate (i) a centralized and
                 distributed implementation of data plane's physical
                 infrastructure and (ii) a complementary application of
                 data analytics, machine learning, deep learning, and
                 data visualization to implement robust machine
                 intelligence in a smart city software core. We finalize
                 our article with pointers to open issues and
                 challenges.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Sultan:2019:SCL,
  author =       "Hameedah Sultan and Anjali Chauhan and Smruti R.
                 Sarangi",
  title =        "A Survey of Chip-level Thermal Simulators",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "42:1--42:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3309544",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3309544",
  abstract =     "Thermal modeling and simulation have become imperative
                 in recent years owing to the increased power density of
                 high performance microprocessors. Temperature is a
                 first-order design criteria, and hence special
                 consideration has to be given to it in every stage of
                 the design process. If not properly accounted for,
                 temperature can have disastrous effects on the
                 performance of the chip, often leading to failure. To
                 streamline research efforts, there is a strong need for
                 a comprehensive survey of the techniques and tools
                 available for thermal simulation. This will help new
                 researchers entering the field to quickly familiarize
                 themselves with the state of the art and enable
                 existing researchers to further improve upon their
                 proposed techniques. In this article, we present a
                 survey of the package level thermal simulation
                 techniques developed over the past two decades.",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fiaz:2019:HDT,
  author =       "Mustansar Fiaz and Arif Mahmood and Sajid Javed and
                 Soon Ki Jung",
  title =        "Handcrafted and Deep Trackers: Recent Visual Object
                 Tracking Approaches and Trends",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "43:1--43:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3309665",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3309665",
  abstract =     "In recent years, visual object tracking has become a
                 very active research area. An increasing number of
                 tracking algorithms are being proposed each year. It is
                 because tracking has wide applications in various
                 real-world problems such as human-computer interaction,
                 autonomous vehicles, robotics, surveillance, and
                 security just to name a few. In the current study, we
                 review latest trends and advances in the tracking area
                 and evaluate the robustness of different trackers based
                 on the feature extraction methods. The first part of
                 this work includes a comprehensive survey of the
                 recently proposed trackers. We broadly categorize
                 trackers into Correlation Filter based Trackers (CFTs)
                 and Non-CFTs. Each category is further classified into
                 various types based on the architecture and the
                 tracking mechanism. In the second part of this work, we
                 experimentally evaluated 24 recent trackers for
                 robustness and compared handcrafted and deep feature
                 based trackers. We observe that trackers using deep
                 features performed better, though in some cases a
                 fusion of both increased performance significantly. To
                 overcome the drawbacks of the existing benchmarks, a
                 new benchmark Object Tracking and Temple Color (OTTC)
                 has also been proposed and used in the evaluation of
                 different algorithms. We analyze the performance of
                 trackers over 11 different challenges in OTTC and 3
                 other benchmarks. Our study concludes that
                 Discriminative Correlation Filter (DCF) based trackers
                 perform better than the others. Our study also reveals
                 that inclusion of different types of regularizations
                 over DCF often results in boosted tracking performance.
                 Finally, we sum up our study by pointing out some
                 insights and indicating future trends in the visual
                 object tracking field.",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mannes:2019:NCN,
  author =       "Elisa Mannes and Carlos Maziero",
  title =        "Naming Content on the Network Layer: a Security
                 Analysis of the Information-Centric Network Model",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "44:1--44:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3311888",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3311888",
  abstract =     "The Information-Centric Network (ICN) paradigm is a
                 future Internet approach aiming to tackle the Internet
                 architectural problems and inefficiencies, by swapping
                 the main entity of the network architecture from hosts
                 to content items. In ICN, content names play a central
                 role: Each content gets a unique name at the network
                 layer, and this name is used for routing the content
                 over the network. This paradigm change potentially
                 enables a future Internet with better performance,
                 reliability, scalability, and suitability for wireless
                 and mobile communication. It also provides new
                 intrinsic means to deal with some popular attacks on
                 the Internet architecture, such as denial of service.
                 However, this new paradigm also represents new
                 challenges related to security that need to be
                 addressed, to ensure its capability to support current
                 and future Internet requirements. This article surveys
                 and summarizes ongoing research concerning security
                 aspects of ICNs, discussing vulnerabilities, attacks,
                 and proposed solutions to mitigate them. We also
                 discuss open challenges and propose future directions
                 regarding research in ICN security.",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Grondahl:2019:TAA,
  author =       "Tommi Gr{\"o}ndahl and N. Asokan",
  title =        "Text Analysis in Adversarial Settings: Does Deception
                 Leave a Stylistic Trace?",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "45:1--45:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3310331",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3310331",
  abstract =     "Textual deception constitutes a major problem for
                 online security. Many studies have argued that
                 deceptiveness leaves traces in writing style, which
                 could be detected using text classification techniques.
                 By conducting an extensive literature review of
                 existing empirical work, we demonstrate that while
                 certain linguistic features have been indicative of
                 deception in certain corpora, they fail to generalize
                 across divergent semantic domains. We suggest that
                 deceptiveness as such leaves no content-invariant
                 stylistic trace, and textual similarity measures
                 provide a superior means of classifying texts as
                 potentially deceptive. Additionally, we discuss forms
                 of deception beyond semantic content, focusing on
                 hiding author identity by writing style obfuscation.
                 Surveying the literature on both author identification
                 and obfuscation techniques, we conclude that current
                 style transformation methods fail to achieve reliable
                 obfuscation while simultaneously ensuring semantic
                 faithfulness to the original text. We propose that
                 future work in style transformation should pay
                 particular attention to disallowing semantically
                 drastic changes.",
  acknowledgement = ack-nhfb,
  articleno =    "45",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ma:2019:WSC,
  author =       "Yongsen Ma and Gang Zhou and Shuangquan Wang",
  title =        "{WiFi} Sensing with Channel State Information: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "46:1--46:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3310194",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3310194",
  abstract =     "With the high demand for wireless data traffic, WiFi
                 networks have experienced very rapid growth, because
                 they provide high throughput and are easy to deploy.
                 Recently, Channel State Information (CSI) measured by
                 WiFi networks is widely used for different sensing
                 purposes. To get a better understanding of existing
                 WiFi sensing technologies and future WiFi sensing
                 trends, this survey gives a comprehensive review of the
                 signal processing techniques, algorithms, applications,
                 and performance results of WiFi sensing with CSI.
                 Different WiFi sensing algorithms and signal processing
                 techniques have their own advantages and limitations
                 and are suitable for different WiFi sensing
                 applications. The survey groups CSI-based WiFi sensing
                 applications into three categories, detection,
                 recognition, and estimation, depending on whether the
                 outputs are binary/multi-class classifications or
                 numerical values. With the development and deployment
                 of new WiFi technologies, there will be more WiFi
                 sensing opportunities wherein the targets may go beyond
                 from humans to environments, animals, and objects. The
                 survey highlights three challenges for WiFi sensing:
                 robustness and generalization, privacy and security,
                 and coexistence of WiFi sensing and networking.
                 Finally, the survey presents three future WiFi sensing
                 trends, i.e., integrating cross-layer network
                 information, multi-device cooperation, and fusion of
                 different sensors, for enhancing existing WiFi sensing
                 capabilities and enabling new WiFi sensing
                 opportunities.",
  acknowledgement = ack-nhfb,
  articleno =    "46",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pimentel:2019:SCM,
  author =       "Jo{\~a}o Felipe Pimentel and Juliana Freire and
                 Leonardo Murta and Vanessa Braganholo",
  title =        "A Survey on Collecting, Managing, and Analyzing
                 Provenance from Scripts",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "47:1--47:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3311955",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3311955",
  abstract =     "Scripts are widely used to design and run scientific
                 experiments. Scripting languages are easy to learn and
                 use, and they allow complex tasks to be specified and
                 executed in fewer steps than with traditional
                 programming languages. However, they also have
                 important limitations for reproducibility and data
                 management. As experiments are iteratively refined, it
                 is challenging to reason about each experiment run (or
                 trial), to keep track of the association between trials
                 and experiment instances as well as the differences
                 across trials, and to connect results to specific input
                 data and parameters. Approaches have been proposed that
                 address these limitations by collecting, managing, and
                 analyzing the provenance of scripts. In this article,
                 we survey the state of the art in provenance for
                 scripts. We have identified the approaches by following
                 an exhaustive protocol of forward and backward
                 literature snowballing. Based on a detailed study, we
                 propose a taxonomy and classify the approaches using
                 this taxonomy.",
  acknowledgement = ack-nhfb,
  articleno =    "47",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goncales:2019:CSD,
  author =       "Lucian Jos{\'e} Gon{\c{c}}ales and Kleinner Farias and
                 Toacy {Cavalcante De Oliveira} and Murilo Scholl",
  title =        "Comparison of Software Design Models: an Extended
                 Systematic Mapping Study",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "48:1--48:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3313801",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3313801",
  abstract =     "Model comparison has been widely used to support many
                 tasks in model-driven software development. For this
                 reason, many techniques of comparing them have been
                 proposed in the last few decades. However, academia and
                 industry have overlooked a classification of currently
                 available approaches to the comparison of design
                 models. Hence, a thorough understanding of
                 state-of-the-art techniques remains limited and
                 inconclusive. This article, therefore, focuses on
                 providing a classification and a thematic analysis of
                 studies on the comparison of software design models. We
                 carried out a systematic mapping study following
                 well-established guidelines to answer nine research
                 questions. In total, 56 primary studies (out of 4,132)
                 were selected from 10 widely recognized electronic
                 databases after a careful filtering process. The main
                 results are that a majority of the primary studies (1)
                 provide coarse-grained techniques of the comparison of
                 general-purpose diagrams, (2) adopt graphs as principal
                 data structure and compare software design models
                 considering structural properties only, (3) pinpoint
                 commonalities and differences between software design
                 models rather than assess their similarity, and (4)
                 propose new techniques while neglecting the production
                 of empirical knowledge from experimental studies.
                 Finally, this article highlights some challenges and
                 directions that can be explored in upcoming studies.",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wenzl:2019:HET,
  author =       "Matthias Wenzl and Georg Merzdovnik and Johanna
                 Ullrich and Edgar Weippl",
  title =        "From Hack to Elaborate Technique --- a Survey on
                 Binary Rewriting",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "49:1--49:37",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3316415",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3316415",
  abstract =     "Binary rewriting is changing the semantics of a
                 program without having the source code at hand. It is
                 used for diverse purposes, such as emulation (e.g.,
                 QEMU), optimization (e.g., DynInst), observation (e.g.,
                 Valgrind), and hardening (e.g., Control flow integrity
                 enforcement). This survey gives detailed insight into
                 the development and state-of-the-art in binary
                 rewriting by reviewing 67 publications from 1966 to
                 2018. Starting from these publications, we provide an
                 in-depth investigation of the challenges and respective
                 solutions to accomplish binary rewriting. Based on our
                 findings, we establish a thorough categorization of
                 binary rewriting approaches with respect to their
                 use-case, applied analysis technique,
                 code-transformation method, and code generation
                 techniques. We contribute a comprehensive mapping
                 between binary rewriting tools, applied techniques, and
                 their domain of application. Our findings emphasize
                 that although much work has been done over the past
                 decades, most of the effort was put into improvements
                 aiming at rewriting general purpose applications but
                 ignoring other challenges like altering
                 throughput-oriented programs or software with real-time
                 requirements, which are often used in the emerging
                 field of the Internet of Things. To the best of our
                 knowledge, our survey is the first comprehensive
                 overview on the complete binary rewriting process.",
  acknowledgement = ack-nhfb,
  articleno =    "49",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{ElRaheb:2019:DIL,
  author =       "Katerina {El Raheb} and Marina Stergiou and Akrivi
                 Katifori and Yannis Ioannidis",
  title =        "Dance Interactive Learning Systems: a Study on
                 Interaction Workflow and Teaching Approaches",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "50:1--50:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3323335",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3323335",
  abstract =     "Motion Capture and whole-body interaction technologies
                 have been experimentally proven to contribute to the
                 enhancement of dance learning and to the investigation
                 of bodily knowledge, innovating at the same time the
                 practice of dance. Designing and implementing a dance
                 interactive learning system with the aim to achieve
                 effective, enjoyable, and meaningful educational
                 experiences is, however, a highly demanding
                 interdisciplinary and complex problem. In this work, we
                 examine the interactive dance training systems that are
                 described in the recent bibliography, proposing a
                 framework of the most important design parameters,
                 which we present along with particular examples of
                 implementations. We discuss the way that the different
                 phases of a common workflow are designed and
                 implemented in these systems, examining aspects such as
                 the visualization of feedback to the learner, the
                 movement qualities involved, the technological
                 approaches used, as well as the general context of use
                 and learning approaches. Our aim is to identify common
                 patterns and areas that require further research and
                 development toward creating more effective and
                 meaningful digital dance learning tools.",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhang:2019:SPB,
  author =       "Rui Zhang and Rui Xue and Ling Liu",
  title =        "Security and Privacy on Blockchain",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "51:1--51:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3316481",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3316481",
  abstract =     "Blockchain offers an innovative approach to storing
                 information, executing transactions, performing
                 functions, and establishing trust in an open
                 environment. Many consider blockchain as a technology
                 breakthrough for cryptography and cybersecurity, with
                 use cases ranging from globally deployed cryptocurrency
                 systems like Bitcoin, to smart contracts, smart grids
                 over the Internet of Things, and so forth. Although
                 blockchain has received growing interests in both
                 academia and industry in the recent years, the security
                 and privacy of blockchains continue to be at the center
                 of the debate when deploying blockchain in different
                 applications. This article presents a comprehensive
                 overview of the security and privacy of blockchain. To
                 facilitate the discussion, we first introduce the
                 notion of blockchains and its utility in the context of
                 Bitcoin-like online transactions. Then, we describe the
                 basic security properties that are supported as the
                 essential requirements and building blocks for
                 Bitcoin-like cryptocurrency systems, followed by
                 presenting the additional security and privacy
                 properties that are desired in many blockchain
                 applications. Finally, we review the security and
                 privacy techniques for achieving these security
                 properties in blockchain-based systems, including
                 representative consensus algorithms, hash chained
                 storage, mixing protocols, anonymous signatures,
                 non-interactive zero-knowledge proof, and so forth. We
                 conjecture that this survey can help readers to gain an
                 in-depth understanding of the security and privacy of
                 blockchain with respect to concept, attributes,
                 techniques, and systems.",
  acknowledgement = ack-nhfb,
  articleno =    "51",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bakhshalipour:2019:EHD,
  author =       "Mohammad Bakhshalipour and Seyedali Tabaeiaghdaei and
                 Pejman Lotfi-Kamran and Hamid Sarbazi-Azad",
  title =        "Evaluation of Hardware Data Prefetchers on Server
                 Processors",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "52:1--52:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3312740",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3312740",
  abstract =     "Data prefetching, i.e., the act of predicting an
                 application's future memory accesses and fetching those
                 that are not in the on-chip caches, is a well-known and
                 widely used approach to hide the long latency of memory
                 accesses. The fruitfulness of data prefetching is
                 evident to both industry and academy: Nowadays, almost
                 every high-performance processor incorporates a few
                 data prefetchers for capturing various access patterns
                 of applications; besides, there is a myriad of
                 proposals for data prefetching in the research
                 literature, where each proposal enhances the efficiency
                 of prefetching in a specific way. In this survey, we
                 evaluate the effectiveness of data prefetching in the
                 context of server applications and shed light on its
                 design trade-offs. To do so, we choose a target
                 architecture based on a contemporary server processor
                 and stack various state-of-the-art data prefetchers on
                 top of it. We analyze the prefetchers in terms of their
                 ability to predict memory accesses and enhance overall
                 system performance, as well as their imposed overheads.
                 Finally, by comparing the state-of-the-art prefetchers
                 with impractical ideal prefetchers, we motivate further
                 work on improving data prefetching techniques.",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gonzalez-Manzano:2019:LUR,
  author =       "Lorena Gonzalez-Manzano and Jose M. {De Fuentes} and
                 Arturo Ribagorda",
  title =        "Leveraging User-related {Internet of Things} for
                 Continuous Authentication: a Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "53:1--53:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3314023",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3314023",
  abstract =     "Among all Internet of Things (IoT) devices, a subset
                 of them are related to users. Leveraging these
                 user-related IoT elements, it is possible to ensure the
                 identity of the user for a period of time, thus
                 avoiding impersonation. This need is known as
                 Continuous Authentication (CA). Since 2009, a plethora
                 of IoT-based CA academic research and industrial
                 contributions have been proposed. We offer a
                 comprehensive overview of 58 research papers regarding
                 the main components of such a CA system. The status of
                 the industry is studied as well, covering 32 market
                 contributions, research projects, and related
                 standards. Lessons learned, challenges, and open issues
                 to foster further research in this area are finally
                 presented.",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Usman:2019:SBM,
  author =       "Muhammad Usman and Mian Ahmad Jan and Xiangjian He and
                 Jinjun Chen",
  title =        "A Survey on Big Multimedia Data Processing and
                 Management in Smart Cities",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "54:1--54:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3323334",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3323334",
  abstract =     "Integration of embedded multimedia devices with
                 powerful computing platforms, e.g., machine learning
                 platforms, helps to build smart cities and transforms
                 the concept of Internet of Things into Internet of
                 Multimedia Things (IoMT). To provide different services
                 to the residents of smart cities, the IoMT technology
                 generates big multimedia data. The management of big
                 multimedia data is a challenging task for IoMT
                 technology. Without proper management, it is hard to
                 maintain consistency, reusability, and reconcilability
                 of generated big multimedia data in smart cities.
                 Various machine learning techniques can be used for
                 automatic classification of raw multimedia data and to
                 allow machines to learn features and perform specific
                 tasks. In this survey, we focus on various machine
                 learning platforms that can be used to process and
                 manage big multimedia data generated by different
                 applications in smart cities. We also highlight various
                 limitations and research challenges that need to be
                 considered when processing big multimedia data in
                 real-time.",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lu:2019:MMD,
  author =       "Jiaheng Lu and Irena Holubov{\'a}",
  title =        "Multi-model Databases: a New Journey to Handle the
                 Variety of Data",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "55:1--55:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3323214",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3323214",
  abstract =     "The variety of data is one of the most challenging
                 issues for the research and practice in data management
                 systems. The data are naturally organized in different
                 formats and models, including structured data,
                 semi-structured data, and unstructured data. In this
                 survey, we introduce the area of multi-model DBMSs that
                 build a single database platform to manage multi-model
                 data. Even though multi-model databases are a newly
                 emerging area, in recent years, we have witnessed many
                 database systems to embrace this category. We provide a
                 general classification and multi-dimensional
                 comparisons for the most popular multi-model databases.
                 This comprehensive introduction on existing approaches
                 and open problems, from the technique and application
                 perspective, make this survey useful for motivating new
                 multi-model database approaches, as well as serving as
                 a technical reference for developing multi-model
                 database applications.",
  acknowledgement = ack-nhfb,
  articleno =    "55",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Maiza:2019:STV,
  author =       "Claire Maiza and Hamza Rihani and Juan M. Rivas and
                 Jo{\"e}l Goossens and Sebastian Altmeyer and Robert I.
                 Davis",
  title =        "A Survey of Timing Verification Techniques for
                 Multi-Core Real-Time Systems",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "56:1--56:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3323212",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3323212",
  abstract =     "This survey provides an overview of the scientific
                 literature on timing verification techniques for
                 multi-core real-time systems. It reviews the key
                 results in the field from its origins around 2006 to
                 the latest research published up to the end of 2018.
                 The survey highlights the key issues involved in
                 providing guarantees of timing correctness for
                 multi-core systems. A detailed review is provided
                 covering four main categories: full integration,
                 temporal isolation, integrating interference effects
                 into schedulability analysis, and mapping and
                 allocation. The survey concludes with a discussion of
                 the advantages and disadvantages of these different
                 approaches, identifying open issues, key challenges,
                 and possible directions for future research.",
  acknowledgement = ack-nhfb,
  articleno =    "56",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Xiong:2019:SGK,
  author =       "Hu Xiong and Yan Wu and Zhenyu Lu",
  title =        "A Survey of Group Key Agreement Protocols with
                 Constant Rounds",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "57:1--57:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3318460",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3318460",
  abstract =     "Group key agreement (shorten as GKA) protocol enables
                 a group of users to negotiate a one-time session key
                 and protect the thereafter group-oriented communication
                 with this session key across an unreliable network. The
                 number of communication rounds is one of the main
                 concern for practical applications where the
                 cardinality of group participants involved is
                 considerable. It is critical to have fixed constant
                 rounds in GKA protocols to secure these applications.
                 In light of overwhelming variety and multitude of
                 constant-round GKA protocols, this article surveys
                 these protocols from a series of perspectives to supply
                 better comprehension for researchers and scholars.
                 Concretely, this article captures the state of the art
                 of constant-round GKA protocols by analyzing the design
                 rationale, examining the framework and security model,
                 and evaluating all discussed protocols in terms of
                 efficiency and security properties. In addition, this
                 article discusses the extension of constant-round GKA
                 protocols including dynamic membership updating,
                 password-based, affiliation-hiding, and
                 fault-tolerance. In conclusion, this article also
                 points out a number of interesting future directions.",
  acknowledgement = ack-nhfb,
  articleno =    "57",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Saleme:2019:MDS,
  author =       "Est{\^e}v{\~a}o B. Saleme and Alexandra Covaci and
                 Gebremariam Mesfin and Celso A. S. Santos and
                 Gheorghita Ghinea",
  title =        "Mulsemedia {DIY}: a Survey of Devices and a Tutorial
                 for Building Your Own Mulsemedia Environment",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "58:1--58:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3319853",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3319853",
  abstract =     "Multisensory experiences have been increasingly
                 applied in Human-Computer Interaction (HCI). In recent
                 years, it is commonplace to notice the development of
                 haptic, olfactory, and even gustatory displays to
                 create more immersive experiences. Companies are
                 proposing new additions to the multisensory world and
                 are unveiling new products that promise to offer
                 amazing experiences exploiting mulsemedia-multiple
                 sensorial media-where users can perceive odors, tastes,
                 and the sensation of wind blowing against their face.
                 Whilst researchers, practitioners and users alike are
                 faced with a wide range of such new devices, relatively
                 little work has been undertaken to summarize efforts
                 and initiatives in this area. The current article
                 addresses this shortcoming in two ways: first, by
                 presenting a survey of devices targeting senses beyond
                 that of sight and hearing and, second, by describing an
                 approach to guide newcomers and experienced
                 practitioners alike to build their own mulsemedia
                 environment, both in a desktop setting and in an
                 immersive 360${}^\circ $ environment.",
  acknowledgement = ack-nhfb,
  articleno =    "58",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mengistu:2019:STV,
  author =       "Tessema M. Mengistu and Dunren Che",
  title =        "Survey and Taxonomy of Volunteer Computing",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "59:1--59:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3320073",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3320073",
  abstract =     "Volunteer Computing is a kind of distributed computing
                 that harnesses the aggregated spare computing resources
                 of volunteer devices. It provides a cheaper and greener
                 alternative computing infrastructure that can
                 complement the dedicated, centralized, and expensive
                 data centres. The aggregated idle computing resources
                 of devices ranging from desktop computers to routers
                 and smart TVs are being utilized to provide the much
                 needed computing infrastructure for compute intensive
                 tasks such as scientific simulations and big data
                 analysis. However, the use of Volunteer Computing is
                 still dominated by scientific applications and only a
                 very small fraction of the potential volunteer nodes
                 are participating. This article provides a
                 comprehensive survey of Volunteer Computing, covering
                 key technical and operational issues such as security,
                 task distribution, resource management, and incentive
                 models. The article also presents a taxonomy of
                 Volunteer Computing systems, together with discussions
                 of the characteristics of specific systems in each
                 category. To harness the full potentials of Volunteer
                 Computing and make it a reliable alternative computing
                 infrastructure for general applications, we need to
                 improve the existing techniques and device new
                 mechanisms. Thus, this article also sheds light on
                 important issues regarding the future research and
                 development of Volunteer Computing systems with the aim
                 of making them a viable alternative computing
                 infrastructure.",
  acknowledgement = ack-nhfb,
  articleno =    "59",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Oukemeni:2019:PAM,
  author =       "Samia Oukemeni and Helena Rif{\`a}-Pous and Joan
                 Manuel Marqu{\`e}s Puig",
  title =        "Privacy Analysis on Microblogging Online Social
                 Networks: a Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "60:1--60:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3321481",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3321481",
  abstract =     "Online Social Networks (OSNs) incorporate different
                 forms of interactive communication, including
                 microblogging services, multimedia sharing, business
                 networking, and so on. They allow users to create
                 profiles, connect with friends, and share their daily
                 activities and thoughts. However, this ease of use of
                 OSNs comes with a cost in terms of users' privacy and
                 security. The big amount of personal data shared in the
                 users' profiles or correlated from their activities can
                 be stored, processed, and sold for advertisement or
                 statistical purposes. It attracts also malicious users
                 who can collect and exploit the data and target
                 different types of attacks. In this article, we review
                 the state of the art of OSNs existing either in the
                 literature or deployed for use. We focus on the OSN
                 systems that offer, but not exclusively, microblogging
                 services. We analyze and evaluate each system based on
                 a set of characteristics, and we compare them based on
                 their usability and the level of protection of privacy
                 and security they provide. This study is a first step
                 toward understanding the security and privacy controls
                 and measuring their level in an OSN.",
  acknowledgement = ack-nhfb,
  articleno =    "60",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Winter:2019:III,
  author =       "Stephan Winter and Martin Tomko and Maria Vasardani
                 and Kai-Florian Richter and Kourosh Khoshelham and
                 Mohsen Kalantari",
  title =        "Infrastructure-Independent Indoor Localization and
                 Navigation",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "61:1--61:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3321516",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3321516",
  abstract =     "In the absence of any global positioning
                 infrastructure for indoor environments, research on
                 supporting human indoor localization and navigation
                 trails decades behind research on outdoor localization
                 and navigation. The major barrier to broader progress
                 has been the dependency of indoor positioning on
                 environment-specific infrastructure and resulting
                 tailored technical solutions. Combined with the
                 fragmentation and compartmentalization of indoor
                 environments, this poses significant challenges to
                 widespread adoption of indoor location-based services.
                 This article puts aside all approaches of
                 infrastructure-based support for human indoor
                 localization and navigation and instead reviews
                 technical concepts that are independent of sensors
                 embedded in the environment. The reviewed concepts rely
                 on a mobile computing platform with sensing capability
                 and a human interaction interface (``smartphone'').
                 This platform may or may not carry a stored map of the
                 environment, but does not require in situ internet
                 access. In this regard, the presented approaches are
                 more challenging than any localization and navigation
                 solutions specific to a particular,
                 infrastructure-equipped indoor space, since they are
                 not adapted to local context, and they may lack some of
                 the accuracy achievable with those tailored solutions.
                 However, only these approaches have the potential to be
                 universally applicable.",
  acknowledgement = ack-nhfb,
  articleno =    "61",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lozano:2019:SCR,
  author =       "Roberto Casta{\~n}eda Lozano and Christian Schulte",
  title =        "Survey on Combinatorial Register Allocation and
                 Instruction Scheduling",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "62:1--62:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3200920",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3200920",
  abstract =     "Register allocation (mapping variables to processor
                 registers or memory) and instruction scheduling
                 (reordering instructions to increase instruction-level
                 parallelism) are essential tasks for generating
                 efficient assembly code in a compiler. In the past
                 three decades, combinatorial optimization has emerged
                 as an alternative to traditional, heuristic algorithms
                 for these two tasks. Combinatorial optimization
                 approaches can deliver optimal solutions according to a
                 model, can precisely capture trade-offs between
                 conflicting decisions, and are more flexible at the
                 expense of increased compilation time. This article
                 provides an exhaustive literature review and a
                 classification of combinatorial optimization approaches
                 to register allocation and instruction scheduling, with
                 a focus on the techniques that are most applied in this
                 context: integer programming, constraint programming,
                 partitioned Boolean quadratic programming, and
                 enumeration. Researchers in compilers and combinatorial
                 optimization can benefit from identifying developments,
                 trends, and challenges in the area; compiler
                 practitioners may discern opportunities and grasp the
                 potential benefit of applying combinatorial
                 optimization.",
  acknowledgement = ack-nhfb,
  articleno =    "62",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chandrakala:2019:EAS,
  author =       "S. Chandrakala and S. L. Jayalakshmi",
  title =        "Environmental Audio Scene and Sound Event Recognition
                 for Autonomous Surveillance: a Survey and Comparative
                 Studies",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "63:1--63:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3322240",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3322240",
  abstract =     "Monitoring of human and social activities is becoming
                 increasingly pervasive in our living environment for
                 public security and safety applications. The
                 recognition of suspicious events is important in both
                 indoor and outdoor environments, such as child-care
                 centers, smart-homes, old-age homes, residential areas,
                 office environments, elevators, and smart cities.
                 Environmental audio scene and sound event recognition
                 are the fundamental tasks involved in many audio
                 surveillance applications. Although numerous approaches
                 have been proposed, robust environmental audio
                 surveillance remains a huge challenge due to various
                 reasons, such as various types of overlapping audio
                 sounds, background noises, and lack of universal and
                 multi-modal datasets. The goal of this article is to
                 review various features of representing audio scenes
                 and sound events and provide appropriate machine
                 learning algorithms for audio surveillance tasks.
                 Benchmark datasets are categorized based on the
                 real-world scenarios of audio surveillance
                 applications. To have a quantitative understanding,
                 some of the state-of-the-art approaches are evaluated
                 based on two benchmark datasets for audio scenes and
                 sound event recognition tasks. Finally, we outline the
                 possible future directions for improving the
                 recognition of environmental audio scenes and sound
                 events.",
  acknowledgement = ack-nhfb,
  articleno =    "63",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gu:2019:ILI,
  author =       "Fuqiang Gu and Xuke Hu and Milad Ramezani and
                 Debaditya Acharya and Kourosh Khoshelham and Shahrokh
                 Valaee and Jianga Shang",
  title =        "Indoor Localization Improved by Spatial Context --- a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "64:1--64:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3322241",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3322241",
  abstract =     "Indoor localization is essential for healthcare,
                 security, augmented reality gaming, and many other
                 location-based services. There is currently a wealth of
                 relevant literature on indoor localization. This
                 article focuses on recent advances in indoor
                 localization methods that use spatial context to
                 improve the location estimation. Spatial context in the
                 form of maps and spatial models have been used to
                 improve the localization by constraining location
                 estimates in the navigable parts of indoor
                 environments. Landmarks such as doors and corners,
                 which are also one form of spatial context, have proved
                 useful in assisting indoor localization by correcting
                 the localization error. This survey gives a
                 comprehensive review of state-of-the-art indoor
                 localization methods and localization improvement
                 methods using maps, spatial models, and landmarks.",
  acknowledgement = ack-nhfb,
  articleno =    "64",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ben-Nun:2019:DPD,
  author =       "Tal Ben-Nun and Torsten Hoefler",
  title =        "Demystifying Parallel and Distributed Deep Learning:
                 an In-depth Concurrency Analysis",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "65:1--65:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3320060",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3320060",
  abstract =     "Deep Neural Networks (DNNs) are becoming an important
                 tool in modern computing applications. Accelerating
                 their training is a major challenge and techniques
                 range from distributed algorithms to low-level circuit
                 design. In this survey, we describe the problem from a
                 theoretical perspective, followed by approaches for its
                 parallelization. We present trends in DNN architectures
                 and the resulting implications on parallelization
                 strategies. We then review and model the different
                 types of concurrency in DNNs: from the single operator,
                 through parallelism in network inference and training,
                 to distributed deep learning. We discuss asynchronous
                 stochastic optimization, distributed system
                 architectures, communication schemes, and neural
                 architecture search. Based on those approaches, we
                 extrapolate potential directions for parallelism in
                 deep learning.",
  acknowledgement = ack-nhfb,
  articleno =    "65",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Liao:2019:UAT,
  author =       "Xiaofeng Liao and Zhiming Zhao",
  title =        "Unsupervised Approaches for Textual Semantic
                 Annotation, A Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "66:1--66:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3324473",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3324473",
  abstract =     "Semantic annotation is a crucial part of achieving the
                 vision of the Semantic Web and has long been a research
                 topic among various communities. The most challenging
                 problem in reaching the Semantic Web's real potential
                 is the gap between a large amount of unlabeled
                 existing/new data and the limited annotation capability
                 available. To resolve this problem, numerous works have
                 been carried out to increase the degree of automation
                 of semantic annotation from manual to semi-automatic to
                 fully automatic. The richness of these works has been
                 well-investigated by numerous surveys focusing on
                 different aspects of the problem. However, a
                 comprehensive survey targeting unsupervised approaches
                 for semantic annotation is still missing and is
                 urgently needed. To better understand the
                 state-of-the-art of semantic annotation in the textual
                 domain adopting unsupervised approaches, this article
                 investigates existing literature and presents a survey
                 to answer three research questions: (1) To what extent
                 can semantic annotation be performed in a fully
                 automatic manner by using an unsupervised way? (2) What
                 kind of unsupervised approaches for semantic annotation
                 already exist in literature? (3) What characteristics
                 and relationships do these approaches have? In contrast
                 to existing surveys, this article helps the reader get
                 an insight into the state-of-art of semantic annotation
                 using unsupervised approaches. While examining the
                 literature, this article also addresses the
                 inconsistency in the terminology used in the literature
                 to describe the various semantic annotation tools'
                 degree of automation and provides more consistent
                 terminology. Based on this, a uniform summary of the
                 degree of automation of the many semantic annotation
                 tools that were previously investigated can now be
                 presented.",
  acknowledgement = ack-nhfb,
  articleno =    "66",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kaur:2019:CSC,
  author =       "Parminder Kaur and Husanbir Singh Pannu and Avleen
                 Kaur Malhi",
  title =        "Comprehensive Study of Continuous Orthogonal Moments
                 --- a Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "67:1--67:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3331167",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3331167",
  abstract =     "Orthogonal moments provide an efficient mathematical
                 framework for computer vision, image analysis, and
                 pattern recognition. They are derived from the
                 polynomials that are relatively perpendicular to each
                 other. Orthogonal moments are more efficient than
                 non-orthogonal moments for image representation with
                 minimum attribute redundancy, robustness to noise,
                 invariance to rotation, translation, and scaling.
                 Orthogonal moments can be both continuous and discrete.
                 Prominent continuous moments are Zernike,
                 Pseudo-Zernike, Legendre, and Gaussian-Hermite. This
                 article provides a comprehensive and comparative review
                 for continuous orthogonal moments along with their
                 applications.",
  acknowledgement = ack-nhfb,
  articleno =    "67",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Adhikari:2019:SSS,
  author =       "Mainak Adhikari and Tarachand Amgoth and Satish
                 Narayana Srirama",
  title =        "A Survey on Scheduling Strategies for Workflows in
                 Cloud Environment and Emerging Trends",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "68:1--68:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3325097",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3325097",
  abstract =     "Workflow scheduling is one of the challenging issues
                 in emerging trends of the distributed environment that
                 focuses on satisfying various quality of service (QoS)
                 constraints. The cloud receives the applications as a
                 form of a workflow, consisting of a set of
                 interdependent tasks, to solve the large-scale
                 scientific or enterprise problems. Workflow scheduling
                 in the cloud environment has been studied extensively
                 over the years, and this article provides a
                 comprehensive review of the approaches. This article
                 analyses the characteristics of various workflow
                 scheduling techniques and classifies them based on
                 their objectives and execution model. In addition, the
                 recent technological developments and paradigms such as
                 serverless computing and Fog computing are creating new
                 requirements/opportunities for workflow scheduling in a
                 distributed environment. The serverless infrastructures
                 are mainly designed for processing background tasks
                 such as Internet-of-Things (IoT), web applications, or
                 event-driven applications. To address the
                 ever-increasing demands of resources and to overcome
                 the drawbacks of the cloud-centric IoT, the Fog
                 computing paradigm has been developed. This article
                 also discusses workflow scheduling in the context of
                 these emerging trends of cloud computing.",
  acknowledgement = ack-nhfb,
  articleno =    "68",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{VanGlabbeek:2019:PJF,
  author =       "Rob {Van Glabbeek} and Peter H{\"o}fner",
  title =        "Progress, Justness, and Fairness",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "69:1--69:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3329125",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3329125",
  abstract =     "Fairness assumptions are a valuable tool when
                 reasoning about systems. In this article, we classify
                 several fairness properties found in the literature and
                 argue that most of them are too restrictive for many
                 applications. As an alternative, we introduce the
                 concept of justness.",
  acknowledgement = ack-nhfb,
  articleno =    "69",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{McDaniel:2019:EDO,
  author =       "Melinda McDaniel and Veda C. Storey",
  title =        "Evaluating Domain Ontologies: Clarification,
                 Classification, and Challenges",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "70:1--70:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3329124",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3329124",
  abstract =     "The number of applications being developed that
                 require access to knowledge about the real world has
                 increased rapidly over the past two decades. Domain
                 ontologies, which formalize the terms being used in a
                 discipline, have become essential for research in areas
                 such as Machine Learning, the Internet of Things,
                 Robotics, and Natural Language Processing, because they
                 enable separate systems to exchange information. The
                 quality of these domain ontologies, however, must be
                 ensured for meaningful communication. Assessing the
                 quality of domain ontologies for their suitability to
                 potential applications remains difficult, even though a
                 variety of frameworks and metrics have been developed
                 for doing so. This article reviews domain ontology
                 assessment efforts to highlight the work that has been
                 carried out and to clarify the important issues that
                 remain. These assessment efforts are classified into
                 five distinct evaluation approaches and the state of
                 the art of each described. Challenges associated with
                 domain ontology assessment are outlined and
                 recommendations are made for future research and
                 applications.",
  acknowledgement = ack-nhfb,
  articleno =    "70",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fan:2019:SVS,
  author =       "Ching-Ling Fan and Wen-Chih Lo and Yu-Tung Pai and
                 Cheng-Hsin Hsu",
  title =        "A Survey on $ 360^\circ $ Video Streaming:
                 Acquisition, Transmission, and Display",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "71:1--71:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3329119",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3329119",
  abstract =     "Head-mounted displays and 360${}^\circ $ videos have
                 become increasingly more popular, delivering a more
                 immersive viewing experience to end users. Streaming
                 360${}^\circ $ videos over the best-effort Internet,
                 however, faces tremendous challenges, because of the
                 high resolution and the short response time
                 requirements. This survey presents the current
                 literature related to 360${}^\circ $ video streaming.
                 We start with 360${}^\circ $ video streaming systems
                 built for real experiments to investigate the
                 practicality and efficiency of 360${}^\circ $ video
                 streaming. We then present the video and viewer
                 datasets, which may be used to drive large-scale
                 simulations and experiments. Different optimization
                 tools in various stages of the 360${}^\circ $ video
                 streaming pipeline are discussed in detail. We also
                 present various applications enabled by 360${}^\circ $
                 video streaming. In the appendices, we review the
                 off-the-shelf hardware available at the time of writing
                 and the open research problems.",
  acknowledgement = ack-nhfb,
  articleno =    "71",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ribeiro:2019:RAC,
  author =       "Madalena Ribeiro and Abel J. P. Gomes",
  title =        "Recoloring Algorithms for Colorblind People: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "72:1--72:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3329118",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3329118",
  abstract =     "Color is a powerful communication component, not only
                 as part of the message meaning but also as a way of
                 discriminating contents therein. However, 5\% of the
                 world's population suffers from color vision deficiency
                 (CVD), commonly known as colorblindness. This handicap
                 adulterates the way the color is perceived,
                 compromising the reading and understanding of the
                 message contents. This issue becomes even more
                 pertinent due to the increasing availability of
                 multimedia contents in computational environments
                 (e.g., web browsers). Aware of this problem, a
                 significant number of CVD research works came up in the
                 literature in the past two decades to improve color
                 perception in text documents, still images, video, and
                 so forth. This survey mainly addresses recoloring
                 algorithms toward still images for colorblind people,
                 including the current trends in the field of color
                 adaptation.",
  acknowledgement = ack-nhfb,
  articleno =    "72",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ghosh:2019:UDL,
  author =       "Swarnendu Ghosh and Nibaran Das and Ishita Das and
                 Ujjwal Maulik",
  title =        "Understanding Deep Learning Techniques for Image
                 Segmentation",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "73:1--73:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3329784",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3329784",
  abstract =     "The machine learning community has been overwhelmed by
                 a plethora of deep learning--based approaches. Many
                 challenging computer vision tasks, such as detection,
                 localization, recognition, and segmentation of objects
                 in an unconstrained environment, are being efficiently
                 addressed by various types of deep neural networks,
                 such as convolutional neural networks, recurrent
                 networks, adversarial networks, and autoencoders.
                 Although there have been plenty of analytical studies
                 regarding the object detection or recognition domain,
                 many new deep learning techniques have surfaced with
                 respect to image segmentation techniques. This article
                 approaches these various deep learning techniques of
                 image segmentation from an analytical perspective. The
                 main goal of this work is to provide an intuitive
                 understanding of the major techniques that have made a
                 significant contribution to the image segmentation
                 domain. Starting from some of the traditional image
                 segmentation approaches, the article progresses by
                 describing the effect that deep learning has had on the
                 image segmentation domain. Thereafter, most of the
                 major segmentation algorithms have been logically
                 categorized with paragraphs dedicated to their unique
                 contribution. With an ample amount of intuitive
                 explanations, the reader is expected to have an
                 improved ability to visualize the internal dynamics of
                 these processes.",
  acknowledgement = ack-nhfb,
  articleno =    "73",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Celik:2019:PAC,
  author =       "Z. Berkay Celik and Earlence Fernandes and Eric Pauley
                 and Gang Tan and Patrick McDaniel",
  title =        "Program Analysis of Commodity {IoT} Applications for
                 Security and Privacy: Challenges and Opportunities",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "74:1--74:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3333501",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3333501",
  abstract =     "Recent advances in Internet of Things (IoT) have
                 enabled myriad domains such as smart homes, personal
                 monitoring devices, and enhanced manufacturing. IoT is
                 now pervasive-new applications are being used in nearly
                 every conceivable environment, which leads to the
                 adoption of device-based interaction and automation.
                 However, IoT has also raised issues about the security
                 and privacy of these digitally augmented spaces.
                 Program analysis is crucial in identifying those
                 issues, yet the application and scope of program
                 analysis in IoT remains largely unexplored by the
                 technical community. In this article, we study privacy
                 and security issues in IoT that require
                 program-analysis techniques with an emphasis on
                 identified attacks against these systems and defenses
                 implemented so far. Based on a study of five IoT
                 programming platforms, we identify the key insights
                 that result from research efforts in both the program
                 analysis and security communities and relate the
                 efficacy of program-analysis techniques to security and
                 privacy issues. We conclude by studying recent IoT
                 analysis systems and exploring their implementations.
                 Through these explorations, we highlight key challenges
                 and opportunities in calibrating for the environments
                 in which IoT systems will be used.",
  acknowledgement = ack-nhfb,
  articleno =    "74",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Widel:2019:BFM,
  author =       "Wojciech Wide{\l} and Maxime Audinot and Barbara Fila
                 and Sophie Pinchinat",
  title =        "Beyond 2014: Formal Methods for Attack Tree-based
                 Security Modeling",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "75:1--75:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3331524",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3331524",
  abstract =     "Attack trees are a well established and commonly used
                 framework for security modeling. They provide a
                 readable and structured representation of possible
                 attacks against a system to protect. Their hierarchical
                 structure reveals common features of the attacks and
                 enables quantitative evaluation of security, thus
                 highlighting the most severe vulnerabilities to focus
                 on while implementing countermeasures. Since in
                 real-life studies attack trees have a large number of
                 nodes, their manual creation is a tedious and
                 error-prone process, and their analysis is a
                 computationally challenging task. During the last half
                 decade, the attack tree community witnessed a growing
                 interest in employing formal methods to deal with the
                 aforementioned difficulties. We survey recent advances
                 in graphical security modeling with focus on the
                 application of formal methods to the interpretation,
                 (semi-)automated creation, and quantitative analysis of
                 attack trees and their extensions. We provide a unified
                 description of existing frameworks, compare their
                 features, and outline interesting open questions.",
  acknowledgement = ack-nhfb,
  articleno =    "75",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rashidi:2019:SPL,
  author =       "Saeed Rashidi and Majid Jalili and Hamid
                 Sarbazi-Azad",
  title =        "A Survey on {PCM} Lifetime Enhancement Schemes",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "76:1--76:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3332257",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3332257",
  abstract =     "Phase Change Memory (PCM) is an emerging memory
                 technology that has the capability to address the
                 growing demand for memory capacity and bridge the gap
                 between the main memory and the secondary storage. As a
                 resistive memory, PCM is able to store data based on
                 its resistance values. The wide resistance range of PCM
                 makes it possible to store even multiple bits per cell
                 (MLC) rather than a single bit per cell (SLC).
                 Unfortunately, PCM cells suffer from short lifetime.
                 That means PCM cells could tolerate a limited number of
                 write operations, and afterward they tend to
                 permanently stick at a constant value. Limited lifetime
                 is an issue related to PCM memory; hence, in recent
                 years, many studies have been conducted to prolong PCM
                 lifetime. These schemes have vast variety and are
                 applied at different architectural levels. In this
                 survey, we review the important works of such schemes
                 to give insights to those starting to research on
                 non-volatile memories (NVMs). These schemes are not
                 limited to PCM and are applicable on other NVM
                 technologies due to the similarities between them and
                 the generality of lifetime-prolonging schemes.",
  acknowledgement = ack-nhfb,
  articleno =    "76",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bergstrom:2019:HCI,
  author =       "Joanna Bergstr{\"o}m and Kasper Hornb{\ae}k",
  title =        "Human--Computer Interaction on the Skin",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "77:1--77:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3332166",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3332166",
  abstract =     "The skin offers exciting possibilities for
                 human--computer interaction by enabling new types of
                 input and feedback. We survey 42 research papers on
                 interfaces that allow users to give input on their
                 skin. Skin-based interfaces have developed rapidly over
                 the past 8 years but most work consists of individual
                 prototypes, with limited overview of possibilities or
                 identification of research directions. The purpose of
                 this article is to synthesize what skin input is, which
                 technologies can sense input on the skin, and how to
                 give feedback to the user. We discuss challenges for
                 research in each of these areas.",
  acknowledgement = ack-nhfb,
  articleno =    "77",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Maiorca:2019:TAM,
  author =       "Davide Maiorca and Battista Biggio and Giorgio
                 Giacinto",
  title =        "Towards Adversarial Malware Detection: Lessons Learned
                 from {PDF}-based Attacks",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "78:1--78:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3332184",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3332184",
  abstract =     "Malware still constitutes a major threat in the
                 cybersecurity landscape, also due to the widespread use
                 of infection vectors such as documents. These infection
                 vectors hide embedded malicious code to the victim
                 users, facilitating the use of social engineering
                 techniques to infect their machines. Research showed
                 that machine-learning algorithms provide effective
                 detection mechanisms against such threats, but the
                 existence of an arms race in adversarial settings has
                 recently challenged such systems. In this work, we
                 focus on malware embedded in PDF files as a
                 representative case of such an arms race. We start by
                 providing a comprehensive taxonomy of the different
                 approaches used to generate PDF malware and of the
                 corresponding learning-based detection systems. We then
                 categorize threats specifically targeted against
                 learning-based PDF malware detectors using a
                 well-established framework in the field of adversarial
                 machine learning. This framework allows us to
                 categorize known vulnerabilities of learning-based PDF
                 malware detectors and to identify novel attacks that
                 may threaten such systems, along with the potential
                 defense mechanisms that can mitigate the impact of such
                 threats. We conclude the article by discussing how such
                 findings highlight promising research directions
                 towards tackling the more general challenge of
                 designing robust malware detectors in adversarial
                 settings.",
  acknowledgement = ack-nhfb,
  articleno =    "78",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kaur:2019:SRI,
  author =       "Harsurinder Kaur and Husanbir Singh Pannu and Avleen
                 Kaur Malhi",
  title =        "A Systematic Review on Imbalanced Data Challenges in
                 Machine Learning: Applications and Solutions",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "79:1--79:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3343440",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3343440",
  abstract =     "In machine learning, the data imbalance imposes
                 challenges to perform data analytics in almost all
                 areas of real-world research. The raw primary data
                 often suffers from the skewed perspective of data
                 distribution of one class over the other as in the case
                 of computer vision, information security, marketing,
                 and medical science. The goal of this article is to
                 present a comparative analysis of the approaches from
                 the reference of data pre-processing, algorithmic and
                 hybrid paradigms for contemporary imbalance data
                 analysis techniques, and their comparative study in
                 lieu of different data distribution and their
                 application areas.",
  acknowledgement = ack-nhfb,
  articleno =    "79",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Arias-Cabarcos:2019:SAA,
  author =       "Patricia Arias-Cabarcos and Christian Krupitzer and
                 Christian Becker",
  title =        "A Survey on Adaptive Authentication",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "80:1--80:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3336117",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3336117",
  abstract =     "Adaptive Authentication allows a system to dynamically
                 select the best mechanism(s) for authenticating a user
                 depending on contextual factors, such as location,
                 proximity to devices, and other attributes. Though this
                 technology has the potential to change the current
                 password-dominated authentication landscape, research
                 to date has not led to practical solutions that
                 transcend to our daily lives. Motivated to find out how
                 to improve adaptive authentication design, we provide a
                 structured survey of the existing literature to date
                 and analyze it to identify and discuss current research
                 challenges and future directions.",
  acknowledgement = ack-nhfb,
  articleno =    "80",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Georgiou:2019:SDL,
  author =       "Stefanos Georgiou and Stamatia Rizou and Diomidis
                 Spinellis",
  title =        "Software Development Lifecycle for Energy Efficiency:
                 Techniques and Tools",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "81:1--81:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3337773",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3337773",
  abstract =     "Motivation: In modern it systems, the increasing
                 demand for computational power is tightly coupled with
                 ever higher energy consumption. Traditionally, energy
                 efficiency research has focused on reducing energy
                 consumption at the hardware level. Nevertheless, the
                 software itself provides numerous opportunities for
                 improving energy efficiency. Goal: Given that energy
                 efficiency for it systems is a rising concern, we
                 investigate existing work in the area of energy-aware
                 software development and identify open research
                 challenges. Our goal is to reveal limitations,
                 features, and tradeoffs regarding energy-performance
                 for software development and provide insights on
                 existing approaches, tools, and techniques for
                 energy-efficient programming. Method: We analyze and
                 categorize research work mostly extracted from top-tier
                 conferences and journals concerning energy efficiency
                 across the software development lifecycle phases.
                 Results: Our analysis shows that related work in this
                 area has focused mainly on the implementation and
                 verification phases of the software development
                 lifecycle. Existing work shows that the use of parallel
                 and approximate programming, source code analyzers,
                 efficient data structures, coding practices, and
                 specific programming languages can significantly
                 increase energy efficiency. Moreover, the utilization
                 of energy monitoring tools and benchmarks can provide
                 insights for the software practitioners and raise
                 energy-awareness during the development phase.",
  acknowledgement = ack-nhfb,
  articleno =    "81",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pawlick:2019:GTT,
  author =       "Jeffrey Pawlick and Edward Colbert and Quanyan Zhu",
  title =        "A Game-theoretic Taxonomy and Survey of Defensive
                 Deception for Cybersecurity and Privacy",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "82:1--82:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3337772",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3337772",
  abstract =     "Cyberattacks on both databases and critical
                 infrastructure have threatened public and private
                 sectors. Ubiquitous tracking and wearable computing
                 have infringed upon privacy. Advocates and engineers
                 have recently proposed using defensive deception as a
                 means to leverage the information asymmetry typically
                 enjoyed by attackers as a tool for defenders. The term
                 deception, however, has been employed broadly and with
                 a variety of meanings. In this article, we survey 24
                 articles from 2008 to 2018 that use game theory to
                 model defensive deception for cybersecurity and
                 privacy. Then, we propose a taxonomy that defines six
                 types of deception: perturbation, moving target
                 defense, obfuscation, mixing, honey-x, and attacker
                 engagement. These types are delineated by their
                 information structures, agents, actions, and duration:
                 precisely concepts captured by game theory. Our aims
                 are to rigorously define types of defensive deception,
                 to capture a snapshot of the state of the literature,
                 to provide a menu of models that can be used for
                 applied research, and to identify promising areas for
                 future work. Our taxonomy provides a systematic
                 foundation for understanding different types of
                 defensive deception commonly encountered in
                 cybersecurity and privacy.",
  acknowledgement = ack-nhfb,
  articleno =    "82",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Fletcher:2019:DTC,
  author =       "Sam Fletcher and Md. Zahidul Islam",
  title =        "Decision Tree Classification with Differential
                 Privacy: a Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "83:1--83:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3337064",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3337064",
  abstract =     "Data mining information about people is becoming
                 increasingly important in the data-driven society of
                 the 21st century. Unfortunately, sometimes there are
                 real-world considerations that conflict with the goals
                 of data mining; sometimes the privacy of the people
                 being data mined needs to be considered. This
                 necessitates that the output of data mining algorithms
                 be modified to preserve privacy while simultaneously
                 not ruining the predictive power of the outputted
                 model. Differential privacy is a strong, enforceable
                 definition of privacy that can be used in data mining
                 algorithms, guaranteeing that nothing will be learned
                 about the people in the data that could not already be
                 discovered without their participation. In this survey,
                 we focus on one particular data mining
                 algorithm-decision trees-and how differential privacy
                 interacts with each of the components that constitute
                 decision tree algorithms. We analyze both greedy and
                 random decision trees, and the conflicts that arise
                 when trying to balance privacy requirements with the
                 accuracy of the model.",
  acknowledgement = ack-nhfb,
  articleno =    "83",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Moghaddam:2019:PAM,
  author =       "Sara Kardani Moghaddam and Rajkumar Buyya and Kotagiri
                 Ramamohanarao",
  title =        "Performance-Aware Management of Cloud Resources: a
                 Taxonomy and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "84:1--84:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3337956",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3337956",
  abstract =     "The dynamic nature of the cloud environment has made
                 the distributed resource management process a challenge
                 for cloud service providers. The importance of
                 maintaining quality of service in accordance with
                 customer expectations and the highly dynamic nature of
                 cloud-hosted applications add new levels of complexity
                 to the process. Advances in big-data learning
                 approaches have shifted conventional static capacity
                 planning solutions to complex performance-aware
                 resource management methods. It is shown that the
                 process of decision-making for resource adjustment is
                 closely related to the behavior of the system,
                 including the utilization of resources and application
                 components. Therefore, a continuous monitoring of
                 system attributes and performance metrics provides the
                 raw data for the analysis of problems affecting the
                 performance of the application. Data analytic methods,
                 such as statistical and machine-learning approaches,
                 offer the required concepts, models, and tools to dig
                 into the data and find general rules, patterns, and
                 characteristics that define the functionality of the
                 system. Obtained knowledge from the data analysis
                 process helps to determine the changes in the
                 workloads, faulty components, or problems that can
                 cause system performance to degrade. A timely reaction
                 to performance degradation can avoid violations of
                 service level agreements, including performing proper
                 corrective actions such as auto-scaling or other
                 resource adjustment solutions. In this article, we
                 investigate the main requirements and limitations of
                 cloud resource management, including a study of the
                 approaches to workload and anomaly analysis in the
                 context of performance management in the cloud. A
                 taxonomy of the works on this problem is presented that
                 identifies main approaches in existing research from
                 the data analysis side to resource adjustment
                 techniques. Finally, considering the observed gaps in
                 the general direction of the reviewed works, a list of
                 these gaps is proposed for future researchers to
                 pursue.",
  acknowledgement = ack-nhfb,
  articleno =    "84",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Moffat:2019:HC,
  author =       "Alistair Moffat",
  title =        "{Huffman} Coding",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "85:1--85:35",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3342555",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3342555",
  abstract =     "Huffman's algorithm for computing minimum-redundancy
                 prefix-free codes has almost legendary status in the
                 computing disciplines. Its elegant blend of simplicity
                 and applicability has made it a favorite example in
                 algorithms courses, and as a result it is perhaps one
                 of the most commonly implemented algorithmic
                 techniques. This article presents a tutorial on Huffman
                 coding and surveys some of the developments that have
                 flowed as a consequence of Huffman's original
                 discovery, including details of code calculation and of
                 encoding and decoding operations. We also survey
                 related mechanisms, covering both arithmetic coding and
                 the recently developed asymmetric numeral systems
                 approach and briefly discuss other Huffman-coding
                 variants, including length-limited codes.",
  acknowledgement = ack-nhfb,
  articleno =    "85",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{DeMarsico:2019:SGR,
  author =       "Maria {De Marsico} and Alessio Mecca",
  title =        "A Survey on Gait Recognition via Wearable Sensors",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "86:1--86:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3340293",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3340293",
  abstract =     "Gait is a biometric trait that can allow user
                 authentication, though it is classified as a ``soft''
                 one due to a certain lack in permanence and to
                 sensibility to specific conditions. The earliest
                 research relies on computer vision, especially applied
                 in video surveillance. More recently, the spread of
                 wearable sensors, especially those embedded in mobile
                 devices, has spurred a different research line. In
                 fact, they are able to capture the dynamics of the
                 walking pattern through simpler one-dimensional
                 signals. This capture modality can avoid some problems
                 related to computer vision-based techniques but suffers
                 from specific limitations. Related research is still in
                 a less advanced phase with respect to other biometric
                 traits. However, many factors --- the promising results
                 achieved so far, the increasing accuracy of sensors,
                 the ubiquitous presence of mobile devices, and the low
                 cost of related techniques --- contribute to making
                 this biometrics attractive and suggest continuing
                 investigating. This survey provides interested readers
                 with a reasoned and systematic overview of problems,
                 approaches, and available benchmarks.",
  acknowledgement = ack-nhfb,
  articleno =    "86",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Almoqbel:2019:CMS,
  author =       "Mashael Almoqbel and Songhua Xu",
  title =        "Computational Mining of Social Media to Curb
                 Terrorism",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "87:1--87:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3342101",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3342101",
  abstract =     "In the ever-connected social networking era,
                 terrorists exploit social media platforms via
                 sophisticated approaches. To curb these activities, a
                 rich collection of computational methods was developed.
                 This article surveys the use of social media by
                 terrorists, followed by a temporal classification
                 framework that overviews computational countermeasures
                 at four major stages, including inception of an attack,
                 immediately before an attack, onset of an attack, and
                 after an attack. The literature surveyed was organized
                 around the four temporal stages. The resulting survey
                 is summarized in a table with the main technology used
                 in each stage based on the time of the attack.",
  acknowledgement = ack-nhfb,
  articleno =    "87",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Or-Meir:2019:DMA,
  author =       "Ori Or-Meir and Nir Nissim and Yuval Elovici and Lior
                 Rokach",
  title =        "Dynamic Malware Analysis in the Modern Era --- a State
                 of the Art Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "88:1--88:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3329786",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3329786",
  abstract =     "Although malicious software (malware) has been around
                 since the early days of computers, the sophistication
                 and innovation of malware has increased over the years.
                 In particular, the latest crop of ransomware has drawn
                 attention to the dangers of malicious software, which
                 can cause harm to private users as well as
                 corporations, public services (hospitals and
                 transportation systems), governments, and security
                 institutions. To protect these institutions and the
                 public from malware attacks, malicious activity must be
                 detected as early as possible, preferably before it
                 conducts its harmful acts. However, it is not always
                 easy to know what to look for-especially when dealing
                 with new and unknown malware that has never been seen.
                 Analyzing a suspicious file by static or dynamic
                 analysis methods can provide relevant and valuable
                 information regarding a file's impact on the hosting
                 system and help determine whether the file is malicious
                 or not, based on the method's predefined rules. While
                 various techniques (e.g., code obfuscation, dynamic
                 code loading, encryption, and packing) can be used by
                 malware writers to evade static analysis (including
                 signature-based anti-virus tools), dynamic analysis is
                 robust to these techniques and can provide greater
                 understanding regarding the analyzed file and
                 consequently can lead to better detection capabilities.
                 Although dynamic analysis is more robust than static
                 analysis, existing dynamic analysis tools and
                 techniques are imperfect, and there is no single tool
                 that can cover all aspects of malware behavior. The
                 most recent comprehensive survey performed in this area
                 was published in 2012. Since that time, the computing
                 environment has changed dramatically with new types of
                 malware (ransomware, cryptominers), new analysis
                 methods (volatile memory forensics, side-channel
                 analysis), new computing environments (cloud computing,
                 IoT devices), new machine-learning algorithms, and
                 more. The goal of this survey is to provide a
                 comprehensive and up-to-date overview of existing
                 methods used to dynamically analyze malware, which
                 includes a description of each method, its strengths
                 and weaknesses, and its resilience against malware
                 evasion techniques. In addition, we include an overview
                 of prominent studies presenting the usage of
                 machine-learning methods to enhance dynamic malware
                 analysis capabilities aimed at detection,
                 classification, and categorization.",
  acknowledgement = ack-nhfb,
  articleno =    "88",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Labatut:2019:EAF,
  author =       "Vincent Labatut and Xavier Bost",
  title =        "Extraction and Analysis of Fictional Character
                 Networks: a Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "89:1--89:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3344548",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3344548",
  abstract =     "A character network is a graph extracted from a
                 narrative in which vertices represent characters and
                 edges correspond to interactions between them. A number
                 of narrative-related problems can be addressed
                 automatically through the analysis of character
                 networks, such as summarization, classification, or
                 role detection. Character networks are particularly
                 relevant when considering works of fiction (e.g.,
                 novels, plays, movies, TV series), as their
                 exploitation allows developing information retrieval
                 and recommendation systems. However, works of fiction
                 possess specific properties that make these tasks
                 harder. This survey aims at presenting and organizing
                 the scientific literature related to the extraction of
                 character networks from works of fiction, as well as
                 their analysis. We first describe the extraction
                 process in a generic way and explain how its
                 constituting steps are implemented in practice,
                 depending on the medium of the narrative, the goal of
                 the network analysis, and other factors. We then review
                 the descriptive tools used to characterize character
                 networks, with a focus on the way they are interpreted
                 in this context. We illustrate the relevance of
                 character networks by also providing a review of
                 applications derived from their analysis. Finally, we
                 identify the limitations of the existing approaches and
                 the most promising perspectives.",
  acknowledgement = ack-nhfb,
  articleno =    "89",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Rejiba:2019:SMI,
  author =       "Zeineb Rejiba and Xavier Masip-Bruin and Eva
                 Mar{\'\i}n-Tordera",
  title =        "A Survey on Mobility-Induced Service Migration in the
                 Fog, Edge, and Related Computing Paradigms",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "90:1--90:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3326540",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3326540",
  abstract =     "With the advent of fog and edge computing paradigms,
                 computation capabilities have been moved toward the
                 edge of the network to support the requirements of
                 highly demanding services. To ensure that the quality
                 of such services is still met in the event of users'
                 mobility, migrating services across different computing
                 nodes becomes essential. Several studies have emerged
                 recently to address service migration in different
                 edge-centric research areas, including fog computing,
                 multi-access edge computing (MEC), cloudlets, and
                 vehicular clouds. Since existing surveys in this area
                 focus on either VM migration in general or migration in
                 a single research field (e.g., MEC), the objective of
                 this survey is to bring together studies from
                 different, yet related, edge-centric research fields
                 while capturing the different facets they addressed.
                 More specifically, we examine the diversity
                 characterizing the landscape of migration scenarios at
                 the edge, present an objective-driven taxonomy of the
                 literature, and highlight contributions that rather
                 focused on architectural design and implementation.
                 Finally, we identify a list of gaps and research
                 opportunities based on the observation of the current
                 state of the literature. One such opportunity lies in
                 joining efforts from both networking and computing
                 research communities to facilitate future research in
                 this area.",
  acknowledgement = ack-nhfb,
  articleno =    "90",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Jahan:2019:SMA,
  author =       "Farha Jahan and Weiqing Sun and Quamar Niyaz and
                 Mansoor Alam",
  title =        "Security Modeling of Autonomous Systems: a Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "91:1--91:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3337791",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3337791",
  abstract =     "Autonomous systems will soon be integrating into our
                 lives as home assistants, delivery drones, and
                 driverless cars. The implementation of the level of
                 automation in these systems from being manually
                 controlled to fully autonomous would depend upon the
                 autonomy approach chosen to design these systems. This
                 article reviews the historical evolution of autonomy,
                 its approaches, and the current trends in related
                 fields to build robust autonomous systems. Toward such
                 a goal and with the increased number of cyberattacks,
                 the security of these systems needs special attention
                 from the research community. To gauge the extent to
                 which research has been done in this area, we discuss
                 the cybersecurity of these systems. It is essential to
                 model the system from a security perspective, identify
                 the threats and vulnerabilities, and then model the
                 attacks. A survey in this direction explores the
                 theoretical/analytical system and attack models that
                 have been proposed over the years and identifies the
                 research gap that needs to be addressed by the research
                 community.",
  acknowledgement = ack-nhfb,
  articleno =    "91",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Min:2019:SFC,
  author =       "Weiqing Min and Shuqiang Jiang and Linhu Liu and Yong
                 Rui and Ramesh Jain",
  title =        "A Survey on Food Computing",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "92:1--92:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3329168",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3329168",
  abstract =     "Food is essential for human life and it is fundamental
                 to the human experience. Food-related study may support
                 multifarious applications and services, such as guiding
                 human behavior, improving human health, and
                 understanding the culinary culture. With the rapid
                 development of social networks, mobile networks, and
                 Internet of Things (IoT), people commonly upload,
                 share, and record food images, recipes, cooking videos,
                 and food diaries, leading to large-scale food data.
                 Large-scale food data offers rich knowledge about food
                 and can help tackle many central issues of human
                 society. Therefore, it is time to group several
                 disparate issues related to food computing. Food
                 computing acquires and analyzes heterogeneous food data
                 from different sources for perception, recognition,
                 retrieval, recommendation, and monitoring of food. In
                 food computing, computational approaches are applied to
                 address food-related issues in medicine, biology,
                 gastronomy, and agronomy. Both large-scale food data
                 and recent breakthroughs in computer science are
                 transforming the way we analyze food data. Therefore, a
                 series of works has been conducted in the food area,
                 targeting different food-oriented tasks and
                 applications. However, there are very few systematic
                 reviews that shape this area well and provide a
                 comprehensive and in-depth summary of current efforts
                 or detail open problems in this area. In this article,
                 we formalize food computing and present such a
                 comprehensive overview of various emerging concepts,
                 methods, and tasks. We summarize key challenges and
                 future directions ahead for food computing. This is the
                 first comprehensive survey that targets the study of
                 computing technology for the food area and also offers
                 a collection of research studies and technologies to
                 benefit researchers and practitioners working in
                 different food-related fields.",
  acknowledgement = ack-nhfb,
  articleno =    "92",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bertolino:2019:SRC,
  author =       "Antonia Bertolino and Guglielmo {De Angelis} and
                 Micael Gallego and Boni Garc{\'\i}a and Francisco
                 Gort{\'a}zar and Francesca Lonetti and Eda Marchetti",
  title =        "A Systematic Review on Cloud Testing",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "93:1--93:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3331447",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3331447",
  abstract =     "A systematic literature review is presented that
                 surveyed the topic of cloud testing over the period
                 2012--2017. Cloud testing can refer either to testing
                 cloud-based systems (testing of the cloud) or to
                 leveraging the cloud for testing purposes (testing in
                 the cloud): both approaches (and their combination into
                 testing of the cloud in the cloud) have drawn research
                 interest. An extensive paper search was conducted by
                 both automated query of popular digital libraries and
                 snowballing, which resulted in the final selection of
                 147 primary studies. Along the survey, a framework has
                 been incrementally derived that classifies cloud
                 testing research among six main areas and their topics.
                 The article includes a detailed analysis of the
                 selected primary studies to identify trends and gaps,
                 as well as an extensive report of the state-of-the-art
                 as it emerges by answering the identified Research
                 Questions. We find that cloud testing is an active
                 research field, although not all topics have received
                 enough attention and conclude by presenting the most
                 relevant open research challenges for each area of the
                 classification framework.",
  acknowledgement = ack-nhfb,
  articleno =    "93",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Duc:2019:MLM,
  author =       "Thang Le Duc and Rafael Garc{\'\i}a Leiva and Paolo
                 Casari and Per-Olov {\"O}stberg",
  title =        "Machine Learning Methods for Reliable Resource
                 Provisioning in Edge-Cloud Computing: a Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "94:1--94:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3341145",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3341145",
  abstract =     "Large-scale software systems are currently designed as
                 distributed entities and deployed in cloud data
                 centers. To overcome the limitations inherent to this
                 type of deployment, applications are increasingly being
                 supplemented with components instantiated closer to the
                 edges of networks-a paradigm known as edge computing.
                 The problem of how to efficiently orchestrate combined
                 edge-cloud applications is, however, incompletely
                 understood, and a wide range of techniques for resource
                 and application management are currently in use. This
                 article investigates the problem of reliable resource
                 provisioning in joint edge-cloud environments, and
                 surveys technologies, mechanisms, and methods that can
                 be used to improve the reliability of distributed
                 applications in diverse and heterogeneous network
                 environments. Due to the complexity of the problem,
                 special emphasis is placed on solutions to the
                 characterization, management, and control of complex
                 distributed applications using machine learning
                 approaches. The survey is structured around a
                 decomposition of the reliable resource provisioning
                 problem into three categories of techniques: workload
                 characterization and prediction, component placement
                 and system consolidation, and application elasticity
                 and remediation. Survey results are presented along
                 with a problem-oriented discussion of the
                 state-of-the-art. A summary of identified challenges
                 and an outline of future research directions are
                 presented to conclude the article.",
  acknowledgement = ack-nhfb,
  articleno =    "94",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Barika:2019:OBD,
  author =       "Mutaz Barika and Saurabh Garg and Albert Y. Zomaya and
                 Lizhe Wang and Aad {Van Moorsel} and Rajiv Ranjan",
  title =        "Orchestrating Big Data Analysis Workflows in the
                 Cloud: Research Challenges, Survey, and Future
                 Directions",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "95:1--95:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3332301",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3332301",
  abstract =     "Interest in processing big data has increased rapidly
                 to gain insights that can transform businesses,
                 government policies, and research outcomes. This has
                 led to advancement in communication, programming, and
                 processing technologies, including cloud computing
                 services and technologies such as Hadoop, Spark, and
                 Storm. This trend also affects the needs of analytical
                 applications, which are no longer monolithic but
                 composed of several individual analytical steps running
                 in the form of a workflow. These big data workflows are
                 vastly different in nature from traditional workflows.
                 Researchers are currently facing the challenge of how
                 to orchestrate and manage the execution of such
                 workflows. In this article, we discuss in detail
                 orchestration requirements of these workflows as well
                 as the challenges in achieving these requirements. We
                 also survey current trends and research that supports
                 orchestration of big data workflows and identify open
                 research challenges to guide future developments in
                 this area.",
  acknowledgement = ack-nhfb,
  articleno =    "95",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Goncalves:2019:AER,
  author =       "Rodrigo Gon{\c{c}}alves and Carina Friedrich
                 Dorneles",
  title =        "Automated Expertise Retrieval: a Taxonomy-Based Survey
                 and Open Issues",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "96:1--96:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3331000",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3331000",
  abstract =     "Understanding people's expertise is not a trivial task
                 since it is time-consuming when manually executed.
                 Automated approaches have become a topic of research in
                 recent years in various scientific fields, such as
                 information retrieval, databases, and machine learning.
                 This article carries out a survey on automated
                 expertise retrieval, i.e., finding data linked to a
                 person that describes the person's expertise, which
                 allows tasks such as profiling or finding people with a
                 certain expertise. A faceted taxonomy is introduced
                 that covers many of the existing approaches and
                 classifies them on the basis of features chosen from
                 studying the state-of-the-art. A list of open issues,
                 with suggestions for future research topics, is
                 introduced as well. It is hoped that our taxonomy and
                 review of related works on expertise retrieval will be
                 useful when analyzing different proposals and will
                 allow a better understanding of existing work and a
                 systematic classification of future work on the
                 topic.",
  acknowledgement = ack-nhfb,
  articleno =    "96",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hong:2019:RMF,
  author =       "Cheol-Ho Hong and Blesson Varghese",
  title =        "Resource Management in Fog\slash Edge Computing: a
                 Survey on Architectures, Infrastructure, and
                 Algorithms",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "97:1--97:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3326066",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3326066",
  abstract =     "Contrary to using distant and centralized cloud data
                 center resources, employing decentralized resources at
                 the edge of a network for processing data closer to
                 user devices, such as smartphones and tablets, is an
                 upcoming computing paradigm, referred to as fog/edge
                 computing. Fog/edge resources are typically
                 resource-constrained, heterogeneous, and dynamic
                 compared to the cloud, thereby making resource
                 management an important challenge that needs to be
                 addressed. This article reviews publications as early
                 as 1991, with 85\% of the publications between 2013 and
                 2018, to identify and classify the architectures,
                 infrastructure, and underlying algorithms for managing
                 resources in fog/edge computing.",
  acknowledgement = ack-nhfb,
  articleno =    "97",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wong:2019:DST,
  author =       "Ka-Chun Wong and Jiao Zhang and Shankai Yan and
                 Xiangtao Li and Qiuzhen Lin and Sam Kwong and Cheng
                 Liang",
  title =        "{DNA} Sequencing Technologies: Sequencing Data
                 Protocols and Bioinformatics Tools",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "98:1--98:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3340286",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3340286",
  abstract =     "The recent advances in DNA sequencing technology, from
                 first-generation sequencing (FGS) to third-generation
                 sequencing (TGS), have constantly transformed the
                 genome research landscape. Its data throughput is
                 unprecedented and severalfold as compared with past
                 technologies. DNA sequencing technologies generate
                 sequencing data that are big, sparse, and
                 heterogeneous. This results in the rapid development of
                 various data protocols and bioinformatics tools for
                 handling sequencing data. In this review, a historical
                 snapshot of DNA sequencing is taken with an emphasis on
                 data manipulation and tools. The technological history
                 of DNA sequencing is described and reviewed in thorough
                 detail. To manipulate the sequencing data generated,
                 different data protocols are introduced and reviewed.
                 In particular, data compression methods are highlighted
                 and discussed to provide readers a practical
                 perspective in the real-world setting. A large variety
                 of bioinformatics tools are also reviewed to help
                 readers extract the most from their sequencing data in
                 different aspects, such as sequencing quality control,
                 genomic visualization, single-nucleotide variant
                 calling, INDEL calling, structural variation calling,
                 and integrative analysis. Toward the end of the
                 article, we critically discuss the existing DNA
                 sequencing technologies for their pitfalls and
                 potential solutions.",
  acknowledgement = ack-nhfb,
  articleno =    "98",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Dai:2019:BDA,
  author =       "Hong-Ning Dai and Raymond Chi-Wing Wong and Hao Wang
                 and Zibin Zheng and Athanasios V. Vasilakos",
  title =        "Big Data Analytics for Large-scale Wireless Networks:
                 Challenges and Opportunities",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "99:1--99:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3337065",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3337065",
  abstract =     "The wide proliferation of various wireless
                 communication systems and wireless devices has led to
                 the arrival of big data era in large-scale wireless
                 networks. Big data of large-scale wireless networks has
                 the key features of wide variety, high volume,
                 real-time velocity, and huge value leading to the
                 unique research challenges that are different from
                 existing computing systems. In this article, we present
                 a survey of the state-of-art big data analytics (BDA)
                 approaches for large-scale wireless networks. In
                 particular, we categorize the life cycle of BDA into
                 four consecutive stages: Data Acquisition, Data
                 Preprocessing, Data Storage, and Data Analytics. We
                 then present a detailed survey of the technical
                 solutions to the challenges in BDA for large-scale
                 wireless networks according to each stage in the life
                 cycle of BDA. Moreover, we discuss the open research
                 issues and outline the future directions in this
                 promising area.",
  acknowledgement = ack-nhfb,
  articleno =    "99",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Luckcuck:2019:FSV,
  author =       "Matt Luckcuck and Marie Farrell and Louise A. Dennis
                 and Clare Dixon and Michael Fisher",
  title =        "Formal Specification and Verification of Autonomous
                 Robotic Systems: a Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "100:1--100:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3342355",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3342355",
  abstract =     "Autonomous robotic systems are complex, hybrid, and
                 often safety critical; this makes their formal
                 specification and verification uniquely challenging.
                 Though commonly used, testing and simulation alone are
                 insufficient to ensure the correctness of, or provide
                 sufficient evidence for the certification of,
                 autonomous robotics. Formal methods for autonomous
                 robotics have received some attention in the
                 literature, but no resource provides a current
                 overview. This article systematically surveys the state
                 of the art in formal specification and verification for
                 autonomous robotics. Specially, it identifies and
                 categorizes the challenges posed by, the formalisms
                 aimed at, and the formal approaches for the
                 specification and verification of autonomous
                 robotics.",
  acknowledgement = ack-nhfb,
  articleno =    "100",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Maksimov:2019:STS,
  author =       "Mike Maksimov and Sahar Kokaly and Marsha Chechik",
  title =        "A Survey of Tool-supported Assurance Case Assessment
                 Techniques",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "101:1--101:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3342481",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3342481",
  abstract =     "Systems deployed in regulated safety-critical domains
                 (e.g., the medical, nuclear, and automotive domains)
                 are often required to undergo a stringent safety
                 assessment procedure, as prescribed by a certification
                 body, to demonstrate their compliance to one or more
                 certification standards. Assurance cases are an
                 emerging way of communicating safety, security, and
                 dependability, as well as other properties of
                 safety-critical systems in a structured and
                 comprehensive manner. The significant size and
                 complexity of these documents, however, makes the
                 process of evaluating and assessing their validity a
                 non-trivial task and an active area of research. Due to
                 this, efforts have been made to develop and utilize
                 software tools for the purpose of aiding developers and
                 third party assessors in the act of assessing and
                 analyzing assurance cases. This article presents a
                 survey of the various assurance case assessment
                 features contained in 10 assurance case software tools,
                 all of which identified and selected by us via a
                 previously conducted systematic literature review. We
                 describe the various assessment techniques implemented,
                 discuss their strengths and weaknesses, and identify
                 possible areas in need of further research.",
  acknowledgement = ack-nhfb,
  articleno =    "101",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pisani:2019:ABS,
  author =       "Paulo Henrique Pisani and Abir Mhenni and Romain Giot
                 and Estelle Cherrier and Norman Poh and Andr{\'e}
                 Carlos Ponce de Leon {Ferreira de Carvalho} and
                 Christophe Rosenberger and Najoua Essoukri {Ben
                 Amara}",
  title =        "Adaptive Biometric Systems: Review and Perspectives",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "102:1--102:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3344255",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3344255",
  abstract =     "With the widespread of computing and mobile devices,
                 authentication using biometrics has received greater
                 attention. Although biometric systems usually provide
                 good solutions, the recognition performance tends to be
                 affected over time due to changing conditions and aging
                 of biometric data, which results in intra-class
                 variability. Adaptive biometric systems, which adapt
                 the biometric reference over time, have been proposed
                 to deal with such intra-class variability. This article
                 provides the most up-to-date and complete discussion on
                 adaptive biometrics systems we are aware of, including
                 formalization, terminology, sources or variations that
                 motivates the use of adaptation, adaptation strategies,
                 evaluation methodology, and open challenges. This field
                 of research is sometimes referred to as template
                 update.",
  acknowledgement = ack-nhfb,
  articleno =    "102",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mountantonakis:2019:LSS,
  author =       "Michalis Mountantonakis and Yannis Tzitzikas",
  title =        "Large-scale Semantic Integration of Linked Data: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "103:1--103:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3345551",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3345551",
  abstract =     "A large number of published datasets (or sources) that
                 follow Linked Data principles is currently available
                 and this number grows rapidly. However, the major
                 target of Linked Data, i.e., linking and integration,
                 is not easy to achieve. In general, information
                 integration is difficult, because (a) datasets are
                 produced, kept, or managed by different organizations
                 using different models, schemas, or formats, (b) the
                 same real-world entities or relationships are referred
                 with different URIs or names and in different natural
                 languages, (c) datasets usually contain complementary
                 information, (d) datasets can contain data that are
                 erroneous, out-of-date, or conflicting, (e) datasets
                 even about the same domain may follow different
                 conceptualizations of the domain, (f) everything can
                 change (e.g., schemas, data) as time passes. This
                 article surveys the work that has been done in the area
                 of Linked Data integration, it identifies the main
                 actors and use cases, it analyzes and factorizes the
                 integration process according to various dimensions,
                 and it discusses the methods that are used in each
                 step. Emphasis is given on methods that can be used for
                 integrating several datasets. Based on this analysis,
                 the article concludes with directions that are worth
                 further research.",
  acknowledgement = ack-nhfb,
  articleno =    "103",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Barua:2019:CSC,
  author =       "Hrishav Bakul Barua and Kartick Chandra Mondal",
  title =        "A Comprehensive Survey on Cloud Data Mining {(CDM)}
                 Frameworks and Algorithms",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "104:1--104:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3349265",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3349265",
  abstract =     "Data mining is used for finding meaningful information
                 out of a vast expanse of data. With the advent of Big
                 Data concept, data mining has come to much more
                 prominence. Discovering knowledge out of a gigantic
                 volume of data efficiently is a major concern as the
                 resources are limited. Cloud computing plays a major
                 role in such a situation. Cloud data mining fuses the
                 applicability of classical data mining with the
                 promises of cloud computing. This allows it to perform
                 knowledge discovery out of huge volumes of data with
                 efficiency. This article presents the existing
                 frameworks, services, platforms, and algorithms for
                 cloud data mining. The frameworks and platforms are
                 compared among each other based on similarity, data
                 mining task support, parallelism, distribution,
                 streaming data processing support, fault tolerance,
                 security, memory types, storage systems, and others.
                 Similarly, the algorithms are grouped on the basis of
                 parallelism type, scalability, streaming data mining
                 support, and types of data managed. We have also
                 provided taxonomies on the basis of data mining
                 techniques such as clustering, classification, and
                 association rule mining. We also have attempted to
                 discuss and identify the major applications of cloud
                 data mining. The various taxonomies for cloud data
                 mining frameworks, platforms, and algorithms have been
                 identified. This article aims at gaining better insight
                 into the present research realm and directing the
                 future research toward efficient cloud data mining in
                 future cloud systems.",
  acknowledgement = ack-nhfb,
  articleno =    "104",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mademlis:2019:AUC,
  author =       "Ioannis Mademlis and Nikos Nikolaidis and Anastasios
                 Tefas and Ioannis Pitas and Tilman Wagner and Alberto
                 Messina",
  title =        "Autonomous {UAV} Cinematography: a Tutorial and a
                 Formalized Shot-Type Taxonomy",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "105:1--105:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3347713",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3347713",
  abstract =     "The emerging field of autonomous UAV cinematography is
                 examined through a tutorial for non-experts, which also
                 presents the required underlying technologies and
                 connections with different UAV application domains.
                 Current industry practices are formalized by presenting
                 a UAV shot-type taxonomy composed of framing shot
                 types, single-UAV camera motion types, and multiple-UAV
                 camera motion types. Visually pleasing combinations of
                 framing shot types and camera motion types are
                 identified, while the presented camera motion types are
                 modeled geometrically and graded into distinct energy
                 consumption classes and required technology complexity
                 levels for autonomous capture. Two specific strategies
                 are prescribed, namely focal length compensation and
                 multidrone compensation, for partially overcoming a
                 number of issues arising in UAV live outdoor event
                 coverage, deemed as the most complex UAV cinematography
                 scenario. Finally, the shot types compatible with each
                 compensation strategy are explicitly identified.
                 Overall, this tutorial both familiarizes readers coming
                 from different backgrounds with the topic in a
                 structured manner and lays necessary groundwork for
                 future advancements.",
  acknowledgement = ack-nhfb,
  articleno =    "105",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{K:2019:VST,
  author =       "Vivekraj V. K. and Debashis Sen and Balasubramanian
                 Raman",
  title =        "Video Skimming: Taxonomy and Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "106:1--106:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3347712",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3347712",
  abstract =     "Video skimming, also known as dynamic video
                 summarization, generates a temporally abridged version
                 of a given video. Skimming can be achieved by
                 identifying significant components either in uni-modal
                 or multi-modal features extracted from the video. Being
                 dynamic in nature, video skimming, through temporal
                 connectivity, allows better understanding of the video
                 from its summary. Having this obvious advantage,
                 recently, video skimming has drawn the focus of many
                 researchers benefiting from the easy availability of
                 the required computing resources. In this article, we
                 provide a comprehensive survey on video skimming
                 focusing on the substantial amount of literature from
                 the past decade. We present a taxonomy of video
                 skimming approaches and discuss their evolution
                 highlighting key advances. We also provide a study on
                 the components required for the evaluation of a video
                 skimming performance.",
  acknowledgement = ack-nhfb,
  articleno =    "106",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lorena:2019:HCY,
  author =       "Ana C. Lorena and Lu{\'\i}s P. F. Garcia and Jens
                 Lehmann and Marcilio C. P. Souto and Tin Kam Ho",
  title =        "How Complex Is Your Classification Problem?: a Survey
                 on Measuring Classification Complexity",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "107:1--107:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3347711",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3347711",
  abstract =     "Characteristics extracted from the training datasets
                 of classification problems have proven to be effective
                 predictors in a number of meta-analyses. Among them,
                 measures of classification complexity can be used to
                 estimate the difficulty in separating the data points
                 into their expected classes. Descriptors of the spatial
                 distribution of the data and estimates of the shape and
                 size of the decision boundary are among the known
                 measures for this characterization. This information
                 can support the formulation of new data-driven
                 pre-processing and pattern recognition techniques,
                 which can in turn be focused on challenges highlighted
                 by such characteristics of the problems. This article
                 surveys and analyzes measures that can be extracted
                 from the training datasets to characterize the
                 complexity of the respective classification problems.
                 Their use in recent literature is also reviewed and
                 discussed, allowing to prospect opportunities for
                 future work in the area. Finally, descriptions are
                 given on an R package named Extended Complexity Library
                 (ECoL) that implements a set of complexity measures and
                 is made publicly available.",
  acknowledgement = ack-nhfb,
  articleno =    "107",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Wu:2020:CPM,
  author =       "Caesar Wu and Rajkumar Buyya and Kotagiri
                 Ramamohanarao",
  title =        "Cloud Pricing Models: Taxonomy, Survey, and
                 Interdisciplinary Challenges",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "108:1--108:??",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3342103",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3342103",
  abstract =     "This article provides a systematic review of cloud
                 pricing in an interdisciplinary approach. It examines
                 many historical cases of pricing in practice and tracks
                 down multiple roots of pricing in research. The aim is
                 to help both cloud service provider (CSP) and cloud
                 customers to capture the essence of cloud pricing when
                 they need to make a critical decision either to achieve
                 competitive advantages or to manage cloud resource
                 effectively. Currently, the number of available pricing
                 schemes in the cloud market is overwhelming. It is an
                 intricate issue to understand these schemes and
                 associated pricing models clearly due to involving
                 several domains of knowledge, such as cloud
                 technologies, microeconomics, operations research, and
                 value theory. Some earlier studies have introduced this
                 topic unsystematically. Their approaches inevitably
                 lead to much confusion for many cloud decision-makers.
                 To address their weaknesses, we present a comprehensive
                 taxonomy of cloud pricing, which is driven by a
                 framework of three fundamental pricing strategies that
                 are built on nine cloud pricing categories. These
                 categories can be further mapped onto a total of 60
                 pricing models. Many of the pricing models have been
                 already adopted by CSPs. Others have been widespread
                 across in other industries. We give descriptions of
                 these model categories and highlight both advantages
                 and disadvantages. Moreover, this article offers an
                 extensive survey of many cloud pricing models that were
                 proposed by many researchers during the past decade.
                 Based on the survey, we identify four trends of cloud
                 pricing and the general direction, which is moving from
                 intrinsic value per physical box to extrinsic value per
                 serverless sandbox. We conclude that hyper-converged
                 cloud resources pool supported by cloud orchestration,
                 virtual machine, Open Application Programming
                 Interface, and serverless sandbox will drive the future
                 of cloud pricing.",
  acknowledgement = ack-nhfb,
  articleno =    "108",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Binmakhashen:2020:DLA,
  author =       "Galal M. Binmakhashen and Sabri A. Mahmoud",
  title =        "Document Layout Analysis: a Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "109:1--109:??",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3355610",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3355610",
  abstract =     "Document layout analysis (DLA) is a preprocessing step
                 of document understanding systems. It is responsible
                 for detecting and annotating the physical structure of
                 documents. DLA has several important applications such
                 as document retrieval, content categorization, text
                 recognition, and the like. The objective of DLA is to
                 ease the subsequent analysis/recognition phases by
                 identifying the document-homogeneous blocks and by
                 determining their relationships. The DLA pipeline
                 consists of several phases that could vary among DLA
                 methods, depending on the documents' layouts and final
                 analysis objectives. In this regard, a universal DLA
                 algorithm that fits all types of document-layouts or
                 that satisfies all analysis objectives has not been
                 developed, yet. In this survey paper, we present a
                 critical study of different document layout analysis
                 techniques. The study highlights the motivational
                 reasons for pursuing DLA and discusses comprehensively
                 the different phases of the DLA algorithms based on a
                 general framework that is formed as an outcome of
                 reviewing the research in the field. The DLA framework
                 consists of preprocessing, layout analysis strategies,
                 post-processing, and performance evaluation phases.
                 Overall, the article delivers an essential baseline for
                 pursuing further research in document layout
                 analysis.",
  acknowledgement = ack-nhfb,
  articleno =    "109",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{DeGuzman:2020:SPA,
  author =       "Jaybie A. {De Guzman} and Kanchana Thilakarathna and
                 Aruna Seneviratne",
  title =        "Security and Privacy Approaches in Mixed Reality: a
                 Literature Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "110:1--110:??",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3359626",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3359626",
  abstract =     "Mixed reality (MR) technology development is now
                 gaining momentum due to advances in computer vision,
                 sensor fusion, and realistic display technologies. With
                 most of the research and development focused on
                 delivering the promise of MR, the privacy and security
                 implications of this technology are yet to be
                 thoroughly investigated. This survey article aims to
                 put in to light these risks and to look into the latest
                 security and privacy work on MR. Specifically, we list
                 and review the different protection approaches that
                 have been proposed to ensure user and data security and
                 privacy in MR. We extend the scope to include work on
                 related technologies such as augmented reality, virtual
                 reality, and human-computer interaction as crucial
                 components, if not the origins, of MR, as well as
                 numerous related work from the larger area of mobile
                 devices, wearables, and Internet-of-Things. We
                 highlight the lack of investigation, implementation,
                 and evaluation of data protection approaches in MR.
                 Further challenges and directions on MR security and
                 privacy are also discussed.",
  acknowledgement = ack-nhfb,
  articleno =    "110",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Usman:2020:SRL,
  author =       "Muhammad Usman and Mian Ahmad Jan and Xiangjian He and
                 Jinjun Chen",
  title =        "A Survey on Representation Learning Efforts in
                 Cybersecurity Domain",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "111:1--111:??",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3331174",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3331174",
  abstract =     "In this technology-based era, network-based systems
                 are facing new cyber-attacks on daily bases.
                 Traditional cybersecurity approaches are based on old
                 threat-knowledge databases and need to be updated on a
                 daily basis to stand against new generation of
                 cyber-threats and protect underlying network-based
                 systems. Along with updating threat-knowledge
                 databases, there is a need for proper management and
                 processing of data generated by sensitive real-time
                 applications. In recent years, various computing
                 platforms based on representation learning algorithms
                 have emerged as a useful resource to manage and exploit
                 the generated data to extract meaningful information.
                 If these platforms are properly utilized, then strong
                 cybersecurity systems can be developed to protect the
                 underlying network-based systems and support sensitive
                 real-time applications. In this survey, we highlight
                 various cyber-threats, real-life examples, and
                 initiatives taken by various international
                 organizations. We discuss various computing platforms
                 based on representation learning algorithms to process
                 and analyze the generated data. We highlight various
                 popular datasets introduced by well-known global
                 organizations that can be used to train the
                 representation learning algorithms to predict and
                 detect threats. We also provide an in-depth analysis of
                 research efforts based on representation learning
                 algorithms made in recent years to protect the
                 underlying network-based systems against current
                 cyber-threats. Finally, we highlight various
                 limitations and challenges in these efforts and
                 available datasets that need to be considered when
                 using them to build cybersecurity systems.",
  acknowledgement = ack-nhfb,
  articleno =    "111",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Foltynek:2020:APD,
  author =       "Tom{\'a}s Folt{\'y}nek and Norman Meuschke and Bela
                 Gipp",
  title =        "Academic Plagiarism Detection: a Systematic Literature
                 Review",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "112:1--112:??",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3345317",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3345317",
  abstract =     "This article summarizes the research on computational
                 methods to detect academic plagiarism by systematically
                 reviewing 239 research papers published between 2013
                 and 2018. To structure the presentation of the research
                 contributions, we propose novel technically oriented
                 typologies for plagiarism prevention and detection
                 efforts, the forms of academic plagiarism, and
                 computational plagiarism detection methods. We show
                 that academic plagiarism detection is a highly active
                 research field. Over the period we review, the field
                 has seen major advances regarding the automated
                 detection of strongly obfuscated and thus
                 hard-to-identify forms of academic plagiarism. These
                 improvements mainly originate from better semantic text
                 analysis methods, the investigation of non-textual
                 content features, and the application of machine
                 learning. We identify a research gap in the lack of
                 methodologically thorough performance evaluations of
                 plagiarism detection systems. Concluding from our
                 analysis, we see the integration of heterogeneous
                 analysis methods for textual and non-textual content
                 features using machine learning as the most promising
                 area for future research contributions to improve the
                 detection of academic plagiarism further.",
  acknowledgement = ack-nhfb,
  articleno =    "112",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lilis:2020:SML,
  author =       "Yannis Lilis and Anthony Savidis",
  title =        "A Survey of Metaprogramming Languages",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "113:1--113:??",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3354584",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3354584",
  abstract =     "Metaprogramming is the process of writing computer
                 programs that treat programs as data, enabling them to
                 analyze or transform existing programs or generate new
                 ones. While the concept of metaprogramming has existed
                 for several decades, activities focusing on
                 metaprogramming have been increasing rapidly over the
                 past few years, with most languages offering some
                 metaprogramming support and the amount of metacode
                 being developed growing exponentially. In this article,
                 we introduce a taxonomy of metaprogramming languages
                 and present a survey of metaprogramming languages and
                 systems based on the taxonomy. Our classification is
                 based on the metaprogramming model adopted by the
                 language, the phase of the metaprogram evaluation, the
                 metaprogram source location, and the relation between
                 the metalanguage and the object language.",
  acknowledgement = ack-nhfb,
  articleno =    "113",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ngo:2020:SIS,
  author =       "Anh Cat Le Ngo and Rapha{\"e}l C.-W. Phan",
  title =        "Seeing the Invisible: Survey of Video Motion
                 Magnification and Small Motion Analysis",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "114:1--114:??",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3355389",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3355389",
  abstract =     "The latest techniques in video motion magnification
                 and relevant small motion analysis are surveyed. The
                 main motion magnification techniques are discussed in
                 chronological fashion, highlighting the inherent
                 limitations of predecessor techniques in comparison
                 with subsequent variants. The focus is then shifted to
                 the specific stages within the motion magnification
                 framework to discuss advancements that have been
                 proposed in the literature, namely for spatial
                 decomposition and for emphasizing, representing, and
                 distinguishing different motion signals. The survey
                 concludes with a treatment of different problems in
                 varying application contexts that have benefited from
                 motion magnification and small motion analysis.",
  acknowledgement = ack-nhfb,
  articleno =    "114",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Aafaq:2020:VDS,
  author =       "Nayyer Aafaq and Ajmal Mian and Wei Liu and Syed
                 Zulqarnain Gilani and Mubarak Shah",
  title =        "Video Description: a Survey of Methods, Datasets, and
                 Evaluation Metrics",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "115:1--115:??",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3355390",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3355390",
  abstract =     "Video description is the automatic generation of
                 natural language sentences that describe the contents
                 of a given video. It has applications in human-robot
                 interaction, helping the visually impaired and video
                 subtitling. The past few years have seen a surge of
                 research in this area due to the unprecedented success
                 of deep learning in computer vision and natural
                 language processing. Numerous methods, datasets, and
                 evaluation metrics have been proposed in the
                 literature, calling the need for a comprehensive survey
                 to focus research efforts in this flourishing new
                 direction. This article fills the gap by surveying the
                 state-of-the-art approaches with a focus on deep
                 learning models; comparing benchmark datasets in terms
                 of their domains, number of classes, and repository
                 size; and identifying the pros and cons of various
                 evaluation metrics, such as SPICE, CIDEr, ROUGE, BLEU,
                 METEOR, and WMD. Classical video description approaches
                 combined subject, object, and verb detection with
                 template-based language models to generate sentences.
                 However, the release of large datasets revealed that
                 these methods cannot cope with the diversity in
                 unconstrained open domain videos. Classical approaches
                 were followed by a very short era of statistical
                 methods that were soon replaced with deep learning, the
                 current state-of-the-art in video description. Our
                 survey shows that despite the fast-paced developments,
                 video description research is still in its infancy due
                 to the following reasons: Analysis of video description
                 models is challenging, because it is difficult to
                 ascertain the contributions towards accuracy or errors
                 of the visual features and the adopted language model
                 in the final description. Existing datasets neither
                 contain adequate visual diversity nor complexity of
                 linguistic structures. Finally, current evaluation
                 metrics fall short of measuring the agreement between
                 machine-generated descriptions with that of humans. We
                 conclude our survey by listing promising future
                 research directions.",
  acknowledgement = ack-nhfb,
  articleno =    "115",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Basavarajaiah:2020:SCD,
  author =       "Madhushree Basavarajaiah and Priyanka Sharma",
  title =        "Survey of Compressed Domain Video Summarization
                 Techniques",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "116:1--116:29",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3355398",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3355398",
  abstract =     "Video summarization is the method of extracting key
                 frames or clips from a video to generate a synopsis of
                 the content of the video. Generally, video is
                 compressed before storing or transmitting it in most of
                 the practical applications. Traditional techniques
                 require the videos to be decoded to summarize them,
                 which is a tedious job. Instead, compressed domain
                 video processing can be used for summarizing videos by
                 partially decoding them. A classification and analysis
                 of various summarization techniques are presented in
                 this article with special focus on compressed domain
                 techniques along with a discussion on
                 machine-learning-based techniques that can be applied
                 to summarize the videos.",
  acknowledgement = ack-nhfb,
  articleno =    "116",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gleirscher:2020:NOI,
  author =       "Mario Gleirscher and Simon Foster and Jim Woodcock",
  title =        "New Opportunities for Integrated Formal Methods",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "117:1--117:??",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3357231",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3357231",
  abstract =     "Formal methods have provided approaches for
                 investigating software engineering fundamentals and
                 also have high potential to improve current practices
                 in dependability assurance. In this article, we
                 summarise known strengths and weaknesses of formal
                 methods. From the perspective of the assurance of
                 robots and autonomous systems (RAS), we highlight new
                 opportunities for integrated formal methods and
                 identify threats to the adoption of such methods. Based
                 on these opportunities and threats, we develop an
                 agenda for fundamental and empirical research on
                 integrated formal methods and for successful transfer
                 of validated research to RAS assurance. Furthermore, we
                 outline our expectations on useful outcomes of such an
                 agenda.",
  acknowledgement = ack-nhfb,
  articleno =    "117",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2020:SCG,
  author =       "Leibo Liu and Jianfeng Zhu and Zhaoshi Li and Yanan Lu
                 and Yangdong Deng and Jie Han and Shouyi Yin and
                 Shaojun Wei",
  title =        "A Survey of Coarse-Grained Reconfigurable Architecture
                 and Design: Taxonomy, Challenges, and Applications",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "118:1--118:??",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3357375",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3357375",
  abstract =     "As general-purpose processors have hit the power wall
                 and chip fabrication cost escalates alarmingly,
                 coarse-grained reconfigurable architectures (CGRAs) are
                 attracting increasing interest from both academia and
                 industry, because they offer the performance and energy
                 efficiency of hardware with the flexibility of
                 software. However, CGRAs are not yet mature in terms of
                 programmability, productivity, and adaptability. This
                 article reviews the architecture and design of CGRAs
                 thoroughly for the purpose of exploiting their full
                 potential. First, a novel multidimensional taxonomy is
                 proposed. Second, major challenges and the
                 corresponding state-of-the-art techniques are surveyed
                 and analyzed. Finally, the future development is
                 discussed.",
  acknowledgement = ack-nhfb,
  articleno =    "118",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Joshi:2020:STB,
  author =       "Aditya Joshi and Sarvnaz Karimi and Ross Sparks and
                 C{\'e}cile Paris and C. Raina Macintyre",
  title =        "Survey of Text-based Epidemic Intelligence: a
                 Computational Linguistics Perspective",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "119:1--119:??",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3361141",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3361141",
  abstract =     "Epidemic intelligence deals with the detection of
                 outbreaks using formal (such as hospital records) and
                 informal sources (such as user-generated text on the
                 web) of information. In this survey, we discuss
                 approaches for epidemic intelligence that use textual
                 datasets, referring to it as ``text-based epidemic
                 intelligence.'' We view past work in terms of two broad
                 categories: health mention classification (selecting
                 relevant text from a large volume) and health event
                 detection (predicting epidemic events from a collection
                 of relevant text). The focus of our discussion is the
                 underlying computational linguistic techniques in the
                 two categories. The survey also provides details of the
                 state of the art in annotation techniques, resources,
                 and evaluation strategies for epidemic intelligence.",
  acknowledgement = ack-nhfb,
  articleno =    "119",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Humbert:2020:SIP,
  author =       "Mathias Humbert and Benjamin Trubert and K{\'e}vin
                 Huguenin",
  title =        "A Survey on Interdependent Privacy",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "122:1--122:??",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3360498",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3360498",
  abstract =     "The privacy of individuals does not only depend on
                 their own actions and data but may also be affected by
                 the privacy decisions and by the data shared by other
                 individuals. This interdependence is an essential
                 aspect of privacy and ignoring it can lead to serious
                 privacy violations. In this survey, we summarize and
                 analyze research on interdependent privacy risks and on
                 the associated (cooperative and non-cooperative)
                 solutions. We also demonstrate that interdependent
                 privacy has been studied in isolation in different
                 research communities. By doing so, we systematize
                 knowledge on interdependent privacy research and
                 provide insights on how this research should be
                 conducted and which challenges it should address.",
  acknowledgement = ack-nhfb,
  articleno =    "122",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ren:2020:SEE,
  author =       "Ju Ren and Deyu Zhang and Shiwen He and Yaoxue Zhang
                 and Tao Li",
  title =        "A Survey on End-Edge-Cloud Orchestrated Network
                 Computing Paradigms: Transparent Computing, Mobile Edge
                 Computing, Fog Computing, and Cloudlet",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "125:1--125:??",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3362031",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3362031",
  abstract =     "Sending data to the cloud for analysis was a prominent
                 trend during the past decades, driving cloud computing
                 as a dominant computing paradigm. However, the
                 dramatically increasing number of devices and data
                 traffic in the Internet-of-Things (IoT) era are posing
                 significant burdens on the capacity-limited Internet
                 and uncontrollable service delay. It becomes difficult
                 to meet the delay-sensitive and context-aware service
                 requirements of IoT applications by using cloud
                 computing alone. Facing these challenges, computing
                 paradigms are shifting from the centralized cloud
                 computing to distributed edge computing. Several new
                 computing paradigms, including Transparent Computing,
                 Mobile Edge Computing, Fog Computing, and Cloudlet,
                 have emerged to leverage the distributed resources at
                 network edge to provide timely and context-aware
                 services. By integrating end devices, edge servers, and
                 cloud, they form a hierarchical IoT architecture, i.e.,
                 End-Edge-Cloud orchestrated architecture to improve the
                 performance of IoT systems. This article presents a
                 comprehensive survey of these emerging computing
                 paradigms from the perspective of end-edge-cloud
                 orchestration. Specifically, we first introduce and
                 compare the architectures and characteristics of
                 different computing paradigms. Then, a comprehensive
                 survey is presented to discuss state-of-the-art
                 research in terms of computation offloading, caching,
                 security, and privacy. Finally, some potential research
                 directions are envisioned for fostering continuous
                 research efforts.",
  acknowledgement = ack-nhfb,
  articleno =    "125",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Afianian:2020:MDA,
  author =       "Amir Afianian and Salman Niksefat and Babak Sadeghiyan
                 and David Baptiste",
  title =        "Malware Dynamic Analysis Evasion Techniques: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "1--28",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3365001",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jan 22 11:51:16 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3365001",
  abstract =     "The cyber world is plagued with ever-evolving malware
                 that readily infiltrate all defense mechanisms, operate
                 viciously unbeknownst to the user, and surreptitiously
                 exfiltrate sensitive data. Understanding the inner
                 workings of such malware provides a \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "126",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Leite:2020:SDC,
  author =       "Leonardo Leite and Carla Rocha and Fabio Kon and Dejan
                 Milojicic and Paulo Meirelles",
  title =        "A Survey of {DevOps} Concepts and Challenges",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "1--35",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3359981",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jan 22 11:51:16 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3359981",
  abstract =     "DevOpsis a collaborative and multidisciplinary
                 organizational effort to automate continuous delivery
                 of new software updates while guaranteeing their
                 correctness and reliability. The present survey
                 investigates and discusses DevOps challenges from the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "127",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bridges:2020:SID,
  author =       "Robert A. Bridges and Tarrah R. Glass-Vanderlan and
                 Michael D. Iannacone and Maria S. Vincent and Qian
                 (Guenevere) Chen",
  title =        "A Survey of Intrusion Detection Systems Leveraging
                 Host Data",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "1--35",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3344382",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jan 22 11:51:16 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3344382",
  abstract =     "This survey focuses on intrusion detection systems
                 (IDS) that leverage host-based data sources for
                 detecting attacks on enterprise network. The host-based
                 IDS (HIDS) literature is organized by the input data
                 source, presenting targeted sub-surveys of \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "128",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Thilakaratne:2020:SRL,
  author =       "Menasha Thilakaratne and Katrina Falkner and Thushari
                 Atapattu",
  title =        "A Systematic Review on Literature-based Discovery:
                 General Overview, Methodology, \& Statistical
                 Analysis",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "1--34",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3365756",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jan 22 11:51:16 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3365756",
  abstract =     "The vast nature of scientific publications brings out
                 the importance of Literature-Based Discovery (LBD)
                 research that is highly beneficial to accelerate
                 knowledge acquisition and the research development
                 process. LBD is a knowledge discovery workflow
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "129",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Saini:2020:HSS,
  author =       "Mukesh Kumar Saini and Neeraj Goel",
  title =        "How Smart Are Smart Classrooms? {A} Review of Smart
                 Classroom Technologies",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "1--28",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3365757",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jan 22 11:51:16 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3365757",
  abstract =     "There has been a large amount of work on smart
                 classrooms spanning over a wide range of research areas
                 including information communication technology, machine
                 learning, sensor networks, mobile computing, and
                 hardware. Consequently, there have been \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "130",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Drobyshevskiy:2020:RGM,
  author =       "Mikhail Drobyshevskiy and Denis Turdakov",
  title =        "Random Graph Modeling: a Survey of the Concepts",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "6",
  pages =        "1--36",
  month =        jan,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3369782",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jan 22 11:51:16 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3369782",
  abstract =     "Random graph (RG) models play a central role in
                 complex networks analysis. They help us to understand,
                 control, and predict phenomena occurring, for instance,
                 in social networks, biological networks, the Internet,
                 and so on. Despite a large number of RG \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "131",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bae:2020:ICC,
  author =       "Juhee Bae and Tove Helldin and Maria Riveiro and
                 S{\l}awomir Nowaczyk and Mohamed-Rafik Bouguelia and
                 G{\"o}ran Falkman",
  title =        "Interactive Clustering: a Comprehensive Review",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "1:1--1:39",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3340960",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3340960",
  abstract =     "In this survey, 105 papers related to interactive
                 clustering were reviewed according to seven
                 perspectives: (1) on what level is the interaction
                 happening, (2) which interactive operations are
                 involved, (3) how user feedback is incorporated, (4)
                 how \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fan:2020:DTM,
  author =       "Xinxin Fan and Ling Liu and Rui Zhang and Quanliang
                 Jing and Jingping Bi",
  title =        "Decentralized Trust Management: Risk Analysis and
                 Trust Aggregation",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "2:1--2:33",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3362168",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3362168",
  abstract =     "Decentralized trust management is used as a referral
                 benchmark for assisting decision making by human or
                 intelligence machines in open collaborative systems.
                 During any given period of time, each participant may
                 only interact with a few other \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mayer:2020:SDL,
  author =       "Ruben Mayer and Hans-Arno Jacobsen",
  title =        "Scalable Deep Learning on Distributed Infrastructures:
                 Challenges, Techniques, and Tools",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "3:1--3:37",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3363554",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3363554",
  abstract =     "Deep Learning (DL) has had an immense success in the
                 recent past, leading to state-of-the-art results in
                 various domains, such as image recognition and natural
                 language processing. One of the reasons for this
                 success is the increasing size of DL models \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2020:SCT,
  author =       "Junjie Chen and Jibesh Patra and Michael Pradel and
                 Yingfei Xiong and Hongyu Zhang and Dan Hao and Lu
                 Zhang",
  title =        "A Survey of Compiler Testing",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "4:1--4:36",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3363562",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3363562",
  abstract =     "Virtually any software running on a computer has been
                 processed by a compiler or a compiler-like tool.
                 Because compilers are such a crucial piece of
                 infrastructure for building software, their correctness
                 is of paramount importance. To validate and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Randal:2020:IVR,
  author =       "Allison Randal",
  title =        "The Ideal Versus the Real: Revisiting the History of
                 Virtual Machines and Containers",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "5:1--5:31",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3365199",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3365199",
  abstract =     "The common perception in both academic literature and
                 industry today is that virtual machines offer better
                 security, whereas containers offer better performance.
                 However, a detailed review of the history of these
                 technologies and the current threats they face reveals
                 a different story. This survey covers key developments
                 in the evolution of virtual machines and containers
                 from the 1950s to today, with an emphasis on countering
                 modern misperceptions with accurate historical details
                 and providing a solid foundation for ongoing research
                 into the future of secure isolation for multitenant
                 infrastructures, such as cloud and container
                 deployments.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Paulino:2020:IPE,
  author =       "Nuno Paulino and Jo{\~a}o Canas Ferreira and Jo{\~a}o
                 M. P. Cardoso",
  title =        "Improving Performance and Energy Consumption in
                 Embedded Systems via Binary Acceleration: a Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "6:1--6:36",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3369764",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3369764",
  abstract =     "The breakdown of Dennard scaling has resulted in a
                 decade-long stall of the maximum operating clock
                 frequencies of processors. To mitigate this issue,
                 computing shifted to multi-core devices. This
                 introduced the need for programming flows and tools
                 that \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Razis:2020:MIS,
  author =       "Gerasimos Razis and Ioannis Anagnostopoulos and
                 Sherali Zeadally",
  title =        "Modeling Influence with Semantics in Social Networks:
                 a Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "7:1--7:38",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3369780",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3369780",
  abstract =     "The discovery of influential entities in all kinds of
                 networks (e.g., social, digital, or computer) has
                 always been an important field of study. In recent
                 years, Online Social Networks (OSNs) have been
                 established as a basic means of communication and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Etemad:2020:GDD,
  author =       "Mohammad Etemad and Alptekin K{\"u}p{\c{c}}{\"u}",
  title =        "Generic Dynamic Data Outsourcing Framework for
                 Integrity Verification",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "8:1--8:32",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3365998",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3365998",
  abstract =     "Ateniese et al. proposed the Provable Data Possession
                 (PDP) model in 2007. Following that, Erway et al.
                 adapted the model for dynamically updatable data and
                 called it the Dynamic Provable Data Possession (DPDP)
                 model. The idea is that a client \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kolb:2020:CCC,
  author =       "John Kolb and Moustafa AbdelBaky and Randy H. Katz and
                 David E. Culler",
  title =        "Core Concepts, Challenges, and Future Directions in
                 Blockchain: a Centralized Tutorial",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "9:1--9:39",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3366370",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3366370",
  abstract =     "Blockchains are a topic of immense interest in
                 academia and industry, but their true nature is often
                 obscured by marketing and hype. In this tutorial, we
                 explain the fundamental elements of blockchains. We
                 discuss their ability to achieve availability,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hilman:2020:MWS,
  author =       "Muhammad H. Hilman and Maria A. Rodriguez and Rajkumar
                 Buyya",
  title =        "Multiple Workflows Scheduling in Multi-tenant
                 Distributed Systems: a Taxonomy and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "10:1--10:39",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3368036",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3368036",
  abstract =     "Workflows are an application model that enables the
                 automated execution of multiple interdependent and
                 interconnected tasks. They are widely used by the
                 scientific community to manage the distributed
                 execution and dataflow of complex simulations and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2020:DLB,
  author =       "Dong Liu and Yue Li and Jianping Lin and Houqiang Li
                 and Feng Wu",
  title =        "Deep Learning-Based Video Coding: a Review and a Case
                 Study",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "11:1--11:35",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3368405",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3368405",
  abstract =     "The past decade has witnessed the great success of
                 deep learning in many disciplines, especially in
                 computer vision and image processing. However, deep
                 learning-based video coding remains in its infancy. We
                 review the representative works about using \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kucuk:2020:SDS,
  author =       "Dilek K{\"u}{\c{c}}{\"u}k and Fazli Can",
  title =        "Stance Detection: a Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "12:1--12:37",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3369026",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3369026",
  abstract =     "Automatic elicitation of semantic information from
                 natural language texts is an important research problem
                 with many practical application areas. Especially after
                 the recent proliferation of online content through
                 channels such as social media sites, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yasuda:2020:AVN,
  author =       "Yuri D. V. Yasuda and Luiz Eduardo G. Martins and
                 Fabio A. M. Cappabianco",
  title =        "Autonomous Visual Navigation for Mobile Robots: a
                 Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "13:1--13:34",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3368961",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3368961",
  abstract =     "Autonomous mobile robots are required to move
                 throughout map the environment, locate themselves, and
                 plan paths between positions. Vision stands out among
                 the other senses for its richness and practicality.
                 Even though there are well-established \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Suran:2020:FCI,
  author =       "Shweta Suran and Vishwajeet Pattanaik and Dirk
                 Draheim",
  title =        "Frameworks for Collective Intelligence: a Systematic
                 Literature Review",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "14:1--14:36",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3368986",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3368986",
  abstract =     "Over the last few years, Collective Intelligence (CI)
                 platforms have become a vital resource for learning,
                 problem solving, decision-making, and predictions. This
                 rising interest in the topic has to led to the
                 development of several models and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mallawaarachchi:2020:CDN,
  author =       "Vijini Mallawaarachchi and Lakmal Meegahapola and
                 Roshan Madhushanka and Eranga Heshan and Dulani
                 Meedeniya and Sampath Jayarathna",
  title =        "Change Detection and Notification of {Web} Pages: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "15:1--15:35",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3369876",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3369876",
  abstract =     "The majority of currently available webpages are
                 dynamic in nature and are changing frequently. New
                 content gets added to webpages, and existing content
                 gets updated or deleted. Hence, people find it useful
                 to be alert for changes in webpages that \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Vieira:2020:FPP,
  author =       "Marcos A. M. Vieira and Matheus S. Castanho and Racyus
                 D. G. Pac{\'\i}fico and Elerson R. S. Santos and
                 Eduardo P. M. C{\^a}mara J{\'u}nior and Luiz F. M.
                 Vieira",
  title =        "Fast Packet Processing with {eBPF} and {XDP}:
                 Concepts, Code, Challenges, and Applications",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "16:1--16:36",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3371038",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3371038",
  abstract =     "Extended Berkeley Packet Filter (eBPF) is an
                 instruction set and an execution environment inside the
                 Linux kernel. It enables modification, interaction, and
                 kernel programmability at runtime. eBPF can be used to
                 program the eXpress Data Path (XDP), a \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Landau:2020:MYM,
  author =       "Ofir Landau and Rami Puzis and Nir Nissim",
  title =        "Mind Your Mind: {EEG}-Based Brain--Computer Interfaces
                 and Their Security in Cyber Space",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "17:1--17:38",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3372043",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3372043",
  abstract =     "A brain-computer interface (BCI) system is a system
                 that leverages brainwave information acquired by a
                 designated brain monitoring device to interact with a
                 computerized system. Over the past 40 years, many BCI
                 applications have been developed in a \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lao:2020:SIA,
  author =       "Laphou Lao and Zecheng Li and Songlin Hou and Bin Xiao
                 and Songtao Guo and Yuanyuan Yang",
  title =        "A Survey of {IoT} Applications in Blockchain Systems:
                 Architecture, Consensus, and Traffic Modeling",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "18:1--18:32",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3372136",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3372136",
  abstract =     "Blockchain technology can be extensively applied in
                 diverse services, including online micro-payments,
                 supply chain tracking, digital forensics, health-care
                 record sharing, and insurance payments. Extending the
                 technology to the Internet of things (IoT),. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Brais:2020:SCS,
  author =       "Hadi Brais and Rajshekar Kalayappan and Preeti Ranjan
                 Panda",
  title =        "A Survey of Cache Simulators",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "19:1--19:32",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3372393",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3372393",
  abstract =     "Computer architecture simulation tools are essential
                 for implementing and evaluating new ideas in the domain
                 and can be useful for understanding the behavior of
                 programs and finding microarchitectural bottlenecks.
                 One particularly important part of \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kaloudi:2020:ABC,
  author =       "Nektaria Kaloudi and Jingyue Li",
  title =        "The {AI}-Based Cyber Threat Landscape: a Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "20:1--20:34",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3372823",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3372823",
  abstract =     "Recent advancements in artificial intelligence (AI)
                 technologies have induced tremendous growth in
                 innovation and automation. Although these AI
                 technologies offer significant benefits, they can be
                 used maliciously. Highly targeted and evasive attacks
                 in \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Luo:2020:SCS,
  author =       "Chu Luo and Jorge Goncalves and Eduardo Velloso and
                 Vassilis Kostakos",
  title =        "A Survey of Context Simulation for Testing Mobile
                 Context-Aware Applications",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "21:1--21:39",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3372788",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3372788",
  abstract =     "Equipped with an abundance of small-scale
                 microelectromechanical sensors, modern mobile devices
                 such as smartphones and smartwatches can now offer
                 context-aware services to users in mobile environments.
                 Although advances in mobile context-aware \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cini:2020:MCR,
  author =       "Nevin Cini and Gulay Yalcin",
  title =        "A Methodology for Comparing the Reliability of
                 {GPU}-Based and {CPU}-Based {HPCs}",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "1",
  pages =        "22:1--22:33",
  month =        may,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3372790",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat May 30 20:55:29 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3372790",
  abstract =     "Today, GPUs are widely used as
                 coprocessors/accelerators in High-Performance
                 Heterogeneous Computing due to their many advantages.
                 However, many researches emphasize that GPUs are not as
                 reliable as desired yet. Despite the fact that GPUs are
                 more \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Heldens:2020:LER,
  author =       "Stijn Heldens and Pieter Hijma and Ben {Van Werkhoven}
                 and Jason Maassen and Adam S. Z. Belloum and Rob V.
                 {Van Nieuwpoort}",
  title =        "The Landscape of Exascale Research: a Data-Driven
                 Literature Analysis",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "23:1--23:43",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3372390",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3372390",
  abstract =     "The next generation of supercomputers will break the
                 exascale barrier. Soon we will have systems capable of
                 at least one quintillion (billion billion)
                 floating-point operations per second (10$^{18}$ FLOPS).
                 Tremendous amounts of work have been invested into
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sahni:2020:MED,
  author =       "Sartaj Sahni and Albert Y. Zomaya",
  title =        "In Memoriam {Eliezer Dekel} (1948--2020)",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "23:1--23:2",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3389414",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3389414",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rai:2020:SCM,
  author =       "Sunny Rai and Shampa Chakraverty",
  title =        "A Survey on Computational Metaphor Processing",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "24:1--24:37",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3373265",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3373265",
  abstract =     "In the last decade, the problem of computational
                 metaphor processing has garnered immense attention from
                 the domains of computational linguistics and cognition.
                 A wide panorama of approaches, ranging from a
                 hand-coded rule system to deep learning \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sequeiros:2020:ASM,
  author =       "Jo{\~a}o B. F. Sequeiros and Francisco T. Chimuco and
                 Musa G. Samaila and M{\'a}rio M. Freire and Pedro R. M.
                 In{\'a}cio",
  title =        "Attack and System Modeling Applied to {IoT}, Cloud,
                 and Mobile Ecosystems: Embedding Security by Design",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "25:1--25:32",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3376123",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3376123",
  abstract =     "Over the years, pervasive computing and communication
                 technologies have enabled the emergence of new
                 computing paradigms that have gained importance across
                 a wide spectrum of domains. The three most notable that
                 have witnessed significant advancements \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cong:2020:SPO,
  author =       "Peijin Cong and Guo Xu and Tongquan Wei and Keqin Li",
  title =        "A Survey of Profit Optimization Techniques for Cloud
                 Providers",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "26:1--26:35",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3376917",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3376917",
  abstract =     "As the demand for computing resources grows, cloud
                 computing becomes more and more popular as a
                 pay-as-you-go model, in which the computing resources
                 and services are provided to cloud users efficiently.
                 For cloud providers, the typical goal is to \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{DeAguiar:2020:SBB,
  author =       "Erikson J{\'u}lio {De Aguiar} and Bruno S.
                 Fai{\c{c}}al and Bhaskar Krishnamachari and J{\'o}
                 Ueyama",
  title =        "A Survey of Blockchain-Based Strategies for
                 Healthcare",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "27:1--27:27",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3376915",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3376915",
  abstract =     "Blockchain technology has been gaining visibility
                 owing to its ability to enhance the security,
                 reliability, and robustness of distributed systems.
                 Several areas have benefited from research based on
                 this technology, such as finance, remote sensing, data
                 analysis, and healthcare. Data immutability, privacy,
                 transparency, decentralization, and distributed ledgers
                 are the main features that make blockchain an
                 attractive technology. However, healthcare records that
                 contain confidential patient data make this system very
                 complicated because there is a risk of a privacy
                 breach. This study aims to address research into the
                 applications of the blockchain healthcare area. It sets
                 out by discussing the management of medical
                 information, as well as the sharing of medical records,
                 image sharing, and log management. We also discuss
                 papers that intersect with other areas, such as the
                 Internet of Things, the management of information,
                 tracking of drugs along their supply chain, and aspects
                 of security and privacy. As we are aware that there are
                 other surveys of blockchain in healthcare, we analyze
                 and compare both the positive and negative aspects of
                 their papers. Finally, we seek to examine the concepts
                 of blockchain in the medical area, by assessing their
                 benefits and drawbacks and thus giving guidance to
                 other researchers in the area. Additionally, we
                 summarize the methods used in healthcare per
                 application area and show their pros and cons.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wu:2020:MLA,
  author =       "Jian Wu and Victor S. Sheng and Jing Zhang and Hua Li
                 and Tetiana Dadakova and Christine Leon Swisher and
                 Zhiming Cui and Pengpeng Zhao",
  title =        "Multi-Label Active Learning Algorithms for Image
                 Classification: Overview and Future Promise",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "28:1--28:35",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3379504",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3379504",
  abstract =     "Image classification is a key task in image
                 understanding, and multi-label image classification has
                 become a popular topic in recent years. However, the
                 success of multi-label image classification is closely
                 related to the way of constructing a training
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Falcon-Cardona:2020:IBM,
  author =       "Jes{\'u}s Guillermo Falc{\'o}n-Cardona and Carlos A.
                 Coello Coello",
  title =        "Indicator-based Multi-objective Evolutionary
                 Algorithms: a Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "29:1--29:35",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3376916",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3376916",
  abstract =     "For over 25 years, most multi-objective evolutionary
                 algorithms (MOEAs) have adopted selection criteria
                 based on Pareto dominance. However, the performance of
                 Pareto-based MOEAs quickly degrades when solving
                 multi-objective optimization problems (MOPs) \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Verbraeken:2020:SDM,
  author =       "Joost Verbraeken and Matthijs Wolting and Jonathan
                 Katzy and Jeroen Kloppenburg and Tim Verbelen and Jan
                 S. Rellermeyer",
  title =        "A Survey on Distributed Machine Learning",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "30:1--30:33",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3377454",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3377454",
  abstract =     "The demand for artificial intelligence has grown
                 significantly over the past decade, and this growth has
                 been fueled by advances in machine learning techniques
                 and the ability to leverage hardware acceleration.
                 However, to increase the quality of \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Papadakis:2020:BFT,
  author =       "George Papadakis and Dimitrios Skoutas and Emmanouil
                 Thanos and Themis Palpanas",
  title =        "Blocking and Filtering Techniques for Entity
                 Resolution: a Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "31:1--31:42",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3377455",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3377455",
  abstract =     "Entity Resolution (ER), a core task of Data
                 Integration, detects different entity profiles that
                 correspond to the same real-world object. Due to its
                 inherently quadratic complexity, a series of techniques
                 accelerate it so that it scales to voluminous
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sahin:2020:CGH,
  author =       "Erdem Sahin and Elena Stoykova and Jani M{\"a}kinen
                 and Atanas Gotchev",
  title =        "Computer-Generated Holograms for {$3$D} Imaging: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "32:1--32:35",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3378444",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3378444",
  abstract =     "Holography is usually considered as the ultimate way
                 to visually reproduce a three-dimensional scene.
                 Computer-generated holography constitutes an important
                 branch of holography, which enables visualization of
                 artificially generated scenes as well as \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cherubin:2020:TRP,
  author =       "Stefano Cherubin and Giovanni Agosta",
  title =        "Tools for Reduced Precision Computation: a Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "33:1--33:35",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3381039",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3381039",
  abstract =     "The use of reduced precision to improve performance
                 metrics such as computation latency and power
                 consumption is a common practice in the embedded
                 systems field. This practice is emerging as a new trend
                 in High Performance Computing (HPC), especially when
                 new error-tolerant applications are considered.
                 However, standard compiler frameworks do not support
                 automated precision customization, and manual tuning
                 and code transformation is the approach usually adopted
                 in most domains. In recent years, research have been
                 studying ways to improve the automation of this
                 process. This article surveys this body of work,
                 identifying the critical steps of this process, the
                 most advanced tools available, and the open challenges
                 in this research area. We conclude that, while several
                 mature tools exist, there is still a gap to close,
                 especially for tools based on static analysis rather
                 than profiling, as well as for integration within
                 mainstream, industry-strength compiler frameworks.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zolfaghari:2020:CDN,
  author =       "Behrouz Zolfaghari and Gautam Srivastava and
                 Swapnoneel Roy and Hamid R. Nemati and Fatemeh Afghah
                 and Takeshi Koshiba and Abolfazl Razi and Khodakhast
                 Bibak and Pinaki Mitra and Brijesh Kumar Rai",
  title =        "Content Delivery Networks: State of the Art, Trends,
                 and Future Roadmap",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "34:1--34:34",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3380613",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3380613",
  abstract =     "Recently, Content Delivery Networks (CDN) have become
                 more and more popular. The technology itself is ahead
                 of academic research in this area. Several dimensions
                 of the technology have not been adequately investigated
                 by academia. These dimensions \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alam:2020:SNV,
  author =       "Iqbal Alam and Kashif Sharif and Fan Li and Zohaib
                 Latif and M. M. Karim and Sujit Biswas and Boubakr Nour
                 and Yu Wang",
  title =        "A Survey of Network Virtualization Techniques for
                 {Internet of Things} Using {SDN} and {NFV}",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "35:1--35:40",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3379444",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3379444",
  abstract =     "Internet of Things (IoT) and Network Softwarization
                 are fast becoming core technologies of information
                 systems and network management for the next-generation
                 Internet. The deployment and applications of IoT range
                 from smart cities to urban computing and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bonifati:2020:GGS,
  author =       "Angela Bonifati and Irena Holubov{\'a} and Arnau
                 Prat-P{\'e}rez and Sherif Sakr",
  title =        "Graph Generators: State of the Art and Open
                 Challenges",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "36:1--36:30",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3379445",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3379445",
  abstract =     "The abundance of interconnected data has fueled the
                 design and implementation of graph generators
                 reproducing real-world linking properties or gauging
                 the effectiveness of graph algorithms, techniques, and
                 applications manipulating these data. We \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lu:2020:KTV,
  author =       "Ying Lu and Lingkun Luo and Di Huang and Yunhong Wang
                 and Liming Chen",
  title =        "Knowledge Transfer in Vision Recognition: a Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "37:1--37:35",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3379344",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3379344",
  abstract =     "In this survey, we propose to explore and discuss the
                 common rules behind knowledge transfer works for vision
                 recognition tasks. To achieve this, we firstly discuss
                 the different kinds of reusable knowledge existing in a
                 vision recognition task, and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cong:2020:SHE,
  author =       "Peijin Cong and Junlong Zhou and Liying Li and Kun Cao
                 and Tongquan Wei and Keqin Li",
  title =        "A Survey of Hierarchical Energy Optimization for
                 Mobile Edge Computing: a Perspective from End Devices
                 to the Cloud",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "38:1--38:44",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3378935",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3378935",
  abstract =     "With the development of wireless technology, various
                 emerging mobile applications are attracting significant
                 attention and drastically changing our daily lives.
                 Applications such as augmented reality and object
                 recognition demand stringent delay and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Valejo:2020:CSM,
  author =       "Alan Valejo and Vin{\'\i}cius Ferreira and Renato
                 Fabbri and Maria Cristina Ferreira de Oliveira and
                 Alneu de Andrade Lopes",
  title =        "A Critical Survey of the Multilevel Method in Complex
                 Networks",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "39:1--39:35",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3379347",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3379347",
  abstract =     "Multilevel optimization aims at reducing the cost of
                 executing a target network-based algorithm by
                 exploiting coarsened, i.e., reduced or simplified,
                 versions of the network. There is a growing interest in
                 multilevel algorithms in networked systems, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Suaboot:2020:TSL,
  author =       "Jakapan Suaboot and Adil Fahad and Zahir Tari and John
                 Grundy and Abdun Naser Mahmood and Abdulmohsen Almalawi
                 and Albert Y. Zomaya and Khalil Drira",
  title =        "A Taxonomy of Supervised Learning for {IDSs} in
                 {SCADA} Environments",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "40:1--40:37",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3379499",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3379499",
  abstract =     "Supervisory Control and Data Acquisition (SCADA)
                 systems play an important role in monitoring industrial
                 processes such as electric power distribution,
                 transport systems, water distribution, and wastewater
                 collection systems. Such systems require a \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2020:SRS,
  author =       "Guangjie Li and Hui Liu and Ally S. Nyamawe",
  title =        "A Survey on Renamings of Software Entities",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "41:1--41:38",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3379443",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3379443",
  abstract =     "More than 70\% of characters in the source code are
                 used to label identifiers. Consequently, identifiers
                 are one of the most important source for program
                 comprehension. Meaningful identifiers are crucial to
                 understand and maintain programs. However, for
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kannengiesser:2020:TOB,
  author =       "Niclas Kannengie{\ss}er and Sebastian Lins and Tobias
                 Dehling and Ali Sunyaev",
  title =        "Trade-offs between Distributed Ledger Technology
                 Characteristics",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "42:1--42:37",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3379463",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3379463",
  abstract =     "When developing peer-to-peer applications on
                 distributed ledger technology (DLT), a crucial decision
                 is the selection of a suitable DLT design (e.g.,
                 Ethereum), because it is hard to change the underlying
                 DLT design post hoc. To facilitate the selection
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Herodotou:2020:SAP,
  author =       "Herodotos Herodotou and Yuxing Chen and Jiaheng Lu",
  title =        "A Survey on Automatic Parameter Tuning for Big Data
                 Processing Systems",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "43:1--43:37",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3381027",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3381027",
  abstract =     "Big data processing systems (e.g., Hadoop, Spark,
                 Storm) contain a vast number of configuration
                 parameters controlling parallelism, I/O behavior,
                 memory settings, and compression. Improper parameter
                 settings can cause significant performance degradation
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Figueroa-Lorenzo:2020:SIP,
  author =       "Santiago Figueroa-Lorenzo and Javier A{\~n}orga and
                 Saioa Arrizabalaga",
  title =        "A Survey of {IIoT} Protocols: a Measure of
                 Vulnerability Risk Analysis Based on {CVSS}",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "44:1--44:53",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3381038",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3381038",
  abstract =     "Industrial Internet of Things (IIoT) is present in
                 many participants from the energy, health,
                 manufacturing, transport, and public sectors. Many
                 factors catalyze IIoT, such as robotics, artificial
                 intelligence, and intelligent decentralized \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sierra-Arriaga:2020:SIC,
  author =       "Federico Sierra-Arriaga and Rodrigo Branco and Ben
                 Lee",
  title =        "Security Issues and Challenges for Virtualization
                 Technologies",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "2",
  pages =        "45:1--45:37",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3382190",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:43 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3382190",
  abstract =     "Virtualization-based technologies have become
                 ubiquitous in computing. While they provide an
                 easy-to-implement platform for scalable,
                 high-availability services, they also introduce new
                 security issues. Traditionally, discussions on security
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "45",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zeng:2020:SMB,
  author =       "Xuezhi Zeng and Saurabh Garg and Mutaz Barika and
                 Albert Y. Zomaya and Lizhe Wang and Massimo Villari and
                 Dan Chen and Rajiv Ranjan",
  title =        "{SLA} Management for Big Data Analytical Applications
                 in Clouds: a Taxonomy Study",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "46:1--46:40",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3383464",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3383464",
  abstract =     "Recent years have witnessed the booming of big data
                 analytical applications (BDAAs). This trend provides
                 unrivaled opportunities to reveal the latent patterns
                 and correlations embedded in the data, and thus
                 productive decisions may be made. This was \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "46",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Patil:2020:VQG,
  author =       "Charulata Patil and Manasi Patwardhan",
  title =        "Visual Question Generation: The State of the Art",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "47:1--47:22",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3383465",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3383465",
  abstract =     "Visual question generation (VQG) is an interesting
                 problem that has recently received attention. The task
                 of VQG involves generating meaningful questions based
                 on the input image. It is a multi-modal problem
                 involving image understanding and natural \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "47",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Macedo:2020:SCS,
  author =       "Ricardo Macedo and Jo{\~a}o Paulo and Jos{\'e} Pereira
                 and Alysson Bessani",
  title =        "A Survey and Classification of Software-Defined
                 Storage Systems",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "48:1--48:38",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3385896",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3385896",
  abstract =     "The exponential growth of digital information is
                 imposing increasing scale and efficiency demands on
                 modern storage infrastructures. As infrastructure
                 complexity increases, so does the difficulty in
                 ensuring quality of service, maintainability, and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alhakamy:2020:RTI,
  author =       "A'Aeshah Alhakamy and Mihran Tuceryan",
  title =        "Real-time Illumination and Visual Coherence for
                 Photorealistic Augmented\slash Mixed Reality",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "49:1--49:34",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3386496",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3386496",
  abstract =     "A realistically inserted virtual object in the
                 real-time physical environment is a desirable feature
                 in augmented reality (AR) applications and mixed
                 reality (MR) in general. This problem is considered a
                 vital research area in computer graphics, a field
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "49",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2020:RMS,
  author =       "Xunyun Liu and Rajkumar Buyya",
  title =        "Resource Management and Scheduling in Distributed
                 Stream Processing Systems: a Taxonomy, Review, and
                 Future Directions",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "50:1--50:41",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3355399",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3355399",
  abstract =     "Stream processing is an emerging paradigm to handle
                 data streams upon arrival, powering latency-critical
                 application such as fraud detection, algorithmic
                 trading, and health surveillance. Though there are a
                 variety of Distributed Stream Processing \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Stanley-Marbell:2020:EEE,
  author =       "Phillip Stanley-Marbell and Armin Alaghi and Michael
                 Carbin and Eva Darulova and Lara Dolecek and Andreas
                 Gerstlauer and Ghayoor Gillani and Djordje Jevdjic and
                 Thierry Moreau and Mattia Cacciotti and Alexandros
                 Daglis and Natalie Enright Jerger and Babak Falsafi and
                 Sasa Misailovic and Adrian Sampson and Damien
                 Zufferey",
  title =        "Exploiting Errors for Efficiency: a Survey from
                 Circuits to Applications",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "51:1--51:39",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3394898",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3394898",
  abstract =     "When a computational task tolerates a relaxation of
                 its specification or when an algorithm tolerates the
                 effects of noise in its execution, hardware, system
                 software, and programming language compilers or their
                 runtime systems can trade deviations from \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "51",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Akpinar:2020:ECS,
  author =       "Elg{\i}n Akpinar and Yel{\i}z Yes{\i}lada and Sel{\i}m
                 Tem{\i}zer",
  title =        "The Effect of Context on Small Screen and Wearable
                 Device Users' Performance --- A Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "52:1--52:44",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3386370",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3386370",
  abstract =     "Small screen and wearable devices play a key role in
                 most of our daily tasks and activities. However,
                 depending on the context, users can easily experience
                 situationally induced impairments and disabilities
                 (SIIDs). Previous studies have defined SIIDs \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Warford:2020:CDS,
  author =       "J. Stanley Warford and David Vega and Scott M.
                 Staley",
  title =        "A Calculational Deductive System for Linear Temporal
                 Logic",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "53:1--53:38",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3387109",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3387109",
  abstract =     "This article surveys the linear temporal logic (LTL)
                 literature and presents all the LTL theorems from the
                 survey, plus many new ones, in a calculational
                 deductive system. Calculational deductive systems,
                 developed by Dijkstra and Scholten and extended
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Das:2020:SFD,
  author =       "Rangan Das and Sagnik Sen and Ujjwal Maulik",
  title =        "A Survey on Fuzzy Deep Neural Networks",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "54:1--54:25",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3369798",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3369798",
  abstract =     "Deep neural networks are a class of powerful machine
                 learning model that uses successive layers of
                 non-linear processing units to extract features from
                 data. However, the training process of such networks is
                 quite computationally intensive and uses \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Boukerche:2020:ODM,
  author =       "Azzedine Boukerche and Lining Zheng and Omar Alfandi",
  title =        "Outlier Detection: Methods, Models, and
                 Classification",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "55:1--55:37",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3381028",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3381028",
  abstract =     "Over the past decade, we have witnessed an enormous
                 amount of research effort dedicated to the design of
                 efficient outlier detection techniques while taking
                 into consideration efficiency, accuracy,
                 high-dimensional data, and distributed environments,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "55",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Beaumont:2020:STT,
  author =       "Olivier Beaumont and Louis-Claude Canon and Lionel
                 Eyraud-Dubois and Giorgio Lucarelli and Loris Marchal
                 and Cl{\'e}ment Mommessin and Bertrand Simon and Denis
                 Trystram",
  title =        "Scheduling on Two Types of Resources: a Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "56:1--56:36",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3387110",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3387110",
  abstract =     "The evolution in the design of modern parallel
                 platforms leads to revisit the scheduling jobs on
                 distributed heterogeneous resources. The goal of this
                 survey is to present the main existing algorithms, to
                 classify them based on their underlying \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "56",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Prenkaj:2020:SML,
  author =       "Bardh Prenkaj and Paola Velardi and Giovanni Stilo and
                 Damiano Distante and Stefano Faralli",
  title =        "A Survey of Machine Learning Approaches for Student
                 Dropout Prediction in Online Courses",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "57:1--57:34",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3388792",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3388792",
  abstract =     "The recent diffusion of online education (both MOOCs
                 and e-courses) has led to an increased economic and
                 scientific interest in e-learning environments. As
                 widely documented, online students have a much higher
                 chance of dropping out than those attending \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "57",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ismail:2020:CSP,
  author =       "Leila Ismail and Huned Materwala",
  title =        "Computing Server Power Modeling in a Data Center:
                 Survey, Taxonomy, and Performance Evaluation",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "58:1--58:34",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3390605",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3390605",
  abstract =     "Data centers are large-scale, energy-hungry
                 infrastructure serving the increasing computational
                 demands as the world is becoming more connected in
                 smart cities. The emergence of advanced technologies
                 such as cloud-based services, internet of things (IoT).
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "58",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Welsh:2020:RCC,
  author =       "Thomas Welsh and Elhadj Benkhelifa",
  title =        "On Resilience in Cloud Computing: a Survey of
                 Techniques across the Cloud Domain",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "59:1--59:36",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3388922",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3388922",
  abstract =     "Cloud infrastructures are highly favoured as a
                 computing delivery model worldwide, creating a strong
                 societal dependence. It is therefore vital to enhance
                 their resilience, providing persistent service delivery
                 under a variety of conditions. Cloud \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "59",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Anwar:2020:DJS,
  author =       "Saeed Anwar and Salman Khan and Nick Barnes",
  title =        "A Deep Journey into Super-resolution: a Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "60:1--60:34",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3390462",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3390462",
  abstract =     "Deep convolutional networks-based super-resolution is
                 a fast-growing field with numerous practical
                 applications. In this exposition, we extensively
                 compare more than 30 state-of-the-art super-resolution
                 Convolutional Neural Networks (CNNs) over three
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "60",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Butijn:2020:BSM,
  author =       "Bert-Jan Butijn and Damian A. Tamburri and Willem-Jan
                 van den Heuvel",
  title =        "Blockchains: a Systematic Multivocal Literature
                 Review",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "61:1--61:37",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3369052",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3369052",
  abstract =     "Blockchain technology has gained tremendous popularity
                 both in practice and academia. The goal of this article
                 is to develop a coherent overview of the state of the
                 art in blockchain technology, using a systematic (i.e.,
                 protocol-based, replicable), multivocal (i.e.,
                 featuring both white and grey literature alike)
                 literature review to (1) define blockchain technology,
                 (2) elaborate on its architecture options and (3)
                 tradeoffs, as well as to understand (4) the current
                 applications and challenges, as evident from the state
                 of the art. We derive a systematic definition of
                 blockchain technology, based on a formal concept
                 analysis. Further, we flesh out an overview of
                 blockchain technology elaborated by means of
                 Grounded-Theory.",
  acknowledgement = ack-nhfb,
  articleno =    "61",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Le:2020:DLS,
  author =       "Triet H. M. Le and Hao Chen and Muhammad Ali Babar",
  title =        "Deep Learning for Source Code Modeling and Generation:
                 Models, Applications, and Challenges",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "62:1--62:38",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3383458",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3383458",
  abstract =     "Deep Learning (DL) techniques for Natural Language
                 Processing have been evolving remarkably fast.
                 Recently, the DL advances in language modeling, machine
                 translation, and paragraph understanding are so
                 prominent that the potential of DL in Software
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "62",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2020:GFE,
  author =       "Yaqing Wang and Quanming Yao and James T. Kwok and
                 Lionel M. Ni",
  title =        "Generalizing from a Few Examples: a Survey on Few-shot
                 Learning",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "63:1--63:34",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3386252",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3386252",
  abstract =     "Machine learning has been highly successful in
                 data-intensive applications but is often hampered when
                 the data set is small. Recently, Few-shot Learning
                 (FSL) is proposed to tackle this problem. Using prior
                 knowledge, FSL can rapidly generalize to new \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "63",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zepf:2020:DER,
  author =       "Sebastian Zepf and Javier Hernandez and Alexander
                 Schmitt and Wolfgang Minker and Rosalind W. Picard",
  title =        "Driver Emotion Recognition for Intelligent Vehicles: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "64:1--64:30",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3388790",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3388790",
  abstract =     "Driving can occupy a large portion of daily life and
                 often can elicit negative emotional states like anger
                 or stress, which can significantly impact road safety
                 and long-term human health. In recent decades, the
                 arrival of new tools to help recognize \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "64",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Salaht:2020:OSP,
  author =       "Farah A{\"\i}t Salaht and Fr{\'e}d{\'e}ric Desprez and
                 Adrien Lebre",
  title =        "An Overview of Service Placement Problem in Fog and
                 Edge Computing",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "65:1--65:35",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3391196",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3391196",
  abstract =     "To support the large and various applications
                 generated by the Internet of Things (IoT), Fog
                 Computing was introduced to complement the Cloud
                 Computing and offer Cloud-like services at the edge of
                 the network with low latency and real-time responses.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "65",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Serban:2020:AEO,
  author =       "Alex Serban and Erik Poll and Joost Visser",
  title =        "Adversarial Examples on Object Recognition: a
                 Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "66:1--66:38",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3398394",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3398394",
  abstract =     "Deep neural networks are at the forefront of machine
                 learning research. However, despite achieving
                 impressive performance on complex tasks, they can be
                 very sensitive: Small perturbations of inputs can be
                 sufficient to induce incorrect behavior. Such
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "66",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2020:SES,
  author =       "Huashan Chen and Marcus Pendleton and Laurent Njilla
                 and Shouhuai Xu",
  title =        "A Survey on {Ethereum} Systems Security:
                 Vulnerabilities, Attacks, and Defenses",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "3",
  pages =        "67:1--67:43",
  month =        jul,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3391195",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Jul 8 17:24:44 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3391195",
  abstract =     "Blockchain technology is believed by many to be a game
                 changer in many application domains. While the first
                 generation of blockchain technology (i.e., Blockchain
                 1.0) is almost exclusively used for cryptocurrency, the
                 second generation (i.e., Blockchain 2.0), as
                 represented by Ethereum, is an open and decentralized
                 platform enabling a new paradigm of computing
                 Decentralized Applications (DApps) running on top of
                 blockchains. The rich applications and semantics of
                 DApps inevitably introduce many security
                 vulnerabilities, which have no counterparts in pure
                 cryptocurrency systems like Bitcoin. Since Ethereum is
                 a new, yet complex, system, it is imperative to have a
                 systematic and comprehensive understanding on its
                 security from a holistic perspective, which was
                 previously unavailable in the literature. To the best
                 of our knowledge, the present survey, which can also be
                 used as a tutorial, fills this void. We systematize
                 three aspects of Ethereum systems security:
                 vulnerabilities, attacks, and defenses. We draw
                 insights into vulnerability root causes, attack
                 consequences, and defense capabilities, which shed
                 light on future research directions.",
  acknowledgement = ack-nhfb,
  articleno =    "67",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Guo:2020:FFI,
  author =       "Bin Guo and Yasan Ding and Lina Yao and Yunji Liang
                 and Zhiwen Yu",
  title =        "The Future of False Information Detection on Social
                 Media: New Perspectives and Trends",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "68:1--68:36",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3393880",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3393880",
  abstract =     "The massive spread of false information on social
                 media has become a global risk, implicitly influencing
                 public opinion and threatening social/political
                 development. False information detection (FID) has thus
                 become a surging research topic in recent \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "68",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Emami:2020:MLM,
  author =       "Patrick Emami and Panos M. Pardalos and Lily
                 Elefteriadou and Sanjay Ranka",
  title =        "Machine Learning Methods for Data Association in
                 Multi-Object Tracking",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "69:1--69:34",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3394659",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3394659",
  abstract =     "Data association is a key step within the multi-object
                 tracking pipeline that is notoriously challenging due
                 to its combinatorial nature. A popular and general way
                 to formulate data association is as the NP-hard
                 multi-dimensional assignment problem. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "69",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wood:2020:HEM,
  author =       "Alexander Wood and Kayvan Najarian and Delaram
                 Kahrobaei",
  title =        "Homomorphic Encryption for Machine Learning in
                 Medicine and Bioinformatics",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "70:1--70:35",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3394658",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3394658",
  abstract =     "Machine learning and statistical techniques are
                 powerful tools for analyzing large amounts of medical
                 and genomic data. On the other hand, ethical concerns
                 and privacy regulations prevent free sharing of this
                 data. Encryption techniques such as fully \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "70",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ngamakeur:2020:SDF,
  author =       "Kan Ngamakeur and Sira Yongchareon and Jian Yu and
                 Saeed Ur Rehman",
  title =        "A Survey on Device-free Indoor Localization and
                 Tracking in the Multi-resident Environment",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "71:1--71:29",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3396302",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3396302",
  abstract =     "Indoor device-free localization and tracking can bring
                 both convenience and privacy to users compared with
                 traditional solutions such as camera-based surveillance
                 and RFID tag-based tracking. Technologies such as
                 Wi-Fi, wireless sensor, and infrared \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "71",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ali:2020:FPS,
  author =       "Isra Mohamed Ali and Maurantonio Caprolu and Roberto
                 {Di Pietro}",
  title =        "Foundations, Properties, and Security Applications of
                 Puzzles: a Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "72:1--72:38",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3396374",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3396374",
  abstract =     "Cryptographic algorithms have been used not only to
                 create robust ciphertexts but also to generate
                 cryptograms that, contrary to the classic goal of
                 cryptography, are meant to be broken. These
                 cryptograms, generally called puzzles, require the use
                 of a \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "72",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fei:2020:PWN,
  author =       "Xincai Fei and Fangming Liu and Qixia Zhang and Hai
                 Jin and Hongxin Hu",
  title =        "Paving the Way for {NFV} Acceleration: a Taxonomy,
                 Survey and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "73:1--73:42",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3397022",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3397022",
  abstract =     "As a recent innovation, network functions
                 virtualization (NFV) --- with its core concept of
                 replacing hardware middleboxes with software network
                 functions (NFs) implemented in commodity servers ---
                 promises cost savings and flexibility benefits.
                 However, transitioning NFs from special-purpose
                 hardware to commodity servers has turned out to be more
                 challenging than expected, as it inevitably incurs
                 performance penalties due to bottlenecks in both
                 software and hardware. To achieve performance
                 comparable to hardware middleboxes, there is a strong
                 demand for a speedup in NF processing, which plays a
                 crucial role in the success of NFV. In this article, we
                 study the performance challenges that exist in
                 general-purpose servers and simultaneously summarize
                 the typical performance bottlenecks in NFV. Through
                 reviewing the progress in the field of NFV
                 acceleration, we present a new taxonomy of the
                 state-of-the-art efforts according to various
                 acceleration approaches. We discuss the surveyed works
                 and identify the respective advantages and
                 disadvantages in each category. We then discuss the
                 products, solutions, and projects emerged in industry.
                 We also present a gap analysis to improve current
                 solutions and highlight promising research trends that
                 can be explored in the future.",
  acknowledgement = ack-nhfb,
  articleno =    "73",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Feldmann:2020:SAS,
  author =       "Michael Feldmann and Christian Scheideler and Stefan
                 Schmid",
  title =        "Survey on Algorithms for Self-stabilizing Overlay
                 Networks",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "74:1--74:24",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3397190",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3397190",
  abstract =     "The maintenance of efficient and robust overlay
                 networks is one of the most fundamental and reoccurring
                 themes in networking. This article presents a survey of
                 state-of-the-art algorithms to design and repair
                 overlay networks in a distributed manner. In \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "74",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Guo:2020:SLC,
  author =       "Ruocheng Guo and Lu Cheng and Jundong Li and P.
                 Richard Hahn and Huan Liu",
  title =        "A Survey of Learning Causality with Data: Problems and
                 Methods",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "75:1--75:37",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3397269",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3397269",
  abstract =     "This work considers the question of how convenient
                 access to copious data impacts our ability to learn
                 causal effects and relations. In what ways is learning
                 causality in the era of big data different from-or the
                 same as-the traditional one? To answer \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "75",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kritikakou:2020:BTC,
  author =       "Angeliki Kritikakou and Rafail Psiakis and Francky
                 Catthoor and Olivier Sentieys",
  title =        "Binary Tree Classification of Rigid Error Detection
                 and Correction Techniques",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "76:1--76:38",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3397268",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3397268",
  abstract =     "Due to technology scaling and harsh environments, a
                 wide range of fault-tolerant techniques exists to deal
                 with the error occurrences. Selecting a fault-tolerant
                 technique is not trivial, whereas more than the
                 necessary overhead is usually inserted \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "76",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Calvo-Zaragoza:2020:UOM,
  author =       "Jorge Calvo-Zaragoza and Jan {Hajic Jr.} and Alexander
                 Pacha",
  title =        "Understanding Optical Music Recognition",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "77:1--77:35",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3397499",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3397499",
  abstract =     "For over 50 years, researchers have been trying to
                 teach computers to read music notation, referred to as
                 Optical Music Recognition (OMR). However, this field is
                 still difficult to access for new researchers,
                 especially those without a significant \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "77",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lucas:2020:CSR,
  author =       "Salvador Lucas",
  title =        "Context-sensitive Rewriting",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "78:1--78:36",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3397677",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3397677",
  abstract =     "The appropriate selection of the arguments of
                 functions that can be evaluated in function calls is
                 often useful to improve efficiency, speed, termination
                 behavior, and so on. This is essential, e.g., in the
                 conditional if --- then --- else operator. We can
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "78",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cerrolaza:2020:MCD,
  author =       "Jon Perez Cerrolaza and Roman Obermaisser and Jaume
                 Abella and Francisco J. Cazorla and Kim Gr{\"u}ttner
                 and Irune Agirre and Hamidreza Ahmadian and Imanol
                 Allende",
  title =        "Multi-core Devices for Safety-critical Systems: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "79:1--79:38",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3398665",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3398665",
  abstract =     "Multi-core devices are envisioned to support the
                 development of next-generation safety-critical systems,
                 enabling the on-chip integration of functions of
                 different criticality. This integration provides
                 multiple system-level potential benefits such as
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "79",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Boukerche:2020:COR,
  author =       "Azzedine Boukerche and Victor Soto",
  title =        "Computation Offloading and Retrieval for Vehicular
                 Edge Computing: Algorithms, Models, and
                 Classification",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "80:1--80:35",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3392064",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3392064",
  abstract =     "The rapid evolution of mobile devices, their
                 applications, and the amount of data generated by them
                 causes a significant increase in bandwidth consumption
                 and congestions in the network core. Edge Computing
                 offers a solution to these performance \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "80",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Weisenburger:2020:SMP,
  author =       "Pascal Weisenburger and Johannes Wirth and Guido
                 Salvaneschi",
  title =        "A Survey of Multitier Programming",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "81:1--81:35",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3397495",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3397495",
  abstract =     "Multitier programming deals with developing the
                 components that pertain to different tiers in the
                 system (e.g., client and server), mixing them in the
                 same compilation unit. In this paradigm, the code for
                 different tiers is then either generated at run
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "81",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Qian:2020:ODL,
  author =       "Bin Qian and Jie Su and Zhenyu Wen and Devki Nandan
                 Jha and Yinhao Li and Yu Guan and Deepak Puthal and
                 Philip James and Renyu Yang and Albert Y. Zomaya and
                 Omer Rana and Lizhe Wang and Maciej Koutny and Rajiv
                 Ranjan",
  title =        "Orchestrating the Development Lifecycle of Machine
                 Learning-based {IoT} Applications: a Taxonomy and
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "82:1--82:47",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3398020",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3398020",
  abstract =     "Machine Learning (ML) and Internet of Things (IoT) are
                 complementary advances: ML techniques unlock the
                 potential of IoT with intelligence, and IoT
                 applications increasingly feed data collected by
                 sensors into ML models, thereby employing results to
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "82",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2020:ABE,
  author =       "Yinghui Zhang and Robert H. Deng and Shengmin Xu and
                 Jianfei Sun and Qi Li and Dong Zheng",
  title =        "Attribute-based Encryption for Cloud Computing Access
                 Control: a Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "83:1--83:41",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3398036",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3398036",
  abstract =     "Attribute-based encryption (ABE) for cloud computing
                 access control is reviewed in this article. A taxonomy
                 and comprehensive assessment criteria of ABE are first
                 proposed. In the taxonomy, ABE schemes are assorted
                 into key-policy ABE (KP-ABE) schemes, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "83",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2020:DLM,
  author =       "Yanjiao Chen and Baolin Zheng and Zihan Zhang and Qian
                 Wang and Chao Shen and Qian Zhang",
  title =        "Deep Learning on Mobile and Embedded Devices:
                 State-of-the-art, Challenges, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "84:1--84:37",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3398209",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3398209",
  abstract =     "Recent years have witnessed an exponential increase in
                 the use of mobile and embedded devices. With the great
                 success of deep learning in many fields, there is an
                 emerging trend to deploy deep learning on mobile and
                 embedded devices to better meet the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "84",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Khan:2020:BSU,
  author =       "Saad Khan and Simon Parkinson and Liam Grant and Na
                 Liu and Stephen Mcguire",
  title =        "Biometric Systems Utilising Health Data from Wearable
                 Devices: Applications and Future Challenges in Computer
                 Security",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "85:1--85:29",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3400030",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3400030",
  abstract =     "Health data are being increasingly sensed from the
                 health-based wearable Internet of Things (IoT) devices,
                 providing much-needed fitness and health tracking.
                 However, data generated also present opportunities
                 within computer security, specifically with \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "85",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Harada:2020:PGA,
  author =       "Tomohiro Harada and Enrique Alba",
  title =        "Parallel Genetic Algorithms: a Useful Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "86:1--86:39",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3400031",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3400031",
  abstract =     "In this article, we encompass an analysis of the
                 recent advances in parallel genetic algorithms (PGAs).
                 We have selected these algorithms because of the deep
                 interest in many research fields for techniques that
                 can face complex applications where \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "86",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Pekar:2020:ADB,
  author =       "Adrian Pekar and Jozef Mocnej and Winston K. G. Seah
                 and Iveta Zolotova",
  title =        "Application Domain-Based Overview of {IoT} Network
                 Traffic Characteristics",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "87:1--87:33",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3399669",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3399669",
  abstract =     "Over the past decade, the Internet of Things (IoT) has
                 advanced rapidly. New technologies have been proposed
                 and existing approaches optimised to meet user, society
                 and industry requirements. However, as the complexity
                 and heterogeneity of the traffic \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "87",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mahmud:2020:AMF,
  author =       "Redowan Mahmud and Kotagiri Ramamohanarao and Rajkumar
                 Buyya",
  title =        "Application Management in Fog Computing Environments:
                 a Taxonomy, Review and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "88:1--88:43",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3403955",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3403955",
  abstract =     "The Internet of Things (IoT) paradigm is being rapidly
                 adopted for the creation of smart environments in
                 various domains. The IoT-enabled cyber-physical systems
                 associated with smart city, healthcare, Industry 4.0
                 and Agtech handle a huge volume of data \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "88",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sharma:2020:BTC,
  author =       "Pratima Sharma and Rajni Jindal and Malaya Dutta
                 Borah",
  title =        "Blockchain Technology for Cloud Storage: a Systematic
                 Literature Review",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "89:1--89:32",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3403954",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3403954",
  abstract =     "The demand for Blockchain innovation and the
                 significance of its application has inspired
                 ever-progressing exploration in various scientific and
                 practical areas. Even though it is still in the initial
                 testing stage, the blockchain is being viewed as a
                 progressive solution to address present-day technology
                 concerns, such as decentralization, identity, trust,
                 character, ownership of data, and information-driven
                 choices. Simultaneously, the world is facing an
                 increase in the diversity and quantity of digital
                 information produced by machines and users. While
                 effectively looking for the ideal approach to storing
                 and processing cloud data, the blockchain innovation
                 provides significant inputs. This article reviews the
                 application of blockchain technology for securing cloud
                 storage.",
  acknowledgement = ack-nhfb,
  articleno =    "89",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2020:OHI,
  author =       "Gexiang Zhang and Zeyi Shang and Sergey Verlan and
                 Miguel {\'A}. Mart{\'\i}nez-del-Amor and Chengxun Yuan
                 and Luis Valencia-Cabrera and Mario J.
                 P{\'e}rez-Jim{\'e}nez",
  title =        "An Overview of Hardware Implementation of Membrane
                 Computing Models",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "4",
  pages =        "90:1--90:38",
  month =        sep,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3402456",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Sep 27 07:06:06 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3402456",
  abstract =     "The model of membrane computing, also known under the
                 name of P systems, is a bio-inspired large-scale
                 parallel computing paradigm having a good potential for
                 the design of massively parallel algorithms. For its
                 implementation it is very natural to \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "90",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alvarez-Garcia:2020:SEE,
  author =       "Juan A. {\'A}lvarez-Garc{\'\i}a and Bozidara
                 Cvetkovi{\'c} and Mitja Lustrek",
  title =        "A Survey on Energy Expenditure Estimation Using
                 Wearable Devices",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "91:1--91:35",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3404482",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3404482",
  abstract =     "Human Energy Expenditure (EE) is a valuable tool for
                 measuring physical activity and its impact on our body
                 in an objective way. To accurately measure the EE,
                 there are methods such as doubly labeled water and
                 direct and indirect calorimetry, but their \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "91",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Aljeri:2020:MME,
  author =       "Noura Aljeri and Azzedine Boukerche",
  title =        "Mobility Management in {$5$G}-enabled Vehicular
                 Networks: Models, Protocols, and Classification",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "92:1--92:35",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3403953",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3403953",
  abstract =     "Over the past few years, the next generation of
                 vehicular networks is envisioned to play an essential
                 part in autonomous driving, traffic management, and
                 infotainment applications. The next generation of
                 intelligent vehicular networks enabled by 5G \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "92",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Khader:2020:DBA,
  author =       "Mariam Khader and Ghazi Al-Naymat",
  title =        "Density-based Algorithms for Big Data Clustering Using
                 {MapReduce} Framework: a Comprehensive Study",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "93:1--93:38",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3403951",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3403951",
  abstract =     "Clustering is used to extract hidden patterns and
                 similar groups from data. Therefore, clustering as a
                 method of unsupervised learning is a crucial technique
                 for big data analysis owing to the massive number of
                 unlabeled objects involved. Density-based \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "93",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{DeSousa:2020:VTS,
  author =       "Roniel S. {De Sousa} and Azzedine Boukerche and
                 Antonio A. F. Loureiro",
  title =        "Vehicle Trajectory Similarity: Models, Methods, and
                 Applications",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "94:1--94:32",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3406096",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3406096",
  abstract =     "The increasing availability of vehicular trajectory
                 data is at the core of smart mobility solutions. Such
                 data offer us unprecedented information for the
                 development of trajectory data mining-based
                 applications. An essential task of trajectory analysis
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "94",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Canal:2020:PRF,
  author =       "Ramon Canal and Carles Hernandez and Rafa Tornero and
                 Alessandro Cilardo and Giuseppe Massari and Federico
                 Reghenzani and William Fornaciari and Marina Zapater
                 and David Atienza and Ariel Oleksiak and Wojciech
                 PiAtek and Jaume Abella",
  title =        "Predictive Reliability and Fault Management in
                 Exascale Systems: State of the Art and Perspectives",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "95:1--95:32",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3403956",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3403956",
  abstract =     "Performance and power constraints come together with
                 Complementary Metal Oxide Semiconductor technology
                 scaling in future Exascale systems. Technology scaling
                 makes each individual transistor more prone to faults
                 and, due to the exponential increase in \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "95",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mehic:2020:QKD,
  author =       "Miralem Mehic and Marcin Niemiec and Stefan Rass and
                 Jiajun Ma and Momtchil Peev and Alejandro Aguado and
                 Vicente Martin and Stefan Schauer and Andreas Poppe and
                 Christoph Pacher and Miroslav Voznak",
  title =        "Quantum Key Distribution: a Networking Perspective",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "96:1--96:41",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3402192",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3402192",
  abstract =     "The convergence of quantum cryptography with
                 applications used in everyday life is a topic drawing
                 attention from the industrial and academic worlds. The
                 development of quantum electronics has led to the
                 practical achievement of quantum devices that are
                 already available on the market and waiting for their
                 first application on a broader scale. A major aspect of
                 quantum cryptography is the methodology of Quantum Key
                 Distribution (QKD), which is used to generate and
                 distribute symmetric cryptographic keys between two
                 geographically separate users using the principles of
                 quantum physics. In previous years, several successful
                 QKD networks have been created to test the
                 implementation and interoperability of different
                 practical solutions. This article surveys previously
                 applied methods, showing techniques for deploying QKD
                 networks and current challenges of QKD networking.
                 Unlike studies focusing on optical channels and optical
                 equipment, this survey focuses on the network aspect by
                 considering network organization, routing and signaling
                 protocols, simulation techniques, and a
                 software-defined QKD networking approach.",
  acknowledgement = ack-nhfb,
  articleno =    "96",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Al-Odat:2020:SHA,
  author =       "Zeyad A. Al-Odat and Mazhar Ali and Assad Abbas and
                 Samee U. Khan",
  title =        "Secure Hash Algorithms and the Corresponding {FPGA}
                 Optimization Techniques",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "97:1--97:36",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3311724",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3311724",
  abstract =     "Cryptographic hash functions are widely used
                 primitives with a purpose to ensure the integrity of
                 data. Hash functions are also utilized in conjunction
                 with digital signatures to provide authentication and
                 non-repudiation services. The SHA has been developed
                 over time by the National Institute of Standards and
                 Technology for security, optimal performance, and
                 robustness. The best-known hash standards are SHA-1,
                 SHA-2, and SHA-3. Security is the most notable
                 criterion for evaluating the hash functions. However,
                 the hardware performance of an algorithm serves as a
                 tiebreaker among the contestants when all other
                 parameters (security, software performance, and
                 flexibility) have equal strength. Field Programmable
                 Gateway Array (FPGA) is a reconfigurable hardware that
                 supports a variety of design options, making it the
                 best choice for implementing the hash standards. In
                 this survey, particular attention is devoted to the
                 FPGA optimization techniques for the three hash
                 standards. The study covers several types of
                 optimization techniques and their contributions to the
                 performance of FPGAs. Moreover, the article highlights
                 the strengths and weaknesses of each of the
                 optimization methods and their influence on
                 performance. We are optimistic that the study will be a
                 useful resource encompassing the efforts carried out on
                 the SHAs and FPGA optimization techniques in a
                 consolidated form.",
  acknowledgement = ack-nhfb,
  articleno =    "97",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Uprety:2020:SQT,
  author =       "Sagar Uprety and Dimitris Gkoumas and Dawei Song",
  title =        "A Survey of Quantum Theory Inspired Approaches to
                 Information Retrieval",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "98:1--98:39",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3402179",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3402179",
  abstract =     "Since 2004, researchers have been using the
                 mathematical framework of quantum theory in information
                 retrieval (IR). Quantum theory offers a generalized
                 probability and logic framework. Such a framework has
                 been shown to be capable of unifying the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "98",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Dabre:2020:SMN,
  author =       "Raj Dabre and Chenhui Chu and Anoop Kunchukuttan",
  title =        "A Survey of Multilingual Neural Machine Translation",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "99:1--99:38",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3406095",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3406095",
  abstract =     "We present a survey on multilingual neural machine
                 translation (MNMT), which has gained a lot of traction
                 in recent years. MNMT has been useful in improving
                 translation quality as a result of translation
                 knowledge transfer (transfer learning). MNMT is
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "99",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lin:2020:TSP,
  author =       "Weiwei Lin and Fang Shi and Wentai Wu and Keqin Li and
                 Guangxin Wu and Al-Alas Mohammed",
  title =        "A Taxonomy and Survey of Power Models and Power
                 Modeling for Cloud Servers",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "100:1--100:41",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3406208",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3406208",
  abstract =     "Due to the increasing demand of cloud resources, the
                 ever-increasing number and scale of cloud data centers
                 make their massive power consumption a prominent issue
                 today. Evidence reveals that the behaviors of cloud
                 servers make the major impact on data \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "100",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chatterjee:2020:CSS,
  author =       "Deya Chatterjee and Shrisha Rao",
  title =        "Computational Sustainability: a Socio-technical
                 Perspective",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "101:1--101:29",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3409797",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3409797",
  abstract =     "This is a consolidated look at computational
                 techniques for sustainability, and their limits and
                 possibilities. Sustainability is already well
                 established as a concern and a topic of study and
                 practice, given the alarming increase of environmental
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "101",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Younes:2020:TEA,
  author =       "Maram Bani Younes and Azzedine Boukerche",
  title =        "Traffic Efficiency Applications over Downtown Roads: a
                 New Challenge for Intelligent Connected Vehicles",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "102:1--102:30",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3403952",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3403952",
  abstract =     "Vehicular network technology is frequently used to
                 provide several services and applications for drivers
                 on road networks. The proposed applications in the
                 environment of road networks are classified into three
                 main categories based on their functions: \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "102",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cornejo-Lupa:2020:SOS,
  author =       "Mar{\'\i}a A. Cornejo-Lupa and Regina P.
                 Ticona-Herrera and Yudith Cardinale and Dennis
                 Barrios-Aranibar",
  title =        "A Survey of Ontologies for Simultaneous Localization
                 and Mapping in Mobile Robots",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "103:1--103:26",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3408316",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3408316",
  abstract =     "Autonomous robots are playing important roles in
                 academic, technological, and scientific activities.
                 Thus, their behavior is getting more complex,
                 particularly, in tasks related to mapping an
                 environment and localizing themselves. These tasks
                 comprise \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "103",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bu:2020:UMI,
  author =       "Kai Bu and Avery Laird and Yutian Yang and Linfeng
                 Cheng and Jiaqing Luo and Yingjiu Li and Kui Ren",
  title =        "Unveiling the Mystery of {Internet} Packet Forwarding:
                 a Survey of Network Path Validation",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "104:1--104:34",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3409796",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3409796",
  abstract =     "Validating the network paths taken by packets is
                 critical in constructing a secure Internet
                 architecture. Any feasible solution must both enforce
                 packet forwarding along end-host specified paths and
                 verify whether packets have taken those paths.
                 However,. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "104",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Navarro:2020:PS,
  author =       "Gonzalo Navarro and Javiel Rojas-Ledesma",
  title =        "Predecessor Search",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "105:1--105:35",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3409371",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3409371",
  abstract =     "The predecessor problem is a key component of the
                 fundamental sorting-and-searching core of algorithmic
                 problems. While binary search is the optimal solution
                 in the comparison model, more realistic machine models
                 on integer sets open the door to a rich \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "105",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Deldjoo:2020:RSL,
  author =       "Yashar Deldjoo and Markus Schedl and Paolo Cremonesi
                 and Gabriella Pasi",
  title =        "Recommender Systems Leveraging Multimedia Content",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "106:1--106:38",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3407190",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3407190",
  abstract =     "Recommender systems have become a popular and
                 effective means to manage the ever-increasing amount of
                 multimedia content available today and to help users
                 discover interesting new items. Today's recommender
                 systems suggest items of various media types,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "106",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2020:STE,
  author =       "Jingwen Wang and Xuyang Jing and Zheng Yan and Yulong
                 Fu and Witold Pedrycz and Laurence T. Yang",
  title =        "A Survey on Trust Evaluation Based on Machine
                 Learning",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "107:1--107:36",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3408292",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3408292",
  abstract =     "Trust evaluation is the process of quantifying trust
                 with attributes that influence trust. It faces a number
                 of severe issues such as lack of essential evaluation
                 data, demand of big data process, request of simple
                 trust relationship expression, and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "107",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2020:SBD,
  author =       "Hao Wang and Dit-Yan Yeung",
  title =        "A Survey on {Bayesian} Deep Learning",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "108:1--108:37",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3409383",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3409383",
  abstract =     "A comprehensive artificial intelligence system needs
                 to not only perceive the environment with different
                 ``senses'' (e.g., seeing and hearing) but also infer
                 the world's conditional (or even causal) relations and
                 corresponding uncertainty. The past decade \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "108",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhou:2020:SFN,
  author =       "Xinyi Zhou and Reza Zafarani",
  title =        "A Survey of Fake News: Fundamental Theories, Detection
                 Methods, and Opportunities",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "109:1--109:40",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3395046",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3395046",
  abstract =     "The explosive growth in fake news and its erosion to
                 democracy, justice, and public trust has increased the
                 demand for fake news detection and intervention. This
                 survey reviews and evaluates methods that can detect
                 fake news from four perspectives: the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "109",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Davoudian:2020:BDS,
  author =       "Ali Davoudian and Mengchi Liu",
  title =        "Big Data Systems: a Software Engineering Perspective",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "110:1--110:39",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3408314",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3408314",
  abstract =     "Big Data Systems (BDSs) are an emerging class of
                 scalable software technologies whereby massive amounts
                 of heterogeneous data are gathered from multiple
                 sources, managed, analyzed (in batch, stream or hybrid
                 fashion), and served to end-users and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "110",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yu:2020:CBF,
  author =       "Kui Yu and Xianjie Guo and Lin Liu and Jiuyong Li and
                 Hao Wang and Zhaolong Ling and Xindong Wu",
  title =        "Causality-based Feature Selection: Methods and
                 Evaluations",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "111:1--111:36",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3409382",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3409382",
  abstract =     "Feature selection is a crucial preprocessing step in
                 data analytics and machine learning. Classical feature
                 selection algorithms select features based on the
                 correlations between predictive features and the class
                 variable and do not attempt to capture \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "111",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alaca:2020:CAF,
  author =       "Furkan Alaca and Paul C. {Van Oorschot}",
  title =        "Comparative Analysis and Framework Evaluating {Web}
                 Single Sign-on Systems",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "5",
  pages =        "112:1--112:34",
  month =        oct,
  year =         "2020",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3409452",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Oct 16 10:09:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3409452",
  abstract =     "We perform a comprehensive analysis and comparison of
                 14 web single sign-on (SSO) systems proposed and/or
                 deployed over the past decade, including federated
                 identity and credential/password management schemes. We
                 identify common design properties and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "112",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Denning:2021:WSA,
  author =       "Peter J. Denning",
  title =        "Working Set Analytics",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "113:1--113:36",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3399709",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3399709",
  abstract =     "The working set model for program behavior was
                 invented in 1965. It has stood the test of time in
                 virtual memory management for over 50 years. It is
                 considered the ideal for managing memory in operating
                 systems and caches. Its superior performance was
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "113",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zomaya:2021:MSS,
  author =       "Albert Y. Zomaya",
  title =        "In Memoriam {Sherif Sakr} (1979--2020)",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "113e:1--113e:1",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3436208",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3436208",
  acknowledgement = ack-nhfb,
  articleno =    "113e",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rathore:2021:SHB,
  author =       "Aditya Singh Rathore and Zhengxiong Li and Weijin Zhu
                 and Zhanpeng Jin and Wenyao Xu",
  title =        "A Survey on Heart Biometrics",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "114:1--114:38",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3410158",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3410158",
  abstract =     "In recent years, biometrics (e.g., fingerprint or face
                 recognition) has replaced traditional passwords and
                 PINs as a widely used method for user authentication,
                 particularly in personal or mobile devices. Differing
                 from state-of-the-art biometrics, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "114",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Matheu:2021:SCC,
  author =       "Sara N. Matheu and Jos{\'e} L. Hern{\'a}ndez-Ramos and
                 Antonio F. Skarmeta and Gianmarco Baldini",
  title =        "A Survey of Cybersecurity Certification for the
                 {Internet of Things}",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "115:1--115:36",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3410160",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3410160",
  abstract =     "In recent years, cybersecurity certification is
                 gaining momentum as the baseline to build a structured
                 approach to mitigate cybersecurity risks in the
                 Internet of Things (IoT). This initiative is driven by
                 industry, governmental institutions, and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "115",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Edu:2021:SHP,
  author =       "Jide S. Edu and Jose M. Such and Guillermo
                 Suarez-Tangil",
  title =        "Smart Home Personal Assistants: a Security and Privacy
                 Review",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "116:1--116:36",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3412383",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3412383",
  abstract =     "Smart Home Personal Assistants (SPA) are an emerging
                 innovation that is changing the means by which home
                 users interact with technology. However, several
                 elements expose these systems to various risks: (i) the
                 open nature of the voice channel they use, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "116",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{C:2021:EDA,
  author =       "Marimuthu C. and K. Chandrasekaran and Sridhar
                 Chimalakonda",
  title =        "Energy Diagnosis of {Android} Applications: a Thematic
                 Taxonomy and Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "117:1--117:36",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3417986",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3417986",
  abstract =     "The abnormal energy consumption of Android
                 applications is a significant problem faced by
                 developers and users. In recent years, researchers have
                 invested their efforts to develop energy diagnosis
                 tools that pinpoint and fix the energy bugs from source
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "117",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zave:2021:PIN,
  author =       "Pamela Zave and Jennifer Rexford",
  title =        "Patterns and Interactions in Network Security",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "118:1--118:37",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3417988",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3417988",
  abstract =     "Networks play a central role in cyber-security:
                 networks deliver security attacks, suffer from them,
                 defend against them, and sometimes even cause them.
                 This article is a concise tutorial on the large subject
                 of networks and security, written for all \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "118",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Santhosh:2021:ADR,
  author =       "K. K. Santhosh and D. P. Dogra and P. P. Roy",
  title =        "Anomaly Detection in Road Traffic Using Visual
                 Surveillance: a Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "119:1--119:26",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3417989",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3417989",
  abstract =     "Computer vision has evolved in the last decade as a
                 key technology for numerous applications replacing
                 human supervision. Timely detection of traffic
                 violations and abnormal behavior of pedestrians at
                 public places through computer vision and visual
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "119",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ellavarason:2021:TDB,
  author =       "Elakkiya Ellavarason and Richard Guest and Farzin
                 Deravi and Raul Sanchez-Riello and Barbara Corsetti",
  title =        "Touch-dynamics based Behavioural Biometrics on Mobile
                 Devices --- A Review from a Usability and Performance
                 Perspective",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "120:1--120:36",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3394713",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3394713",
  abstract =     "Over the past few years, there has been an exponential
                 increase in the percentage of people owning and using a
                 smart phone. These devices have sensor-rich
                 touchscreens that can capture sensitive biometric
                 features such as keystroke typing and finger-.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "120",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zimmerling:2021:STL,
  author =       "Marco Zimmerling and Luca Mottola and Silvia Santini",
  title =        "Synchronous Transmissions in Low-Power Wireless: a
                 Survey of Communication Protocols and Network
                 Services",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "121:1--121:39",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3410159",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3410159",
  abstract =     "Low-power wireless communication is a central building
                 block of cyber-physical systems and the Internet of
                 Things. Conventional low-power wireless protocols make
                 avoiding packet collisions a cornerstone design choice.
                 The concept of synchronous \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "121",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Waheed:2021:SPI,
  author =       "Nazar Waheed and Xiangjian He and Muhammad Ikram and
                 Muhammad Usman and Saad Sajid Hashmi and Muhammad
                 Usman",
  title =        "Security and Privacy in {IoT} Using Machine Learning
                 and Blockchain: Threats and Countermeasures",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "122:1--122:37",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3417987",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3417987",
  abstract =     "Security and privacy of users have become significant
                 concerns due to the involvement of the Internet of
                 Things (IoT) devices in numerous applications. Cyber
                 threats are growing at an explosive pace making the
                 existing security and privacy measures inadequate.
                 Hence, everyone on the Internet is a product for
                 hackers. Consequently, Machine Learning (ML) algorithms
                 are used to produce accurate outputs from large complex
                 databases, where the generated outputs can be used to
                 predict and detect vulnerabilities in IoT-based
                 systems. Furthermore, Blockchain (BC) techniques are
                 becoming popular in modern IoT applications to solve
                 security and privacy issues. Several studies have been
                 conducted on either ML algorithms or BC techniques.
                 However, these studies target either security or
                 privacy issues using ML algorithms or BC techniques,
                 thus posing a need for a combined survey on efforts
                 made in recent years addressing both security and
                 privacy issues using ML algorithms and BC techniques.
                 In this article, we provide a summary of research
                 efforts made in the past few years, from 2008 to 2019,
                 addressing security and privacy issues using ML
                 algorithms and BC techniques in the IoT domain. First,
                 we discuss and categorize various security and privacy
                 threats reported in the past 12 years in the IoT
                 domain. We then classify the literature on security and
                 privacy efforts based on ML algorithms and BC
                 techniques in the IoT domain. Finally, we identify and
                 illuminate several challenges and future research
                 directions using ML algorithms and BC techniques to
                 address security and privacy issues in the IoT
                 domain.",
  acknowledgement = ack-nhfb,
  articleno =    "122",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{vanRozen:2021:LGP,
  author =       "Riemer van Rozen",
  title =        "Languages of Games and Play: a Systematic Mapping
                 Study",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "123:1--123:37",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3412843",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3412843",
  abstract =     "Digital games are a powerful means for creating
                 enticing, beautiful, educational, and often highly
                 addictive interactive experiences that impact the lives
                 of billions of players worldwide. We explore what
                 informs the design and construction of good \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "123",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Coscia:2021:NVD,
  author =       "Michele Coscia and Andres Gomez-Lievano and James
                 Mcnerney and Frank Neffke",
  title =        "The Node Vector Distance Problem in Complex Networks",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "124:1--124:27",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3416509",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3416509",
  abstract =     "We describe a problem in complex networks we call the
                 Node Vector Distance (NVD) problem, and we survey
                 algorithms currently able to address it. Complex
                 networks are a useful tool to map a non-trivial set of
                 relationships among connected entities, or \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "124",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Pibiri:2021:TII,
  author =       "Giulio Ermanno Pibiri and Rossano Venturini",
  title =        "Techniques for Inverted Index Compression",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "125:1--125:36",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3415148",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3415148",
  abstract =     "The data structure at the core of large-scale search
                 engines is the inverted index, which is essentially a
                 collection of sorted integer sequences called inverted
                 lists. Because of the many documents indexed by such
                 engines and stringent performance \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "125",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Qiu:2021:SAM,
  author =       "Junyang Qiu and Jun Zhang and Wei Luo and Lei Pan and
                 Surya Nepal and Yang Xiang",
  title =        "A Survey of {Android} Malware Detection with Deep
                 Neural Models",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "126:1--126:36",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3417978",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3417978",
  abstract =     "Deep Learning (DL) is a disruptive technology that has
                 changed the landscape of cyber security research. Deep
                 learning models have many advantages over traditional
                 Machine Learning (ML) models, particularly when there
                 is a large amount of data \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "126",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Christophides:2021:OEE,
  author =       "Vassilis Christophides and Vasilis Efthymiou and
                 Themis Palpanas and George Papadakis and Kostas
                 Stefanidis",
  title =        "An Overview of End-to-End Entity Resolution for Big
                 Data",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "127:1--127:42",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3418896",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3418896",
  abstract =     "One of the most critical tasks for improving data
                 quality and increasing the reliability of data
                 analytics is Entity Resolution (ER), which aims to
                 identify different descriptions that refer to the same
                 real-world entity. Despite several decades of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "127",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Turan:2021:TFA,
  author =       "Furkan Turan and Ingrid Verbauwhede",
  title =        "Trust in {FPGA}-accelerated Cloud Computing",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "128:1--128:28",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3419100",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3419100",
  abstract =     "Platforms combining Central Processing Systems (CPUs)
                 with Field Programmable Gate Arrays (FPGAs) have become
                 popular, as they promise high performance with energy
                 efficiency. This is the result of the combination of
                 FPGA accelerators tuned to the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "128",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Skaik:2021:USM,
  author =       "Ruba Skaik and Diana Inkpen",
  title =        "Using Social Media for Mental Health Surveillance: a
                 Review",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "129:1--129:31",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3422824",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3422824",
  abstract =     "Data on social media contain a wealth of user
                 information. Big data research of social media data may
                 also support standard surveillance approaches and
                 provide decision-makers with usable information. These
                 data can be analyzed using Natural Language \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "129",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Preum:2021:RCA,
  author =       "Sarah Masud Preum and Sirajum Munir and Meiyi Ma and
                 Mohammad Samin Yasar and David J. Stone and Ronald
                 Williams and Homa Alemzadeh and John A. Stankovic",
  title =        "A Review of Cognitive Assistants for Healthcare:
                 Trends, Prospects, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "130:1--130:37",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3419368",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3419368",
  abstract =     "Healthcare cognitive assistants (HCAs) are intelligent
                 systems or agents that interact with users in a
                 context-aware and adaptive manner to improve their
                 health outcomes by augmenting their cognitive abilities
                 or complementing a cognitive impairment. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "130",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bansal:2021:SIB,
  author =       "Maggi Bansal and Inderveer Chana and Siobh{\'a}n
                 Clarke",
  title =        "A Survey on {IoT} Big Data: Current Status, 13 {V}'s
                 Challenges, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "131:1--131:59",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3419634",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3419634",
  abstract =     "Driven by the core technologies, i.e., sensor-based
                 autonomous data acquisition and the cloud-based big
                 data analysis, IoT automates the actuation of
                 data-driven intelligent actions on the connected
                 objects. This automation enables numerous useful real-.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "131",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Tolmeijer:2021:IME,
  author =       "Suzanne Tolmeijer and Markus Kneer and Cristina
                 Sarasua and Markus Christen and Abraham Bernstein",
  title =        "Implementations in Machine Ethics: a Survey",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "132:1--132:38",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3419633",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3419633",
  abstract =     "Increasingly complex and autonomous systems require
                 machine ethics to maximize the benefits and minimize
                 the risks to society arising from the new technology.
                 It is challenging to decide which type of ethical
                 theory to employ and how to implement it \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "132",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhu:2021:SCC,
  author =       "Liehuang Zhu and Md M. Karim and Kashif Sharif and
                 Chang Xu and Fan Li and Xiaojiang Du and Mohsen
                 Guizani",
  title =        "{SDN} Controllers: a Comprehensive Analysis and
                 Performance Evaluation Study",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "133:1--133:40",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3421764",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3421764",
  abstract =     "Software-defined networks offer flexible and
                 intelligent network operations by splitting a
                 traditional network into a centralized control plane
                 and a programmable data plane. The controller in the
                 control plane is the fundamental element used to manage
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "133",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Boukerche:2021:DAP,
  author =       "Azzedine Boukerche and Peng Sun",
  title =        "Design of Algorithms and Protocols for Underwater
                 Acoustic Wireless Sensor Networks",
  journal =      j-COMP-SURV,
  volume =       "53",
  number =       "6",
  pages =        "134:1--134:34",
  month =        feb,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3421763",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Feb 5 10:42:27 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3421763",
  abstract =     "Nowadays, with the recent advances of wireless
                 underwater communication and acoustic sensor devices
                 technology, we are witnessing a surge in the
                 exploration and exploitation of the ocean's abundant
                 natural resources. Accordingly, to fulfill the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "134",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mladenovic:2021:CAC,
  author =       "Miljana Mladenovi{\'c} and Vera Osmjanski and Stasa
                 Vujici{\'c} Stankovi{\'c}",
  title =        "Cyber-aggression, Cyberbullying, and Cyber-grooming: a
                 Survey and Research Challenges",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "1:1--1:42",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3424246",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3424246",
  abstract =     "Cyber-aggression, cyberbullying, and cyber-grooming
                 are distinctive and similar phenomena that represent
                 the objectionable content appearing on online social
                 media. Timely detection of the objectionable content is
                 very important for its prevention and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Vyas:2021:RBC,
  author =       "Avani Vyas and Sujata Pal and Barun Kumar Saha",
  title =        "Relay-based Communications in {WBANs}: a Comprehensive
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "2:1--2:34",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3423164",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3423164",
  abstract =     "Wireless Body Area Networks (WBANs) constitute an
                 emerging technology in the field of health care that
                 makes health monitoring possible from one's home
                 itself. WBANs open many challenges by placing sensors
                 on/inside human bodies for collecting various
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Varela-Vaca:2021:SCL,
  author =       "{\'A}ngel Jes{\'u}s Varela-Vaca and Antonia M. Reina
                 Quintero",
  title =        "Smart Contract Languages: a Multivocal Mapping Study",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "3:1--3:38",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3423166",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3423166",
  abstract =     "Blockchain is a disruptive technology that has
                 attracted the attention of the scientific community and
                 companies, as proven by the exponential growth of
                 publications on this topic in recent years. This
                 growing interest is mainly due to the promise that
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jiang:2021:LPP,
  author =       "Hongbo Jiang and Jie Li and Ping Zhao and Fanzi Zeng
                 and Zhu Xiao and Arun Iyengar",
  title =        "Location Privacy-preserving Mechanisms in
                 Location-based Services: a Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "4:1--4:36",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3423165",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3423165",
  abstract =     "Location-based services (LBSs) provide enhanced
                 functionality and convenience of ubiquitous computing,
                 but they open up new vulnerabilities that can be
                 utilized to violate the users' privacy. The leakage of
                 private location data in the LBS context has \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wright:2021:CFR,
  author =       "Christopher Wright and William A. Moeglein and Saurabh
                 Bagchi and Milind Kulkarni and Abraham A. Clements",
  title =        "Challenges in Firmware Re-Hosting, Emulation, and
                 Analysis",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "5:1--5:36",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3423167",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3423167",
  abstract =     "System emulation and firmware re-hosting have become
                 popular techniques to answer various security and
                 performance related questions, such as determining
                 whether a firmware contain security vulnerabilities or
                 meet timing requirements when run on a \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gu:2021:SBC,
  author =       "Renjie Gu and Chaoyue Niu and Fan Wu and Guihai Chen
                 and Chun Hu and Chengfei Lyu and Zhihua Wu",
  title =        "From Server-Based to Client-Based Machine Learning: a
                 Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "6:1--6:36",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3424660",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3424660",
  abstract =     "In recent years, mobile devices have gained increasing
                 development with stronger computation capability and
                 larger storage space. Some of the computation-intensive
                 machine learning tasks can now be run on mobile
                 devices. To exploit the resources \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mirsky:2021:CDD,
  author =       "Yisroel Mirsky and Wenke Lee",
  title =        "The Creation and Detection of Deepfakes: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "7:1--7:41",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3425780",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3425780",
  abstract =     "Generative deep learning algorithms have progressed to
                 a point where it is difficult to tell the difference
                 between what is real and what is fake. In 2018, it was
                 discovered how easy it is to use this technology for
                 unethical and malicious applications, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Boyar:2021:RWO,
  author =       "Joan Boyar and Lene M. Favrholdt and Kim S. Larsen",
  title =        "Relative Worst-order Analysis: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "8:1--8:21",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3425910",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3425910",
  abstract =     "The standard measure for the quality of online
                 algorithms is the competitive ratio. This measure is
                 generally applicable, and for some problems it works
                 well, but for others it fails to distinguish between
                 algorithms that have very different \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ravi:2021:LBK,
  author =       "Prasanna Ravi and James Howe and Anupam Chattopadhyay
                 and Shivam Bhasin",
  title =        "Lattice-based Key-sharing Schemes: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "9:1--9:39",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3422178",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3422178",
  abstract =     "Public-key cryptography is an indispensable component
                 used in almost all of our present-day digital
                 infrastructure. However, most if not all of it is
                 predominantly built upon hardness guarantees of number
                 theoretic problems that can be broken by large-.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mirza:2021:PDL,
  author =       "Behroz Mirza and Tahir Q. Syed and Behraj Khan and
                 Yameen Malik",
  title =        "Potential Deep Learning Solutions to Persistent and
                 Emerging Big Data Challenges --- a Practitioners'
                 Cookbook",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "10:1--10:39",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3427476",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3427476",
  abstract =     "The phenomenon of Big Data continues to present moving
                 targets for the scientific and technological
                 state-of-the-art. This work demonstrates that the
                 solution space of these challenges has expanded with
                 deep learning now moving beyond traditional \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bernal:2021:SBC,
  author =       "Sergio L{\'o}pez Bernal and Alberto Huertas
                 Celdr{\'a}n and Gregorio Mart{\'\i}nez P{\'e}rez and
                 Michael Taynnan Barros and Sasitharan Balasubramaniam",
  title =        "Security in Brain-Computer Interfaces:
                 State-of-the-Art, Opportunities, and Future
                 Challenges",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "11:1--11:35",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3427376",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3427376",
  abstract =     "Brain-Computer Interfaces (BCIs) have significantly
                 improved the patients' quality of life by restoring
                 damaged hearing, sight, and movement capabilities.
                 After evolving their application scenarios, the current
                 trend of BCI is to enable new innovative \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang-Kennedy:2021:SRM,
  author =       "Leah Zhang-Kennedy and Sonia Chiasson",
  title =        "A Systematic Review of Multimedia Tools for
                 Cybersecurity Awareness and Education",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "12:1--12:39",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3427920",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3427920",
  abstract =     "We conduct a comprehensive review covering academic
                 publications and industry products relating to tools
                 for cybersecurity awareness and education aimed at
                 non-expert end-users developed in the past 20 years.
                 Through our search criteria, we identified \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jiang:2021:NOS,
  author =       "Shengming Jiang",
  title =        "Networking in Oceans: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "13:1--13:33",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3428147",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3428147",
  abstract =     "The ocean is a huge saltwater body that is different
                 from terrestrial environments in terms of deployment
                 circumstance, weather conditions, and user
                 distributions. Therefore, it is difficult to apply
                 terrestrial networking technologies directly in
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xu:2021:KGI,
  author =       "Weitao Xu and Junqing Zhang and Shunqi Huang and
                 Chengwen Luo and Wei Li",
  title =        "Key Generation for {Internet of Things}: a
                 Contemporary Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "14:1--14:37",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3429740",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3429740",
  abstract =     "Key generation is a promising technique to bootstrap
                 secure communications for the Internet of Things
                 devices that have no prior knowledge between each
                 other. In the past few years, a variety of key
                 generation protocols and systems have been proposed.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bellavista:2021:DLF,
  author =       "Paolo Bellavista and Luca Foschini and Alessio Mora",
  title =        "Decentralised Learning in Federated Deployment
                 Environments: a System-Level Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "15:1--15:38",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3429252",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3429252",
  abstract =     "Decentralised learning is attracting more and more
                 interest because it embodies the principles of data
                 minimisation and focused data collection, while
                 favouring the transparency of purpose specification
                 (i.e., the objective for which a model is built).
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sandhie:2021:IMV,
  author =       "Zarin Tasnim Sandhie and Jill Arvindbhai Patel and
                 Farid Uddin Ahmed and Masud H. Chowdhury",
  title =        "Investigation of Multiple-valued Logic Technologies
                 for Beyond-binary Era",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "16:1--16:30",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3431230",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3431230",
  abstract =     "Computing technologies are currently based on the
                 binary logic/number system, which is dependent on the
                 simple on and off switching mechanism of the prevailing
                 transistors. With the exponential increase of data
                 processing and storage needs, there is a \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chikhi:2021:DSR,
  author =       "Rayan Chikhi and Jan Holub and Paul Medvedev",
  title =        "Data Structures to Represent a Set of $k$-long {DNA}
                 Sequences",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "17:1--17:22",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3445967",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3445967",
  abstract =     "The analysis of biological sequencing data has been
                 one of the biggest applications of string algorithms.
                 The approaches used in many such applications are based
                 on the analysis of k -mers, which are short
                 fixed-length strings present in a dataset. While
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hernandez:2021:PTD,
  author =       "V{\'\i}ctor Adri{\'a}n Sosa Hern{\'a}ndez and Ra{\'u}l
                 Monroy and Miguel Angel Medina-P{\'e}rez and Octavio
                 Loyola-Gonz{\'a}lez and Francisco Herrera",
  title =        "A Practical Tutorial for Decision Tree Induction:
                 Evaluation Measures for Candidate Splits and
                 Opportunities",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "18:1--18:38",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3429739",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3429739",
  abstract =     "Experts from different domains have resorted to
                 machine learning techniques to produce explainable
                 models that support decision-making. Among existing
                 techniques, decision trees have been useful in many
                 application domains for classification. Decision
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mariani:2021:CAV,
  author =       "Stefano Mariani and Giacomo Cabri and Franco
                 Zambonelli",
  title =        "Coordination of Autonomous Vehicles: Taxonomy and
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "19:1--19:33",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3431231",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3431231",
  abstract =     "In the near future, our streets will be populated by
                 myriads of autonomous self-driving vehicles to serve
                 our diverse mobility needs. This will raise the need to
                 coordinate their movements in order to properly handle
                 both access to shared resources \ldots{}.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Nasar:2021:NER,
  author =       "Zara Nasar and Syed Waqar Jaffry and Muhammad Kamran
                 Malik",
  title =        "Named Entity Recognition and Relation Extraction:
                 State-of-the-Art",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "20:1--20:39",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3445965",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3445965",
  abstract =     "With the advent of Web 2.0, there exist many online
                 platforms that result in massive textual-data
                 production. With ever-increasing textual data at hand,
                 it is of immense importance to extract information
                 nuggets from this data. One approach towards \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Aliwa:2021:CCV,
  author =       "Emad Aliwa and Omer Rana and Charith Perera and Peter
                 Burnap",
  title =        "Cyberattacks and Countermeasures for In-Vehicle
                 Networks",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "21:1--21:37",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3431233",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3431233",
  abstract =     "As connectivity between and within vehicles increases,
                 so does concern about safety and security. Various
                 automotive serial protocols are used inside vehicles
                 such as Controller Area Network (CAN), Local
                 Interconnect Network (LIN), and FlexRay. CAN Bus
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Song:2021:SNI,
  author =       "Bosheng Song and Kenli Li and David
                 Orellana-Mart{\'\i}n and Mario J. P{\'e}rez-Jim{\'e}nez
                 and Ignacio P{\'e}Rez-Hurtado",
  title =        "A Survey of Nature-Inspired Computing: Membrane
                 Computing",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "22:1--22:31",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3431234",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3431234",
  abstract =     "Nature-inspired computing is a type of human-designed
                 computing motivated by nature, which is based on the
                 employ of paradigms, mechanisms, and principles
                 underlying natural systems. In this article, a
                 versatile and vigorous bio-inspired branch of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Minaeva:2021:SPS,
  author =       "Anna Minaeva and Zdenek Hanz{\'a}lek",
  title =        "Survey on Periodic Scheduling for Time-triggered Hard
                 Real-time Systems",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "23:1--23:32",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3431232",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3431232",
  abstract =     "This survey covers the basic principles and related
                 works addressing the time-triggered scheduling of
                 periodic tasks with deadlines. The wide range of
                 applications and the increasing complexity of modern
                 real-time systems result in the continually \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Distler:2021:BFT,
  author =       "Tobias Distler",
  title =        "{Byzantine} Fault-tolerant State-machine Replication
                 from a Systems Perspective",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "1",
  pages =        "24:1--24:38",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3436728",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3436728",
  abstract =     "Byzantine fault-tolerant (BFT) state-machine
                 replication makes it possible to design systems that
                 are resilient against arbitrary faults, a requirement
                 considered crucial for an increasing number of use
                 cases such as permissioned blockchains, firewalls,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Qasem:2021:AVD,
  author =       "Abdullah Qasem and Paria Shirani and Mourad Debbabi
                 and Lingyu Wang and Bernard Lebel and Basile L. Agba",
  title =        "Automatic Vulnerability Detection in Embedded Devices
                 and Firmware: Survey and Layered Taxonomies",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "25:1--25:42",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3432893",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3432893",
  abstract =     "In the era of the internet of things (IoT),
                 software-enabled inter-connected devices are of
                 paramount importance. The embedded systems are very
                 frequently used in both security and privacy-sensitive
                 applications. However, the underlying software (a.k.a.
                 \ldots{}).",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Navarro:2021:IHRa,
  author =       "Gonzalo Navarro",
  title =        "Indexing Highly Repetitive String Collections, {Part
                 II}: Compressed Indexes",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "26:1--26:32",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3432999",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3432999",
  abstract =     "Two decades ago, a breakthrough in indexing string
                 collections made it possible to represent them within
                 their compressed space while at the same time offering
                 indexed search functionalities. As this new technology
                 permeated through applications like bioinformatics, the
                 string collections experienced a growth that
                 outperforms Moore's Law and challenges our ability of
                 handling them even in compressed form. It turns out,
                 fortunately, that many of these rapidly growing string
                 collections are highly repetitive, so that their
                 information content is orders of magnitude lower than
                 their plain size. The statistical compression methods
                 used for classical collections, however, are blind to
                 this repetitiveness, and therefore a new set of
                 techniques has been developed to properly exploit it.
                 The resulting indexes form a new generation of data
                 structures able to handle the huge repetitive string
                 collections that we are facing. In this survey, formed
                 by two parts, we cover the algorithmic developments
                 that have led to these data structures.\par

                 In this second part, we describe the fundamental
                 algorithmic ideas and data structures that form the
                 base of all the existing indexes, and the various
                 concrete structures that have been proposed, comparing
                 them both in theoretical and practical aspects, and
                 uncovering some new combinations. We conclude with the
                 current challenges in this fascinating field.",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhou:2021:SIC,
  author =       "Fan Zhou and Xovee Xu and Goce Trajcevski and Kunpeng
                 Zhang",
  title =        "A Survey of Information Cascade Analysis: Models,
                 Predictions, and Recent Advances",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "27:1--27:36",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3433000",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3433000",
  abstract =     "The deluge of digital information in our daily
                 life-from user-generated content, such as microblogs
                 and scientific papers, to online business, such as
                 viral marketing and advertising-offers unprecedented
                 opportunities to explore and exploit the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ribeiro:2021:SSC,
  author =       "Pedro Ribeiro and Pedro Paredes and Miguel E. P. Silva
                 and David Aparicio and Fernando Silva",
  title =        "A Survey on Subgraph Counting: Concepts, Algorithms,
                 and Applications to Network Motifs and Graphlets",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "28:1--28:36",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3433652",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3433652",
  abstract =     "Computing subgraph frequencies is a fundamental task
                 that lies at the core of several network analysis
                 methodologies, such as network motifs and
                 graphlet-based metrics, which have been widely used to
                 categorize and compare networks from multiple
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Navarro:2021:IHRb,
  author =       "Gonzalo Navarro",
  title =        "Indexing Highly Repetitive String Collections, Part I:
                 Repetitiveness Measures",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "29:1--29:31",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3434399",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3434399",
  abstract =     "Two decades ago, a breakthrough in indexing string
                 collections made it possible to represent them within
                 their compressed space while at the same time offering
                 indexed search functionalities. As this new technology
                 permeated through applications like bioinformatics, the
                 string collections experienced a growth that
                 outperforms Moore's Law and challenges our ability to
                 handle them even in compressed form. It turns out,
                 fortunately, that many of these rapidly growing string
                 collections are highly repetitive, so that their
                 information content is orders of magnitude lower than
                 their plain size. The statistical compression methods
                 used for classical collections, however, are blind to
                 this repetitiveness, and therefore a new set of
                 techniques has been developed to properly exploit it.
                 The resulting indexes form a new generation of data
                 structures able to handle the huge repetitive string
                 collections that we are facing. In this survey, formed
                 by two parts, we cover the algorithmic developments
                 that have led to these data structures.

                 In this first part, we describe the distinct
                 compression paradigms that have been used to exploit
                 repetitiveness, and the algorithmic techniques that
                 provide direct access to the compressed strings. In the
                 quest for an ideal measure of repetitiveness, we
                 uncover a fascinating web of relations between those
                 measures, as well as the limits up to which the data
                 can be recovered, and up to which direct access to the
                 compressed data can be provided. This is the basic
                 aspect of indexability, which is covered in the second
                 part of this survey.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Boukerche:2021:ODU,
  author =       "Azzedine Boukerche and Zhijun Hou",
  title =        "Object Detection Using Deep Learning Methods in
                 Traffic Scenarios",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "30:1--30:35",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3434398",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3434398",
  abstract =     "The recent boom of autonomous driving nowadays has
                 made object detection in traffic scenes a hot topic of
                 research. Designed to classify and locate instances in
                 the image, this is a basic but challenging task in the
                 computer vision field. With its \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2021:WML,
  author =       "Bo Liu and Ming Ding and Sina Shaham and Wenny Rahayu
                 and Farhad Farokhi and Zihuai Lin",
  title =        "When Machine Learning Meets Privacy: a Survey and
                 Outlook",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "31:1--31:36",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3436755",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3436755",
  abstract =     "The newly emerged machine learning (e.g., deep
                 learning) methods have become a strong driving force to
                 revolutionize a wide range of industries, such as smart
                 healthcare, financial technology, and surveillance
                 systems. Meanwhile, privacy has emerged as \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2021:DAE,
  author =       "Chenning Li and Zhichao Cao and Yunhao Liu",
  title =        "Deep {AI} Enabled Ubiquitous Wireless Sensing: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "32:1--32:35",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3436729",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3436729",
  abstract =     "With the development of the Internet of Things (IoT),
                 many kinds of wireless signals (e.g., Wi-Fi, LoRa,
                 RFID) are filling our living and working spaces
                 nowadays. Beyond communication, wireless signals can
                 sense the status of surrounding objects, known
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Harley:2021:IIW,
  author =       "Kelsey Harley and Rodney Cooper",
  title =        "Information Integrity: Are We There Yet?",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "33:1--33:35",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3436817",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3436817",
  abstract =     "The understanding and promotion of integrity in
                 information security has traditionally been
                 underemphasized or even ignored. From implantable
                 medical devices and electronic voting to vehicle
                 control, the critical importance of information
                 integrity to \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Talbi:2021:ADD,
  author =       "El-Ghazali Talbi",
  title =        "Automated Design of Deep Neural Networks: a Survey and
                 Unified Taxonomy",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "34:1--34:37",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3439730",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3439730",
  abstract =     "In recent years, research in applying optimization
                 approaches in the automatic design of deep neural
                 networks has become increasingly popular. Although
                 various approaches have been proposed, there is a lack
                 of a comprehensive survey and taxonomy on this
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Deldjoo:2021:SAR,
  author =       "Yashar Deldjoo and Tommaso {Di Noia} and Felice
                 Antonio Merra",
  title =        "A Survey on Adversarial Recommender Systems: From
                 Attack\slash Defense Strategies to Generative
                 Adversarial Networks",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "35:1--35:38",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3439729",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3439729",
  abstract =     "Latent-factor models (LFM) based on collaborative
                 filtering (CF), such as matrix factorization (MF) and
                 deep CF methods, are widely used in modern recommender
                 systems (RS) due to their excellent performance and
                 recommendation accuracy. However, success \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bouhenni:2021:SDG,
  author =       "Sarra Bouhenni and Sa{\"\i}d Yahiaoui and Nadia
                 Nouali-Taboudjemat and Hamamache Kheddouci",
  title =        "A Survey on Distributed Graph Pattern Matching in
                 Massive Graphs",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "36:1--36:35",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3439724",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3439724",
  abstract =     "Besides its NP-completeness, the strict constraints of
                 subgraph isomorphism are making it impractical for
                 graph pattern matching (GPM) in the context of big
                 data. As a result, relaxed GPM models have emerged as
                 they yield interesting results in a \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2021:GAN,
  author =       "Zhengwei Wang and Qi She and Tom{\'a}s E. Ward",
  title =        "Generative Adversarial Networks in Computer Vision: a
                 Survey and Taxonomy",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "37:1--37:38",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3439723",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3439723",
  abstract =     "Generative adversarial networks (GANs) have been
                 extensively studied in the past few years. Arguably
                 their most significant impact has been in the area of
                 computer vision where great advances have been made in
                 challenges such as plausible image \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Pang:2021:DLA,
  author =       "Guansong Pang and Chunhua Shen and Longbing Cao and
                 Anton {Van Den Hengel}",
  title =        "Deep Learning for Anomaly Detection: a Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "38:1--38:38",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3439950",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3439950",
  abstract =     "Anomaly detection, a.k.a. outlier detection or novelty
                 detection, has been a lasting yet active research area
                 in various research communities for several decades.
                 There are still some unique problem complexities and
                 challenges that require advanced \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2021:STD,
  author =       "Sheng Wang and Zhifeng Bao and J. Shane Culpepper and
                 Gao Cong",
  title =        "A Survey on Trajectory Data Management, Analytics, and
                 Learning",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "39:1--39:36",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3440207",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3440207",
  abstract =     "Recent advances in sensor and mobile devices have
                 enabled an unprecedented increase in the availability
                 and collection of urban trajectory data, thus
                 increasing the demand for more efficient ways to manage
                 and analyze the data being produced. In this \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Meurisch:2021:DPA,
  author =       "Christian Meurisch and Max M{\"u}hlh{\"a}user",
  title =        "Data Protection in {AI} Services: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "40:1--40:38",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3440754",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3440754",
  abstract =     "Advances in artificial intelligence (AI) have shaped
                 today's user services, enabling enhanced
                 personalization and better support. As such AI-based
                 services inevitably require user data, the resulting
                 privacy implications are de facto the unacceptable
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chandrasekaran:2021:ESS,
  author =       "Dhivya Chandrasekaran and Vijay Mago",
  title =        "Evolution of Semantic Similarity --- a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "41:1--41:37",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3440755",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3440755",
  abstract =     "Estimating the semantic similarity between text data
                 is one of the challenging and open research problems in
                 the field of Natural Language Processing (NLP). The
                 versatility of natural language makes it difficult to
                 define rule-based methods for \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2021:TRW,
  author =       "Xiaoxue Chen and Lianwen Jin and Yuanzhi Zhu and
                 Canjie Luo and Tianwei Wang",
  title =        "Text Recognition in the Wild: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "42:1--42:35",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3440756",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3440756",
  abstract =     "The history of text can be traced back over thousands
                 of years. Rich and precise semantic information carried
                 by text is important in a wide range of vision-based
                 application scenarios. Therefore, text recognition in
                 natural scenes has been an active research topic in
                 computer vision and pattern recognition. In recent
                 years, with the rise and development of deep learning,
                 numerous methods have shown promising results in terms
                 of innovation, practicality, and efficiency. This
                 article aims to (1) summarize the fundamental problems
                 and the state-of-the-art associated with scene text
                 recognition, (2) introduce new insights and ideas, (3)
                 provide a comprehensive review of publicly available
                 resources, and (4) point out directions for future
                 work. In summary, this literature review attempts to
                 present an entire picture of the field of scene text
                 recognition. It provides a comprehensive reference for
                 people entering this field and could be helpful in
                 inspiring future research. Related resources are
                 available at our GitHub repository:
                 https://github.com/HCIILAB/Scene-Text-Recognition.",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Al-Thanyyan:2021:ATS,
  author =       "Suha S. Al-Thanyyan and Aqil M. Azmi",
  title =        "Automated Text Simplification: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "43:1--43:36",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3442695",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3442695",
  abstract =     "Text simplification (TS) reduces the complexity of the
                 text to improve its readability and understandability,
                 while possibly retaining its original information
                 content. Over time, TS has become an essential tool in
                 helping those with low literacy levels,. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Huang:2021:SSA,
  author =       "Huawei Huang and Wei Kong and Sicong Zhou and Zibin
                 Zheng and Song Guo",
  title =        "A Survey of State-of-the-Art on Blockchains: Theories,
                 Modelings, and Tools",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "44:1--44:42",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3441692",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3441692",
  abstract =     "To draw a roadmap of current research activities of
                 the blockchain community, we first conduct a brief
                 overview of state-of-the-art blockchain surveys
                 published in the past 5 years. We found that those
                 surveys are basically studying the blockchain-based
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Maruf:2021:SDL,
  author =       "Sameen Maruf and Fahimeh Saleh and Gholamreza
                 Haffari",
  title =        "A Survey on Document-level Neural Machine Translation:
                 Methods and Evaluation",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "45:1--45:36",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3441691",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3441691",
  abstract =     "Machine translation (MT) is an important task in
                 natural language processing (NLP), as it automates the
                 translation process and reduces the reliance on human
                 translators. With the resurgence of neural networks,
                 the translation quality surpasses that of \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "45",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Magalhaes:2021:MMD,
  author =       "Arlino Magalhaes and Jose Maria Monteiro and Angelo
                 Brayner",
  title =        "Main Memory Database Recovery: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "2",
  pages =        "46:1--46:36",
  month =        apr,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3442197",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Apr 23 10:35:01 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3442197",
  abstract =     "Many of today's applications need massive real-time
                 data processing. In-memory database systems have become
                 a good alternative for these requirements. These
                 systems maintain the primary copy of the database in
                 the main memory to achieve high throughput \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "46",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hassanin:2021:VAF,
  author =       "Mohammed Hassanin and Salman Khan and Murat Tahtali",
  title =        "Visual Affordance and Function Understanding: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "47:1--47:35",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3446370",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3446370",
  abstract =     "Nowadays, robots are dominating the manufacturing,
                 entertainment, and healthcare industries. Robot vision
                 aims to equip robots with the capabilities to discover
                 information, understand it, and interact with the
                 environment, which require an agent to \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "47",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Magnani:2021:CDM,
  author =       "Matteo Magnani and Obaida Hanteer and Roberto
                 Interdonato and Luca Rossi and Andrea Tagarelli",
  title =        "Community Detection in Multiplex Networks",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "48:1--48:35",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3444688",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3444688",
  abstract =     "A multiplex network models different modes of
                 interaction among same-type entities. In this article,
                 we provide a taxonomy of community detection algorithms
                 in multiplex networks. We characterize the different
                 algorithms based on various properties and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Celes:2021:MTA,
  author =       "Clayson Celes and Azzedine Boukerche and Antonio A. F.
                 Loureiro",
  title =        "Mobility Trace Analysis for Intelligent Vehicular
                 Networks: Methods, Models, and Applications",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "49:1--49:38",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3446679",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3446679",
  abstract =     "Intelligent vehicular networks emerge as a promising
                 technology to provide efficient data communication in
                 transportation systems and smart cities. At the same
                 time, the popularization of devices with attached
                 sensors has allowed the obtaining of a \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "49",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sabir:2021:MLD,
  author =       "Bushra Sabir and Faheem Ullah and M. Ali Babar and Raj
                 Gaire",
  title =        "Machine Learning for Detecting Data Exfiltration: a
                 Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "50:1--50:47",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3442181",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3442181",
  abstract =     "Context: Research at the intersection of
                 cybersecurity, Machine Learning (ML), and Software
                 Engineering (SE) has recently taken significant steps
                 in proposing countermeasures for detecting
                 sophisticated data exfiltration attacks. It is
                 important to \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{UlHaq:2021:SBC,
  author =       "Irfan {Ul Haq} and Juan Caballero",
  title =        "A Survey of Binary Code Similarity",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "51:1--51:38",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3446371",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3446371",
  abstract =     "Binary code similarity approaches compare two or more
                 pieces of binary code to identify their similarities
                 and differences. The ability to compare binary code
                 enables many real-world applications on scenarios where
                 source code may not be available such \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "51",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mitra:2021:CIA,
  author =       "Shyamali Mitra and Nibaran Das and Soumyajyoti Dey and
                 Sukanta Chakraborty and Mita Nasipuri and Mrinal Kanti
                 Naskar",
  title =        "Cytology Image Analysis Techniques Toward Automation:
                 Systematically Revisited",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "52:1--52:41",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447238",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447238",
  abstract =     "Cytology is a branch of pathology that deals with the
                 microscopic examination of cells for diagnosis of
                 carcinoma or inflammatory conditions. In the present
                 work, the term cytology is used to indicate solid organ
                 cytology. Automation in cytology started \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bluemke:2021:STE,
  author =       "Ilona Bluemke and Agnieszka Malanowska",
  title =        "Software Testing Effort Estimation and Related
                 Problems: a Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "53:1--53:38",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3442694",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3442694",
  abstract =     "Although testing effort estimation is a very important
                 task in software project management, it is rarely
                 described in the literature. There are many
                 difficulties in finding any useful methods or tools for
                 this purpose. Solutions to many other problems
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xiong:2021:STE,
  author =       "Wenjie Xiong and Jakub Szefer",
  title =        "Survey of Transient Execution Attacks and Their
                 Mitigations",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "54:1--54:36",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3442479",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3442479",
  abstract =     "Transient execution attacks, also known as speculative
                 execution attacks, have drawn much interest in the last
                 few years as they can cause critical data leakage.
                 Since the first disclosure of Spectre and Meltdown
                 attacks in January 2018, a number of new \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhao:2021:NLP,
  author =       "Liping Zhao and Waad Alhoshan and Alessio Ferrari and
                 Keletso J. Letsholo and Muideen A. Ajagbe and
                 Erol-Valeriu Chioasca and Riza T. Batista-Navarro",
  title =        "Natural Language Processing for Requirements
                 Engineering: a Systematic Mapping Study",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "55:1--55:41",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3444689",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3444689",
  abstract =     "Natural Language Processing for Requirements
                 Engineering (NLP4RE) is an area of research and
                 development that seeks to apply natural language
                 processing (NLP) techniques, tools, and resources to
                 the requirements engineering (RE) process, to support
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "55",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Blazquez-Garcia:2021:ROA,
  author =       "Ane Bl{\'a}zquez-Garc{\'\i}a and Angel Conde and Usue
                 Mori and Jose A. Lozano",
  title =        "A Review on Outlier\slash Anomaly Detection in Time
                 Series Data",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "56:1--56:33",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3444690",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3444690",
  abstract =     "Recent advances in technology have brought major
                 breakthroughs in data collection, enabling a large
                 amount of data to be gathered over time and thus
                 generating time series. Mining this data has become an
                 important task for researchers and practitioners
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "56",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hamdani:2021:CSC,
  author =       "Syed Wasif Abbas Hamdani and Haider Abbas and Abdul
                 Rehman Janjua and Waleed Bin Shahid and Muhammad Faisal
                 Amjad and Jahanzaib Malik and Malik Hamza Murtaza and
                 Mohammed Atiquzzaman and Abdul Waheed Khan",
  title =        "Cybersecurity Standards in the Context of Operating
                 System: Practical Aspects, Analysis, and Comparisons",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "57:1--57:36",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3442480",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3442480",
  abstract =     "Cyber threats have been growing tremendously in recent
                 years. There are significant advancements in the threat
                 space that have led towards an essential need for the
                 strengthening of digital infrastructure security.
                 Better security can be achieved by \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "57",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2021:BED,
  author =       "Xi Li and Zehua Wang and Victor C. M. Leung and Hong
                 Ji and Yiming Liu and Heli Zhang",
  title =        "Blockchain-empowered Data-driven Networks: a Survey
                 and Outlook",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "58:1--58:38",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3446373",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3446373",
  abstract =     "The paths leading to future networks are pointing
                 towards a data-driven paradigm to better cater to the
                 explosive growth of mobile services as well as the
                 increasing heterogeneity of mobile devices, many of
                 which generate and consume large volumes and variety of
                 data. These paths are also hampered by significant
                 challenges in terms of security, privacy, services
                 provisioning, and network management. Blockchain, which
                 is a technology for building distributed ledgers that
                 provide an immutable log of transactions recorded in a
                 distributed network, has become prominent recently as
                 the underlying technology of cryptocurrencies and is
                 revolutionizing data storage and processing in computer
                 network systems. For future data-driven networks
                 (DDNs), blockchain is considered as a promising
                 solution to enable the secure storage, sharing, and
                 analytics of data, privacy protection for users,
                 robust, trustworthy network control, and decentralized
                 routing and resource managements. However, many
                 important challenges and open issues remain to be
                 addressed before blockchain can be deployed widely to
                 enable future DDNs. In this article, we present a
                 survey on the existing research works on the
                 application of blockchain technologies in computer
                 networks and identify challenges and potential
                 solutions in the applications of blockchains in future
                 DDNs. We identify application scenarios in which future
                 blockchain-empowered DDNs could improve the efficiency
                 and security, and generally the effectiveness of
                 network services.",
  acknowledgement = ack-nhfb,
  articleno =    "58",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Spelda:2021:HIM,
  author =       "Petr Spelda and Vit Stritecky",
  title =        "Human Induction in Machine Learning: a Survey of the
                 Nexus",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "59:1--59:18",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3444691",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3444691",
  abstract =     "As our epistemic ambitions grow, the common and
                 scientific endeavours are becoming increasingly
                 dependent on Machine Learning (ML). The field rests on
                 a single experimental paradigm, which consists of
                 splitting the available data into a training and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "59",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Huang:2021:ABT,
  author =       "Jun Huang and Debiao He and Mohammad S. Obaidat and
                 Pandi Vijayakumar and Min Luo and Kim-Kwang Raymond
                 Choo",
  title =        "The Application of the Blockchain Technology in Voting
                 Systems: a Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "60:1--60:28",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3439725",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3439725",
  abstract =     "Voting is a formal expression of opinion or choice,
                 either positive or negative, made by an individual or a
                 group of individuals. However, conventional voting
                 systems tend to be centralized, which are known to
                 suffer from security and efficiency limitations. Hence,
                 there has been a trend of moving to decentralized
                 voting systems, such as those based on blockchain. The
                 latter is a decentralized digital ledger in a
                 peer-to-peer network, where a copy of the append-only
                 ledger of digitally signed and encrypted transactions
                 is maintained by each participant. Therefore, in this
                 article, we perform a comprehensive review of
                 blockchain-based voting systems and classify them based
                 on a number of features (e.g., the types of blockchain
                 used, the consensus approaches used, and the scale of
                 participants). By systematically analyzing and
                 comparing the different blockchain-based voting
                 systems, we also identify a number of limitations and
                 research opportunities. Hopefully, this survey will
                 provide an in-depth insight into the potential utility
                 of blockchain in voting systems and device future
                 research agenda.",
  acknowledgement = ack-nhfb,
  articleno =    "60",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Nour:2021:ACM,
  author =       "Boubakr Nour and Hakima Khelifi and Rasheed Hussain
                 and Spyridon Mastorakis and Hassine Moungla",
  title =        "Access Control Mechanisms in Named Data Networks: a
                 Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "61:1--61:35",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3442150",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3442150",
  abstract =     "Information-Centric Networking (ICN) has recently
                 emerged as a prominent candidate for the Future
                 Internet Architecture (FIA) that addresses existing
                 issues with the host-centric communication model of the
                 current TCP/IP-based Internet. Named Data \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "61",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Minaee:2021:DLB,
  author =       "Shervin Minaee and Nal Kalchbrenner and Erik Cambria
                 and Narjes Nikzad and Meysam Chenaghlu and Jianfeng
                 Gao",
  title =        "Deep Learning--based Text Classification: a
                 Comprehensive Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "62:1--62:40",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3439726",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3439726",
  abstract =     "Deep learning--based models have surpassed classical
                 machine learning--based approaches in various text
                 classification tasks, including sentiment analysis,
                 news categorization, question answering, and natural
                 language inference. In this article, we \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "62",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Saxena:2021:GAN,
  author =       "Divya Saxena and Jiannong Cao",
  title =        "Generative Adversarial Networks {(GANs)}: Challenges,
                 Solutions, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "63:1--63:42",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3446374",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3446374",
  abstract =     "Generative Adversarial Networks (GANs) is a novel
                 class of deep generative models that has recently
                 gained significant attention. GANs learn complex and
                 high-dimensional distributions implicitly over images,
                 audio, and data. However, there exist major \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "63",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gharibshah:2021:URP,
  author =       "Zhabiz Gharibshah and Xingquan Zhu",
  title =        "User Response Prediction in Online Advertising",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "64:1--64:43",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3446662",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3446662",
  abstract =     "Online advertising, as a vast market, has gained
                 significant attention in various platforms ranging from
                 search engines, third-party websites, social media, and
                 mobile apps. The prosperity of online campaigns is a
                 challenge in online marketing and is \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "64",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Astolfi:2021:SPR,
  author =       "Gilberto Astolfi and F{\'a}bio Prestes Cesar Rezende
                 and Jo{\~a}o Vitor {De Andrade} Porto and Edson Takashi
                 Matsubara and Hemerson Pistori",
  title =        "Syntactic Pattern Recognition in Computer Vision: a
                 Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "65:1--65:35",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447241",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447241",
  abstract =     "Using techniques derived from the syntactic methods
                 for visual pattern recognition is not new and was much
                 explored in the area called syntactical or structural
                 pattern recognition. Syntactic methods have been useful
                 because they are intuitively simple \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "65",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Varghese:2021:SEP,
  author =       "Blesson Varghese and Nan Wang and David Bermbach and
                 Cheol-Ho Hong and Eyal {De Lara} and Weisong Shi and
                 Christopher Stewart",
  title =        "A Survey on Edge Performance Benchmarking",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "66:1--66:33",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3444692",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3444692",
  abstract =     "Edge computing is the next Internet frontier that will
                 leverage computing resources located near users,
                 sensors, and data stores to provide more responsive
                 services. Therefore, it is envisioned that a
                 large-scale, geographically dispersed, and resource-.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "66",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Avola:2021:UMI,
  author =       "Danilo Avola and Luigi Cinque and Alessio Fagioli and
                 Gianluca Foresti and Alessio Mecca",
  title =        "Ultrasound Medical Imaging Techniques: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "67:1--67:38",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447243",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447243",
  abstract =     "Ultrasound (US) imaging for medical purposes has been
                 increasing in popularity over the years. The US
                 technology has some valuable strengths, such as it is
                 harmless, very cheap, and can provide real-time
                 feedback. At the same time, it has also some \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "67",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Muhammad:2021:FLS,
  author =       "Khan Muhammad and Mohammad S. Obaidat and Tanveer
                 Hussain and Javier {Del Ser} and Neeraj Kumar and
                 Mohammad Tanveer and Faiyaz Doctor",
  title =        "Fuzzy Logic in Surveillance Big Video Data Analysis:
                 Comprehensive Review, Challenges, and Research
                 Directions",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "68:1--68:33",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3444693",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3444693",
  abstract =     "CCTV cameras installed for continuous surveillance
                 generate enormous amounts of data daily, forging the
                 term Big Video Data (BVD). The active practice of BVD
                 includes intelligent surveillance and activity
                 recognition, among other challenging tasks. To
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "68",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alharbi:2021:SMI,
  author =       "Ahmed Alharbi and Hai Dong and Xun Yi and Zahir Tari
                 and Ibrahim Khalil",
  title =        "Social Media Identity Deception Detection: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "3",
  pages =        "69:1--69:35",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3446372",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jun 7 07:26:56 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3446372",
  abstract =     "Social media have been growing rapidly and become
                 essential elements of many people's lives. Meanwhile,
                 social media have also come to be a popular source for
                 identity deception. Many social media identity
                 deception cases have arisen over the past few
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "69",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gewers:2021:PCA,
  author =       "Felipe L. Gewers and Gustavo R. Ferreira and Henrique
                 F. {De Arruda} and Filipi N. Silva and Cesar H. Comin
                 and Diego R. Amancio and Luciano {Da F.Costa}",
  title =        "Principal Component Analysis: a Natural Approach to
                 Data Exploration",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "70:1--70:34",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447755",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447755",
  abstract =     "Principal component analysis (PCA) is often applied
                 for analyzing data in the most diverse areas. This work
                 reports, in an accessible and integrated manner,
                 several theoretical and practical aspects of PCA. The
                 basic principles underlying PCA, data \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "70",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hogan:2021:KG,
  author =       "Aidan Hogan and Eva Blomqvist and Michael Cochez and
                 Claudia D'amato and Gerard {De Melo} and Claudio
                 Gutierrez and Sabrina Kirrane and Jos{\'e} Emilio
                 {Labra Gayo} and Roberto Navigli and Sebastian Neumaier
                 and Axel-Cyrille {Ngonga Ngomo} and Axel Polleres and
                 Sabbir M. Rashid and Anisa Rula and Lukas Schmelzeisen
                 and Juan Sequeda and Steffen Staab and Antoine
                 Zimmermann",
  title =        "Knowledge Graphs",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "71:1--71:37",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447772",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447772",
  abstract =     "In this article, we provide a comprehensive
                 introduction to knowledge graphs, which have recently
                 garnered significant attention from both industry and
                 academia in scenarios that require exploiting diverse,
                 dynamic, large-scale collections of data. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "71",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cheng:2021:FMC,
  author =       "Wen-Huang Cheng and Sijie Song and Chieh-Yun Chen and
                 Shintami Chusnul Hidayati and Jiaying Liu",
  title =        "Fashion Meets Computer Vision: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "72:1--72:41",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447239",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447239",
  abstract =     "Fashion is the way we present ourselves to the world
                 and has become one of the world's largest industries.
                 Fashion, mainly conveyed by vision, has thus attracted
                 much attention from computer vision researchers in
                 recent years. Given the rapid \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "72",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Dunne:2021:SAI,
  author =       "Rob Dunne and Tim Morris and Simon Harper",
  title =        "A Survey of Ambient Intelligence",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "73:1--73:27",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447242",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447242",
  abstract =     "Ambient Intelligence (AmI) is the application and
                 embedding of artificial intelligence into everyday
                 environments to seamlessly provide assistive and
                 predictive support in a multitude of scenarios via an
                 invisible user interface. These can be as diverse
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "73",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kabir:2021:UAD,
  author =       "H. M. Dipu Kabir and Abbas Khosravi and Subrota K.
                 Mondal and Mustaneer Rahman and Saeid Nahavandi and
                 Rajkumar Buyya",
  title =        "Uncertainty-aware Decisions in Cloud Computing:
                 Foundations and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "74:1--74:30",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447583",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447583",
  abstract =     "The rapid growth of the cloud industry has increased
                 challenges in the proper governance of the cloud
                 infrastructure. Many intelligent systems have been
                 developing, considering uncertainties in the cloud.
                 Intelligent approaches with the consideration of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "74",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2021:ICS,
  author =       "Fei Chen and Duming Luo and Tao Xiang and Ping Chen
                 and Junfeng Fan and Hong-Linh Truong",
  title =        "{IoT} Cloud Security Review: a Case Study Approach
                 Using Emerging Consumer-oriented Applications",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "75:1--75:36",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447625",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447625",
  abstract =     "Recent years have seen the rapid development and
                 integration of the Internet of Things (IoT) and cloud
                 computing. The market is providing various
                 consumer-oriented smart IoT devices; the mainstream
                 cloud service providers are building their software
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "75",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ren:2021:CSN,
  author =       "Pengzhen Ren and Yun Xiao and Xiaojun Chang and Po-yao
                 Huang and Zhihui Li and Xiaojiang Chen and Xin Wang",
  title =        "A Comprehensive Survey of Neural Architecture Search:
                 Challenges and Solutions",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "76:1--76:34",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447582",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447582",
  abstract =     "Deep learning has made substantial breakthroughs in
                 many fields due to its powerful automatic
                 representation capabilities. It has been proven that
                 neural architecture design is crucial to the feature
                 representation of data and the final performance.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "76",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2021:DLS,
  author =       "Kaixuan Chen and Dalin Zhang and Lina Yao and Bin Guo
                 and Zhiwen Yu and Yunhao Liu",
  title =        "Deep Learning for Sensor-based Human Activity
                 Recognition: Overview, Challenges, and Opportunities",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "77:1--77:40",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447744",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447744",
  abstract =     "The vast proliferation of sensor devices and Internet
                 of Things enables the applications of sensor-based
                 activity recognition. However, there exist substantial
                 challenges that could influence the performance of the
                 recognition system in practical \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "77",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Russo:2021:PSS,
  author =       "Daniel Russo and Klaas-Jan Stol",
  title =        "{PLS-SEM} for Software Engineering Research: an
                 Introduction and Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "78:1--78:38",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447580",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447580",
  abstract =     "Software Engineering (SE) researchers are increasingly
                 paying attention to organizational and human factors.
                 Rather than focusing only on variables that can be
                 directly measured, such as lines of code, SE research
                 studies now also consider unobservable \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "78",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Salam:2021:PRL,
  author =       "Abdus Salam and Rolf Schwitter and Mehmet A. Orgun",
  title =        "Probabilistic Rule Learning Systems: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "79:1--79:16",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447581",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447581",
  abstract =     "This survey provides an overview of rule learning
                 systems that can learn the structure of probabilistic
                 rules for uncertain domains. These systems are very
                 useful in such domains because they can be trained with
                 a small amount of positive and negative \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "79",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{AlmarazLuengo:2021:RSR,
  author =       "Elena {Almaraz Luengo} and Luis Javier Garc{\'\i}a
                 Villalba",
  title =        "Recommendations on Statistical Randomness Test
                 Batteries for Cryptographic Purposes",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "80:1--80:34",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447773",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447773",
  abstract =     "Security in different applications is closely related
                 to the goodness of the sequences generated for such
                 purposes. Not only in Cryptography but also in other
                 areas, it is necessary to obtain long sequences of
                 random numbers or that, at least, behave as such. To
                 decide whether the generator used produces sequences
                 that are random, unpredictable and independent,
                 statistical checks are needed. Different batteries of
                 hypothesis tests have been proposed for this
                 purpose.\par

                 In this work, a survey of the main test batteries is
                 presented, indicating their pros and cons, giving some
                 guidelines for their use and presenting some practical
                 examples.",
  acknowledgement = ack-nhfb,
  articleno =    "80",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Seaborn:2021:VHA,
  author =       "Katie Seaborn and Norihisa P. Miyake and Peter
                 Pennefather and Mihoko Otake-Matsuura",
  title =        "Voice in Human-Agent Interaction: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "81:1--81:43",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3386867",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3386867",
  abstract =     "Social robots, conversational agents, voice
                 assistants, and other embodied AI are increasingly a
                 feature of everyday life. What connects these various
                 types of intelligent agents is their ability to
                 interact with people through voice. Voice is becoming
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "81",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Michel:2021:PDP,
  author =       "Oliver Michel and Roberto Bifulco and G{\'a}bor
                 R{\'e}tv{\'a}ri and Stefan Schmid",
  title =        "The Programmable Data Plane: Abstractions,
                 Architectures, Algorithms, and Applications",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "82:1--82:36",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447868",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447868",
  abstract =     "Programmable data plane technologies enable the
                 systematic reconfiguration of the low-level processing
                 steps applied to network packets and are key drivers
                 toward realizing the next generation of network
                 services and applications. This survey presents
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "82",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hu:2021:HIF,
  author =       "Wei Hu and Armaiti Ardeshiricham and Ryan Kastner",
  title =        "Hardware Information Flow Tracking",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "83:1--83:39",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447867",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447867",
  abstract =     "Information flow tracking (IFT) is a fundamental
                 computer security technique used to understand how
                 information moves through a computing system. Hardware
                 IFT techniques specifically target security
                 vulnerabilities related to the design, verification,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "83",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Boukerche:2021:VBA,
  author =       "Azzedine Boukerche and Xiren Ma",
  title =        "Vision-based Autonomous Vehicle Recognition: a New
                 Challenge for Deep Learning-based Systems",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "84:1--84:37",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447866",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447866",
  abstract =     "Vision-based Automated Vehicle Recognition (VAVR) has
                 attracted considerable attention recently. Particularly
                 given the reliance on emerging deep learning methods,
                 which have powerful feature extraction and pattern
                 learning abilities, vehicle \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "84",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Afsar:2021:API,
  author =       "Bekir Afsar and Kaisa Miettinen and Francisco Ruiz",
  title =        "Assessing the Performance of Interactive
                 Multiobjective Optimization Methods: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "85:1--85:27",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3448301",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3448301",
  abstract =     "Interactive methods are useful decision-making tools
                 for multiobjective optimization problems, because they
                 allow a decision-maker to provide her/his preference
                 information iteratively in a comfortable way at the
                 same time as (s)he learns about all \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "85",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Tripathi:2021:ALD,
  author =       "Nikhil Tripathi and Neminath Hubballi",
  title =        "Application Layer Denial-of-Service Attacks and
                 Defense Mechanisms: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "86:1--86:33",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3448291",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3448291",
  abstract =     "Application layer Denial-of-Service (DoS) attacks are
                 generated by exploiting vulnerabilities of the protocol
                 implementation or its design. Unlike volumetric DoS
                 attacks, these are stealthy in nature and target a
                 specific application running on the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "86",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Tang:2021:DRM,
  author =       "Yunbo Tang and Dan Chen and Xiaoli Li",
  title =        "Dimensionality Reduction Methods for Brain Imaging
                 Data Analysis",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "87:1--87:36",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3448302",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3448302",
  abstract =     "The past century has witnessed the grand success of
                 brain imaging technologies, such as
                 electroencephalography and magnetic resonance imaging,
                 in probing cognitive states and pathological brain
                 dynamics for neuroscience research and neurology
                 practices. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "87",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ridolfi:2021:SCC,
  author =       "Matteo Ridolfi and Abdil Kaya and Rafael Berkvens and
                 Maarten Weyn and Wout Joseph and Eli {De Poorter}",
  title =        "Self-calibration and Collaborative Localization for
                 {UWB} Positioning Systems: a Survey and Future Research
                 Directions",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "88:1--88:27",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3448303",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3448303",
  abstract =     "Ultra-Wideband (UWB) is a Radio Frequency technology
                 that is currently used for accurate indoor
                 localization. However, the cost of deploying such a
                 system is large, mainly due to the need for manually
                 measuring the exact location of the installed
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "88",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Laranjeiro:2021:SRS,
  author =       "Nuno Laranjeiro and Jo{\~a}o Agnelo and Jorge
                 Bernardino",
  title =        "A Systematic Review on Software Robustness
                 Assessment",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "89:1--89:65",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3448977",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3448977",
  abstract =     "Robustness is the degree to which a certain system or
                 component can operate correctly in the presence of
                 invalid inputs or stressful environmental conditions.
                 With the increasing complexity and widespread use of
                 computer systems, obtaining assurances \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "89",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2021:SSL,
  author =       "Boyuan Chen and Zhen Ming (Jack) Jiang",
  title =        "A Survey of Software Log Instrumentation",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "90:1--90:34",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3448976",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3448976",
  abstract =     "Log messages have been used widely in many software
                 systems for a variety of purposes during software
                 development and field operation. There are two phases
                 in software logging: log instrumentation and log
                 management. Log instrumentation refers to the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "90",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lalapura:2021:RNN,
  author =       "Varsha S. Lalapura and J. Amudha and Hariramn
                 Selvamuruga Satheesh",
  title =        "Recurrent Neural Networks for Edge Intelligence: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "4",
  pages =        "91:1--91:38",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3448974",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 3 10:00:28 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3448974",
  abstract =     "Recurrent Neural Networks are ubiquitous and pervasive
                 in many artificial intelligence applications such as
                 speech recognition, predictive healthcare, creative
                 art, and so on. Although they provide accurate superior
                 solutions, they pose a massive \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "91",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bertolino:2021:SFB,
  author =       "Antonia Bertolino and Pietro Braione and Guglielmo {De
                 Angelis} and Luca Gazzola and Fitsum Kifetew and
                 Leonardo Mariani and Matteo Orr{\`u} and Mauro
                 Pezz{\`e} and Roberto Pietrantuono and Stefano Russo
                 and Paolo Tonella",
  title =        "A Survey of Field-based Testing Techniques",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "92:1--92:39",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3447240",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447240",
  abstract =     "Field testing refers to testing techniques that
                 operate in the field to reveal those faults that escape
                 in-house testing. Field testing techniques are becoming
                 increasingly popular with the growing complexity of
                 contemporary software systems. In this \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "92",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bruel:2021:RFS,
  author =       "Jean-Michel Bruel and Sophie Ebersold and Florian
                 Galinier and Manuel Mazzara and Alexandr Naumchev and
                 Bertrand Meyer",
  title =        "The Role of Formalism in System Requirements",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "93:1--93:36",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3448975",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3448975",
  abstract =     "A major determinant of the quality of software systems
                 is the quality of their requirements, which should be
                 both understandable and precise. Most requirements are
                 written in natural language, which is good for
                 understandability but lacks precision. To \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "93",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhao:2021:EPB,
  author =       "Liang Zhao",
  title =        "Event Prediction in the {Big Data} Era: a Systematic
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "94:1--94:37",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3450287",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3450287",
  abstract =     "Events are occurrences in specific locations, time,
                 and semantics that nontrivially impact either our
                 society or the nature, such as earthquakes, civil
                 unrest, system failures, pandemics, and crimes. It is
                 highly desirable to be able to anticipate the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "94",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lo:2021:SLR,
  author =       "Sin Kit Lo and Qinghua Lu and Chen Wang and Hye-Young
                 Paik and Liming Zhu",
  title =        "A Systematic Literature Review on Federated Machine
                 Learning: From a Software Engineering Perspective",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "95:1--95:39",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3450288",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3450288",
  abstract =     "Federated learning is an emerging machine learning
                 paradigm where clients train models locally and
                 formulate a global model based on the local model
                 updates. To identify the state-of-the-art in federated
                 learning and explore how to develop federated
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "95",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alashaikh:2021:SUP,
  author =       "Abdulaziz Alashaikh and Eisa Alanazi and Ala
                 Al-Fuqaha",
  title =        "A Survey on the Use of Preferences for Virtual Machine
                 Placement in Cloud Data Centers",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "96:1--96:39",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3450517",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3450517",
  abstract =     "With the rapid development of virtualization
                 techniques, cloud data centers allow for
                 cost-effective, flexible, and customizable deployments
                 of applications on virtualized infrastructure. Virtual
                 machine (VM) placement aims to assign each virtual
                 machine to a server in the cloud environment. VM
                 Placement is of paramount importance to the design of
                 cloud data centers. Typically, VM placement involves
                 complex relations and multiple design factors as well
                 as local policies that govern the assignment decisions.
                 It also involves different constituents including cloud
                 administrators and customers that might have disparate
                 preferences while opting for a placement solution.
                 Thus, it is often valuable to return not only an
                 optimized solution to the VM placement problem but also
                 a solution that reflects the given preferences of the
                 constituents. In this article, we provide a detailed
                 review on the role of preferences in the recent
                 literature on VM placement. We examine different
                 preference representations found in the literature,
                 explain their existing usage, and explain the adopted
                 solving approaches. We further discuss key challenges
                 and identify possible research opportunities to better
                 incorporate preferences within the context of VM
                 placement.",
  acknowledgement = ack-nhfb,
  articleno =    "96",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Huang:2021:CAD,
  author =       "Xing Huang and Tsung-Yi Ho and Wenzhong Guo and Bing
                 Li and Krishnendu Chakrabarty and Ulf Schlichtmann",
  title =        "Computer-aided Design Techniques for Flow-based
                 Microfluidic Lab-on-a-chip Systems",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "97:1--97:29",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3450504",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3450504",
  abstract =     "As one of the most promising lab-on-a-chip systems,
                 flow-based microfluidic biochips are being increasingly
                 used for automatically executing various laboratory
                 procedures in biology and biochemistry, such as
                 enzyme-linked immunosorbent assay, point-of-.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "97",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Dunfield:2021:BT,
  author =       "Jana Dunfield and Neel Krishnaswami",
  title =        "Bidirectional Typing",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "98:1--98:38",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3450952",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3450952",
  abstract =     "Bidirectional typing combines two modes of typing:
                 type checking, which checks that a program satisfies a
                 known type, and type synthesis, which determines a type
                 from the program. Using checking enables bidirectional
                 typing to support features for which \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "98",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Abukmeil:2021:SUG,
  author =       "Mohanad Abukmeil and Stefano Ferrari and Angelo
                 Genovese and Vincenzo Piuri and Fabio Scotti",
  title =        "A Survey of Unsupervised Generative Models for
                 Exploratory Data Analysis and Representation Learning",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "99:1--99:40",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3450963",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3450963",
  abstract =     "For more than a century, the methods for data
                 representation and the exploration of the intrinsic
                 structures of data have developed remarkably and
                 consist of supervised and unsupervised methods.
                 However, recent years have witnessed the flourishing of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "99",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Susungi:2021:IRE,
  author =       "Adilla Susungi and Claude Tadonki",
  title =        "Intermediate Representations for Explicitly Parallel
                 Programs",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "100:1--100:24",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3452299",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3452299",
  abstract =     "While compilers generally support parallel programming
                 languages and APIs, their internal program
                 representations are mostly designed from the sequential
                 programs standpoint (exceptions include
                 source-to-source parallel compilers, for instance).
                 This \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "100",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Charles:2021:SNC,
  author =       "Subodha Charles and Prabhat Mishra",
  title =        "A Survey of Network-on-Chip Security Attacks and
                 Countermeasures",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "101:1--101:36",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3450964",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3450964",
  abstract =     "With the advances of chip manufacturing technologies,
                 computer architects have been able to integrate an
                 increasing number of processors and other heterogeneous
                 components on the same chip. Network-on-Chip (NoC) is
                 widely employed by multicore System-on-. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "101",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Aljeraisy:2021:PLP,
  author =       "Atheer Aljeraisy and Masoud Barati and Omer Rana and
                 Charith Perera",
  title =        "Privacy Laws and Privacy by Design Schemes for the
                 {Internet of Things}: a Developer's Perspective",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "102:1--102:38",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3450965",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3450965",
  abstract =     "Internet of Things applications have the potential to
                 derive sensitive information about individuals.
                 Therefore, developers must exercise due diligence to
                 make sure that data are managed according to the
                 privacy regulations and data protection laws.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "102",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alhussain:2021:ASG,
  author =       "Arwa I. Alhussain and Aqil M. Azmi",
  title =        "Automatic Story Generation: a Survey of Approaches",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "103:1--103:38",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453156",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453156",
  abstract =     "Computational generation of stories is a subfield of
                 computational creativity where artificial intelligence
                 and psychology intersect to teach computers how to
                 mimic humans' creativity. It helps generate many
                 stories with minimum effort and customize the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "103",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Al-Ghossein:2021:SSB,
  author =       "Marie Al-Ghossein and Talel Abdessalem and Anthony
                 Barr{\'e}",
  title =        "A Survey on Stream-Based Recommender Systems",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "104:1--104:36",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453443",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453443",
  abstract =     "Recommender Systems (RS) have proven to be effective
                 tools to help users overcome information overload, and
                 significant advances have been made in the field over
                 the past two decades. Although addressing the
                 recommendation problem required first a \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "104",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jannach:2021:SCR,
  author =       "Dietmar Jannach and Ahtsham Manzoor and Wanling Cai
                 and Li Chen",
  title =        "A Survey on Conversational Recommender Systems",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "105:1--105:36",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453154",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453154",
  abstract =     "Recommender systems are software applications that
                 help users to find items of interest in situations of
                 information overload. Current research often assumes a
                 one-shot interaction paradigm, where the users'
                 preferences are estimated based on past \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "105",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Luo:2021:DLB,
  author =       "Yuan Luo and Ya Xiao and Long Cheng and Guojun Peng
                 and Danfeng (Daphne) Yao",
  title =        "Deep Learning-based Anomaly Detection in
                 Cyber-physical Systems: Progress and Opportunities",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "106:1--106:36",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453155",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453155",
  abstract =     "Anomaly detection is crucial to ensure the security of
                 cyber-physical systems (CPS). However, due to the
                 increasing complexity of CPSs and more sophisticated
                 attacks, conventional anomaly detection methods, which
                 face the growing volume of data and need \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "106",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Dotan:2021:SBN,
  author =       "Maya Dotan and Yvonne-Anne Pignolet and Stefan Schmid
                 and Saar Tochner and Aviv Zohar",
  title =        "Survey on Blockchain Networking: Context,
                 State-of-the-Art, Challenges",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "107:1--107:34",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453161",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453161",
  abstract =     "Blockchains, in general, and cryptocurrencies such as
                 Bitcoin, in particular, are realized using distributed
                 systems and hence critically rely on the performance
                 and security of the interconnecting network. The
                 requirements on these networks and their \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "107",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rosenberg:2021:AML,
  author =       "Ishai Rosenberg and Asaf Shabtai and Yuval Elovici and
                 Lior Rokach",
  title =        "Adversarial Machine Learning Attacks and Defense
                 Methods in the Cyber Security Domain",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "108:1--108:36",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453158",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453158",
  abstract =     "In recent years, machine learning algorithms, and more
                 specifically deep learning algorithms, have been widely
                 used in many fields, including cyber security. However,
                 machine learning systems are vulnerable to adversarial
                 attacks, and this limits the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "108",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Pateria:2021:HRL,
  author =       "Shubham Pateria and Budhitama Subagdja and Ah-hwee Tan
                 and Chai Quek",
  title =        "Hierarchical Reinforcement Learning: a Comprehensive
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "109:1--109:35",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453160",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453160",
  abstract =     "Hierarchical Reinforcement Learning (HRL) enables
                 autonomous decomposition of challenging long-horizon
                 decision-making tasks into simpler subtasks. During the
                 past years, the landscape of HRL research has grown
                 profoundly, resulting in copious \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "109",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Dwivedi:2021:LES,
  author =       "Vimal Dwivedi and Vishwajeet Pattanaik and Vipin Deval
                 and Abhishek Dixit and Alex Norta and Dirk Draheim",
  title =        "Legally Enforceable Smart-Contract Languages: a
                 Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "110:1--110:34",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453475",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453475",
  abstract =     "Smart contracts are a key component of today's
                 blockchains. They are critical in controlling
                 decentralized autonomous organizations (DAO). However,
                 smart contracts are not yet legally binding nor
                 enforceable; this makes it difficult for businesses to
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "110",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ashmore:2021:AML,
  author =       "Rob Ashmore and Radu Calinescu and Colin Paterson",
  title =        "Assuring the Machine Learning Lifecycle: Desiderata,
                 Methods, and Challenges",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "5",
  pages =        "111:1--111:39",
  month =        jun,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453444",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jul 10 07:58:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453444",
  abstract =     "Machine learning has evolved into an enabling
                 technology for a wide range of highly successful
                 applications. The potential for this success to
                 continue and accelerate has placed machine learning
                 (ML) at the top of research, economic, and political
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "111",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kietzmann:2021:GPN,
  author =       "Peter Kietzmann and Thomas C. Schmidt and Matthias
                 W{\"a}hlisch",
  title =        "A Guideline on Pseudorandom Number Generation {(PRNG)}
                 in the {IoT}",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "112:1--112:38",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453159",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453159",
  abstract =     "Random numbers are an essential input to many
                 functions on the Internet of Things (IoT). Common use
                 cases of randomness range from low-level packet
                 transmission to advanced algorithms of artificial
                 intelligence as well as security and trust, which
                 heavily rely on unpredictable random sources. In the
                 constrained IoT, though, unpredictable random sources
                 are a challenging desire due to limited resources,
                 deterministic real-time operations, and frequent lack
                 of a user interface.\par

                 In this article, we revisit the generation of
                 randomness from the perspective of an IoT operating
                 system (OS) that needs to support general purpose or
                 crypto-secure random numbers. We analyze the potential
                 attack surface, derive common requirements, and discuss
                 the potentials and shortcomings of current IoT OSs. A
                 systematic evaluation of current IoT hardware
                 components and popular software generators based on
                 well-established test suits and on experiments for
                 measuring performance give rise to a set of clear
                 recommendations on how to build such a random subsystem
                 and which generators to use.",
  acknowledgement = ack-nhfb,
  articleno =    "112",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Badr:2021:IST,
  author =       "Eman Badr",
  title =        "Images in Space and Time: Real Big Data in
                 Healthcare",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "113:1--113:38",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453657",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453657",
  abstract =     "Medical imaging diagnosis is mostly subjective, as it
                 depends on medical experts. Hence, the service provided
                 is limited by expert opinion variations and image
                 complexity as well. However, with the increasing
                 advancements in deep learning field, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "113",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jaiswal:2021:UMC,
  author =       "Swati Jaiswal and Uday P. Khedker and Alan Mycroft",
  title =        "A Unified Model for Context-Sensitive Program
                 Analyses:: The Blind Men and the Elephant",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "114:1--114:37",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3456563",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3456563",
  abstract =     "Context-sensitive methods of program analysis increase
                 the precision of interprocedural analysis by achieving
                 the effect of call inlining. These methods have been
                 defined using different formalisms and hence appear as
                 algorithms that are very different \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "114",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mehrabi:2021:SBF,
  author =       "Ninareh Mehrabi and Fred Morstatter and Nripsuta
                 Saxena and Kristina Lerman and Aram Galstyan",
  title =        "A Survey on Bias and Fairness in Machine Learning",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "115:1--115:35",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3457607",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3457607",
  abstract =     "With the widespread use of artificial intelligence
                 (AI) systems and applications in our everyday lives,
                 accounting for fairness has gained significant
                 importance in designing and engineering of such
                 systems. AI systems can be used in many sensitive
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "115",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Vera-Olivera:2021:DMN,
  author =       "Harley Vera-Olivera and Ruizhe Guo and Ruben {Cruz
                 Huacarpuma} and Ana Paula Bernardi {Da Silva} and Ari
                 Melo Mariano and Maristela Holanda",
  title =        "Data Modeling and {NoSQL} Databases --- a Systematic
                 Mapping Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "116:1--116:26",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3457608",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3457608",
  abstract =     "Modeling is one of the most important steps in
                 developing a database. In traditional databases, the
                 Entity Relationship (ER) and Unified Modeling Language
                 (UML) models are widely used. But how are NoSQL
                 databases being modeled? We performed a systematic
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "116",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Moussaileb:2021:SWB,
  author =       "Routa Moussaileb and Nora Cuppens and Jean-Louis Lanet
                 and H{\'e}l{\`e}ne {Le Bouder}",
  title =        "A Survey on {Windows}-based Ransomware Taxonomy and
                 Detection Mechanisms",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "117:1--117:36",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453153",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453153",
  abstract =     "Ransomware remains an alarming threat in the 21st
                 century. It has evolved from being a simple scare
                 tactic into a complex malware capable of evasion.
                 Formerly, end-users were targeted via mass infection
                 campaigns. Nevertheless, in recent years, the attackers
                 have focused on targeted attacks, since the latter are
                 profitable and can induce severe damage. A vast number
                 of detection mechanisms have been proposed in the
                 literature. We provide a systematic review of
                 ransomware countermeasures starting from its deployment
                 on the victim machine until the ransom payment via
                 cryptocurrency. We define four stages of this malware
                 attack: Delivery, Deployment, Destruction, and Dealing.
                 Then, we assign the corresponding countermeasures for
                 each phase of the attack and cluster them by the
                 techniques used. Finally, we propose a roadmap for
                 researchers to fill the gaps found in the literature in
                 ransomware's battle.",
  acknowledgement = ack-nhfb,
  articleno =    "117",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Pal:2021:TBV,
  author =       "Ratnabali Pal and Arif Ahmed Sekh and Debi Prosad
                 Dogra and Samarjit Kar and Partha Pratim Roy and Dilip
                 K. Prasad",
  title =        "Topic-based Video Analysis: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "118:1--118:34",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3459089",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3459089",
  abstract =     "Manual processing of a large volume of video data
                 captured through closed-circuit television is
                 challenging due to various reasons. First, manual
                 analysis is highly time-consuming. Moreover, as
                 surveillance videos are recorded in dynamic conditions
                 such \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "118",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Guerreiro:2021:HIC,
  author =       "Andreia P. Guerreiro and Carlos M. Fonseca and
                 Lu{\'\i}s Paquete",
  title =        "The Hypervolume Indicator: Computational Problems and
                 Algorithms",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "119:1--119:42",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453474",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453474",
  abstract =     "The hypervolume indicator is one of the most used
                 set-quality indicators for the assessment of stochastic
                 multiobjective optimizers, as well as for selection in
                 evolutionary multiobjective optimization algorithms.
                 Its theoretical properties justify its \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "119",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Itoh:2021:TIA,
  author =       "Yuta Itoh and Tobias Langlotz and Jonathan Sutton and
                 Alexander Plopski",
  title =        "Towards Indistinguishable Augmented Reality: a Survey
                 on Optical See-through Head-mounted Displays",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "120:1--120:36",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453157",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453157",
  abstract =     "Adding virtual information that is indistinguishable
                 from reality has been a long-awaited goal in Augmented
                 Reality (AR). While already demonstrated in the 1960s,
                 only recently have Optical See-Through Head-Mounted
                 Displays (OST-HMDs) seen a reemergence,. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "120",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rauf:2021:ATE,
  author =       "Bilal Rauf and Haider Abbas and Muhammad Usman and
                 Tanveer A. Zia and Waseem Iqbal and Yawar Abbas and
                 Hammad Afzal",
  title =        "Application Threats to Exploit Northbound Interface
                 Vulnerabilities in Software Defined Networks",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "121:1--121:36",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453648",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453648",
  abstract =     "Software Defined Networking (SDN) is an evolving
                 technology that decouples the control functionality
                 from the underlying hardware managed by the control
                 plane. The application plane supports programmers to
                 develop numerous applications (such as \ldots{})",
  acknowledgement = ack-nhfb,
  articleno =    "121",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lou:2021:SMS,
  author =       "Xiaoxuan Lou and Tianwei Zhang and Jun Jiang and
                 Yinqian Zhang",
  title =        "A Survey of Microarchitectural Side-channel
                 Vulnerabilities, Attacks, and Defenses in
                 Cryptography",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "122:1--122:37",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3456629",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3456629",
  abstract =     "Side-channel attacks have become a severe threat to
                 the confidentiality of computer applications and
                 systems. One popular type of such attacks is the
                 microarchitectural attack, where the adversary exploits
                 the hardware features to break the protection enforced
                 by the operating system and steal the secrets from the
                 program. In this article, we systematize
                 microarchitectural side channels with a focus on
                 attacks and defenses in cryptographic applications. We
                 make three contributions. (1) We survey past research
                 literature to categorize microarchitectural
                 side-channel attacks. Since these are hardware attacks
                 targeting software, we summarize the vulnerable
                 implementations in software, as well as flawed designs
                 in hardware. (2) We identify common strategies to
                 mitigate microarchitectural attacks, from the
                 application, OS, and hardware levels. (3) We conduct a
                 large-scale evaluation on popular cryptographic
                 applications in the real world and analyze the
                 severity, practicality, and impact of side-channel
                 vulnerabilities. This survey is expected to inspire
                 side-channel research community to discover new
                 attacks, and more importantly, propose new defense
                 solutions against them.",
  acknowledgement = ack-nhfb,
  articleno =    "122",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Papadogiannaki:2021:SEN,
  author =       "Eva Papadogiannaki and Sotiris Ioannidis",
  title =        "A Survey on Encrypted Network Traffic Analysis
                 Applications, Techniques, and Countermeasures",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "123:1--123:35",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3457904",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3457904",
  abstract =     "The adoption of network traffic encryption is
                 continually growing. Popular applications use
                 encryption protocols to secure communications and
                 protect the privacy of users. In addition, a large
                 portion of malware is spread through the network
                 traffic taking advantage of encryption protocols to
                 hide its presence and activity. Entering into the era
                 of completely encrypted communications over the
                 Internet, we must rapidly start reviewing the
                 state-of-the-art in the wide domain of network traffic
                 analysis and inspection, to conclude if traditional
                 traffic processing systems will be able to seamlessly
                 adapt to the upcoming full adoption of network
                 encryption. In this survey, we examine the literature
                 that deals with network traffic analysis and inspection
                 after the ascent of encryption in communication
                 channels. We notice that the research community has
                 already started proposing solutions on how to perform
                 inspection even when the network traffic is encrypted
                 and we demonstrate and review these works. In addition,
                 we present the techniques and methods that these works
                 use and their limitations. Finally, we examine the
                 countermeasures that have been proposed in the
                 literature in order to circumvent traffic analysis
                 techniques that aim to harm user privacy.",
  acknowledgement = ack-nhfb,
  articleno =    "123",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Nguyen:2021:SPO,
  author =       "Thi Tuyet Hai Nguyen and Adam Jatowt and Mickael
                 Coustaty and Antoine Doucet",
  title =        "Survey of Post-{OCR} Processing Approaches",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "124:1--124:37",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3453476",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3453476",
  abstract =     "Optical character recognition (OCR) is one of the most
                 popular techniques used for converting printed
                 documents into machine-readable ones. While OCR engines
                 can do well with modern text, their performance is
                 unfortunately significantly reduced on \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "124",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Oikonomou:2021:UIM,
  author =       "Panagiotis Oikonomou and Anna Karanika and Christos
                 Anagnostopoulos and Kostas Kolomvatsos",
  title =        "On the Use of Intelligent Models towards Meeting the
                 Challenges of the Edge Mesh",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "125:1--125:42",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3456630",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3456630",
  abstract =     "Nowadays, we are witnessing the advent of the Internet
                 of Things (IoT) with numerous devices performing
                 interactions between them or with their environment.
                 The huge number of devices leads to huge volumes of
                 data that demand the appropriate processing. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "125",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fei:2021:SVS,
  author =       "Shufan Fei and Zheng Yan and Wenxiu Ding and Haomeng
                 Xie",
  title =        "Security Vulnerabilities of {SGX} and Countermeasures:
                 a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "126:1--126:36",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3456631",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3456631",
  abstract =     "Trusted Execution Environments (TEEs) have been widely
                 used in many security-critical applications. The
                 popularity of TEEs derives from its high security and
                 trustworthiness supported by secure hardware. Intel
                 Software Guard Extensions (SGX) is one of the most
                 representative TEEs that creates an isolated
                 environment on an untrusted operating system, thus
                 providing run-time protection for the execution of
                 security-critical code and data. However, Intel SGX is
                 far from the acme of perfection. It has become a target
                 of various attacks due to its security vulnerabilities.
                 Researchers and practitioners have paid attention to
                 the security vulnerabilities of SGX and investigated
                 optimization solutions in real applications.
                 Unfortunately, existing literature lacks a thorough
                 review of security vulnerabilities of SGX and their
                 countermeasures. In this article, we fill this gap.
                 Specifically, we propose two sets of criteria for
                 estimating security risks of existing attacks and
                 evaluating defense effects brought by attack
                 countermeasures. Furthermore, we propose a taxonomy of
                 SGX security vulnerabilities and shed light on
                 corresponding attack vectors. After that, we review
                 published attacks and existing countermeasures, as well
                 as evaluate them by employing our proposed criteria. At
                 last, on the strength of our survey, we propose some
                 open challenges and future directions in the research
                 of SGX security.",
  acknowledgement = ack-nhfb,
  articleno =    "126",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Padakandla:2021:SRL,
  author =       "Sindhu Padakandla",
  title =        "A Survey of Reinforcement Learning Algorithms for
                 Dynamically Varying Environments",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "127:1--127:25",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3459991",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3459991",
  abstract =     "Reinforcement learning (RL) algorithms find
                 applications in inventory control, recommender systems,
                 vehicular traffic management, cloud computing, and
                 robotics. The real-world complications arising in these
                 domains makes them difficult to solve with the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "127",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cunningham:2021:KNN,
  author =       "P{\'a}draig Cunningham and Sarah Jane Delany",
  title =        "$k$-Nearest Neighbour Classifiers --- a Tutorial",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "128:1--128:25",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3459665",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3459665",
  abstract =     "Perhaps the most straightforward classifier in the
                 arsenal or Machine Learning techniques is the Nearest
                 Neighbour Classifier-classification is achieved by
                 identifying the nearest neighbours to a query example
                 and using those neighbours to determine the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "128",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Talbi:2021:MLM,
  author =       "El-Ghazali Talbi",
  title =        "Machine Learning into Metaheuristics: a Survey and
                 Taxonomy",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "129:1--129:32",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3459664",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3459664",
  abstract =     "During the past few years, research in applying
                 machine learning (ML) to design efficient, effective,
                 and robust metaheuristics has become increasingly
                 popular. Many of those machine learning-supported
                 metaheuristics have generated high-quality results
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "129",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{He:2021:SAL,
  author =       "Shilin He and Pinjia He and Zhuangbin Chen and Tianyi
                 Yang and Yuxin Su and Michael R. Lyu",
  title =        "A Survey on Automated Log Analysis for Reliability
                 Engineering",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "130:1--130:37",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3460345",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3460345",
  abstract =     "Logs are semi-structured text generated by logging
                 statements in software source code. In recent decades,
                 software logs have become imperative in the reliability
                 assurance mechanism of many software systems, because
                 they are often the only data \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "130",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yin:2021:CSP,
  author =       "Xuefei Yin and Yanming Zhu and Jiankun Hu",
  title =        "A Comprehensive Survey of Privacy-preserving Federated
                 Learning: a Taxonomy, Review, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "131:1--131:36",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3460427",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3460427",
  abstract =     "The past four years have witnessed the rapid
                 development of federated learning (FL). However, new
                 privacy concerns have also emerged during the
                 aggregation of the distributed intermediate results.
                 The emerging privacy-preserving FL (PPFL) has been
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "131",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cai:2021:GAN,
  author =       "Zhipeng Cai and Zuobin Xiong and Honghui Xu and Peng
                 Wang and Wei Li and Yi Pan",
  title =        "Generative Adversarial Networks: a Survey Toward
                 Private and Secure Applications",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "132:1--132:38",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3459992",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3459992",
  abstract =     "Generative Adversarial Networks (GANs) have promoted a
                 variety of applications in computer vision and natural
                 language processing, among others, due to its
                 generative model's compelling ability to generate
                 realistic examples plausibly drawn from an \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "132",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Boukerche:2021:DGD,
  author =       "Azzedine Boukerche and Mingzhi Sha",
  title =        "Design Guidelines on Deep Learning-based Pedestrian
                 Detection Methods for Supporting Autonomous Vehicles",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "133:1--133:36",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3460770",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3460770",
  abstract =     "Intelligent transportation systems (ITS) enable
                 transportation participants to communicate with each
                 other by sending and receiving messages, so that they
                 can be aware of their surroundings and facilitate
                 efficient transportation through better decision
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "133",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{PlOtz:2021:AML,
  author =       "Thomas Pl{\"O}tz",
  title =        "Applying Machine Learning for Sensor Data Analysis in
                 Interactive Systems: Common Pitfalls of Pragmatic Use
                 and Ways to Avoid Them",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "6",
  pages =        "134:1--134:25",
  month =        jul,
  year =         "2021",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3459666",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:02 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3459666",
  abstract =     "With the widespread proliferation of (miniaturized)
                 sensing facilities and the massive growth and
                 popularity of the field of machine learning (ML)
                 research, new frontiers in automated sensor data
                 analysis have been explored that lead to paradigm
                 shifts \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "134",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lohachab:2022:TIB,
  author =       "Ankur Lohachab and Saurabh Garg and Byeong Kang and
                 Muhammad Bilal Amin and Junmin Lee and Shiping Chen and
                 Xiwei Xu",
  title =        "Towards Interconnected Blockchains: a Comprehensive
                 Review of the Role of Interoperability among Disparate
                 Blockchains",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "135:1--135:39",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3460287",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3460287",
  abstract =     "Unprecedented attention towards blockchain technology
                 is serving as a game-changer in fostering the
                 development of blockchain-enabled distinctive
                 frameworks. However, fragmentation unleashed by its
                 underlying concepts hinders different stakeholders from
                 effectively utilizing blockchain-supported services,
                 resulting in the obstruction of its wide-scale
                 adoption. To explore synergies among the isolated
                 frameworks requires comprehensively studying
                 inter-blockchain communication approaches. These
                 approaches broadly come under the umbrella of
                 Blockchain Interoperability (BI) notion, as it can
                 facilitate a novel paradigm of an integrated blockchain
                 ecosystem that connects state-of-the-art disparate
                 blockchains. Currently, there is a lack of studies that
                 comprehensively review BI, which works as a stumbling
                 block in its development. Therefore, this article aims
                 to articulate potential of BI by reviewing it from
                 diverse perspectives. Beginning with a glance of
                 blockchain architecture fundamentals, this article
                 discusses its associated platforms, taxonomy, and
                 consensus mechanisms. Subsequently, it argues about
                 BI's requirement by exemplifying its potential
                 opportunities and application areas. Concerning BI, an
                 architecture seems to be a missing link. Hence, this
                 article introduces a layered architecture for the
                 effective development of protocols and methods for
                 interoperable blockchains. Furthermore, this article
                 proposes an in-depth BI research taxonomy and provides
                 an insight into the state-of-the-art projects. Finally,
                 it determines possible open challenges and future
                 research in the domain.",
  acknowledgement = ack-nhfb,
  articleno =    "135",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2022:MTP,
  author =       "Lefeng Zhang and Tianqing Zhu and Ping Xiong and
                 Wanlei Zhou and Philip S. Yu",
  title =        "More than Privacy: Adopting Differential Privacy in
                 Game-theoretic Mechanism Design",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "136:1--136:37",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3460771",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3460771",
  abstract =     "The vast majority of artificial intelligence solutions
                 are founded on game theory, and differential privacy is
                 emerging as perhaps the most rigorous and widely
                 adopted privacy paradigm in the field. However,
                 alongside all the advancements made in both \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "136",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Braun:2022:AAU,
  author =       "Michael Braun and Florian Weber and Florian Alt",
  title =        "Affective Automotive User Interfaces-Reviewing the
                 State of Driver Affect Research and Emotion Regulation
                 in the Car",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "137:1--137:26",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3460938",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3460938",
  abstract =     "Affective technology offers exciting opportunities to
                 improve road safety by catering to human emotions.
                 Modern car interiors enable the contactless detection
                 of user states, paving the way for a systematic
                 promotion of safe driver behavior through \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "137",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Drame-Maigne:2022:CDE,
  author =       "Sophie Dram{\'e}-Maign{\'e} and Maryline Laurent and
                 Laurent Castillo and Herv{\'e} Ganem",
  title =        "Centralized, Distributed, and Everything in between:
                 Reviewing Access Control Solutions for the {IoT}",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "138:1--138:34",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3465170",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3465170",
  abstract =     "The Internet of Things is taking hold in our everyday
                 life. Regrettably, the security of IoT devices is often
                 being overlooked. Among the vast array of security
                 issues plaguing the emerging IoT, we decide to focus on
                 access control, as privacy, trust, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "138",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Miao:2022:MLB,
  author =       "Yuantian Miao and Chao Chen and Lei Pan and Qing-Long
                 Han and Jun Zhang and Yang Xiang",
  title =        "Machine Learning-based Cyber Attacks Targeting on
                 Controlled Information: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "139:1--139:36",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3465171",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3465171",
  abstract =     "Stealing attack against controlled information, along
                 with the increasing number of information leakage
                 incidents, has become an emerging cyber security threat
                 in recent years. Due to the booming development and
                 deployment of advanced analytics \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "139",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ignaczak:2022:TMC,
  author =       "Luciano Ignaczak and Guilherme Goldschmidt and
                 Cristiano Andr{\'e} {Da Costa} and Rodrigo {Da Rosa
                 Righi}",
  title =        "Text Mining in Cybersecurity: a Systematic Literature
                 Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "140:1--140:36",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3462477",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3462477",
  abstract =     "The growth of data volume has changed cybersecurity
                 activities, demanding a higher level of automation. In
                 this new cybersecurity landscape, text mining emerged
                 as an alternative to improve the efficiency of the
                 activities involving unstructured data. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "140",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fernando:2022:DLM,
  author =       "Tharindu Fernando and Harshala Gammulle and Simon
                 Denman and Sridha Sridharan and Clinton Fookes",
  title =        "Deep Learning for Medical Anomaly Detection --- a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "141:1--141:37",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3464423",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3464423",
  abstract =     "Machine learning-based medical anomaly detection is an
                 important problem that has been extensively studied.
                 Numerous approaches have been proposed across various
                 medical application domains and we observe several
                 similarities across these distinct \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "141",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Resch:2022:BQC,
  author =       "Salonik Resch and Ulya R. Karpuzcu",
  title =        "Benchmarking Quantum Computers and the Impact of
                 Quantum Noise",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "142:1--142:35",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3464420",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3464420",
  abstract =     "Benchmarking is how the performance of a computing
                 system is determined. Surprisingly, even for classical
                 computers this is not a straightforward process. One
                 must choose the appropriate benchmark and metrics to
                 extract meaningful results. Different \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "142",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lima:2022:SMV,
  author =       "Hugo B. Lima and Carlos G. R. {Dos Santos} and Bianchi
                 S. Meiguins",
  title =        "A Survey of Music Visualization Techniques",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "143:1--143:29",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3461835",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3461835",
  abstract =     "Music Information Research (MIR) comprises all the
                 research topics involved in modeling and understanding
                 music. Visualizations are frequently adopted to convey
                 better understandings about music pieces, and the
                 association of music with visual elements \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "143",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{BonesckiGumiel:2022:TRE,
  author =       "Yohan {Bonescki Gumiel} and Lucas Emanuel {Silva e
                 Oliveira} and Vincent Claveau and Natalia Grabar and
                 Emerson {Cabrera Paraiso} and Claudia Moro and Deborah
                 {Ribeiro Carvalho}",
  title =        "Temporal Relation Extraction in Clinical Texts: a
                 Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "144:1--144:36",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3462475",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3462475",
  abstract =     "Unstructured data in electronic health records,
                 represented by clinical texts, are a vast source of
                 healthcare information because they describe a
                 patient's journey, including clinical findings,
                 procedures, and information about the continuity of
                 care. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "144",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chauhan:2022:TMU,
  author =       "Uttam Chauhan and Apurva Shah",
  title =        "Topic Modeling Using Latent {Dirichlet} allocation: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "145:1--145:35",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3462478",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3462478",
  abstract =     "We are not able to deal with a mammoth text corpus
                 without summarizing them into a relatively small
                 subset. A computational tool is extremely needed to
                 understand such a gigantic pool of text. Probabilistic
                 Topic Modeling discovers and explains the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "145",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Tamine:2022:SIR,
  author =       "Lynda Tamine and Lorraine Goeuriot",
  title =        "Semantic Information Retrieval on Medical Texts:
                 Research Challenges, Survey, and Open Issues",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "146:1--146:38",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3462476",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3462476",
  abstract =     "The explosive growth and widespread accessibility of
                 medical information on the Internet have led to a surge
                 of research activity in a wide range of scientific
                 communities including health informatics and
                 information retrieval (IR). One of the common
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "146",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Berger:2022:SRI,
  author =       "Christian Berger and Philipp Eichhammer and Hans P.
                 Reiser and J{\"o}rg Domaschka and Franz J. Hauck and
                 Gerhard Habiger",
  title =        "A Survey on Resilience in the {IoT}: Taxonomy,
                 Classification, and Discussion of Resilience
                 Mechanisms",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "147:1--147:39",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3462513",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3462513",
  abstract =     "Internet-of-Things (IoT) ecosystems tend to grow both
                 in scale and complexity, as they consist of a variety
                 of heterogeneous devices that span over multiple
                 architectural IoT layers (e.g., cloud, edge, sensors).
                 Further, IoT systems increasingly demand \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "147",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Tolmach:2022:SSC,
  author =       "Palina Tolmach and Yi Li and Shang-Wei Lin and Yang
                 Liu and Zengxiang Li",
  title =        "A Survey of Smart Contract Formal Specification and
                 Verification",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "148:1--148:38",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3464421",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3464421",
  abstract =     "A smart contract is a computer program that allows
                 users to automate their actions on the blockchain
                 platform. Given the significance of smart contracts in
                 supporting important activities across industry sectors
                 including supply chain, finance, legal, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "148",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Park:2022:SPS,
  author =       "Jihyeok Park and Hongki Lee and Sukyoung Ryu",
  title =        "A Survey of Parametric Static Analysis",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "149:1--149:37",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3464457",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3464457",
  abstract =     "Understanding program behaviors is important to verify
                 program properties or to optimize programs. Static
                 analysis is a widely used technique to approximate
                 program behaviors via abstract interpretation. To
                 evaluate the quality of static analysis, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "149",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{DeMattos:2022:BMA,
  author =       "Douglas Paulo {De Mattos} and D{\'e}bora C.
                 Muchaluat-Saade and Gheorghita Ghinea",
  title =        "Beyond Multimedia Authoring: On the Need for
                 Mulsemedia Authoring Tools",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "150:1--150:31",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3464422",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3464422",
  abstract =     "The mulsemedia (Multiple Sensorial Media (MulSeMedia))
                 concept has been explored to provide users with new
                 sensations using other senses beyond sight and hearing.
                 The demand for producing such applications has
                 motivated various studies in the mulsemedia \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "150",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2022:ELE,
  author =       "Jie Zhang and Zhihao Qu and Chenxi Chen and Haozhao
                 Wang and Yufeng Zhan and Baoliu Ye and Song Guo",
  title =        "Edge Learning: The Enabling Technology for Distributed
                 Big Data Analytics in the Edge",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "151:1--151:36",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3464419",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3464419",
  abstract =     "Machine Learning (ML) has demonstrated great promise
                 in various fields, e.g., self-driving, smart city,
                 which are fundamentally altering the way individuals
                 and organizations live, work, and interact. Traditional
                 centralized learning frameworks require \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "151",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Baldassin:2022:PMS,
  author =       "Alexandro Baldassin and Jo{\~a}o Barreto and Daniel
                 Castro and Paolo Romano",
  title =        "Persistent Memory: a Survey of Programming Support and
                 Implementations",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "152:1--152:37",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3465402",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3465402",
  abstract =     "The recent rise of byte-addressable non-volatile
                 memory technologies is blurring the dichotomy between
                 memory and storage. In particular, they allow
                 programmers to have direct access to persistent data
                 instead of relying on traditional interfaces, such
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "152",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Juarez:2022:CRT,
  author =       "Julio Ju{\'a}rez and Cipriano (Pano) Santos and Carlos
                 A. Brizuela",
  title =        "A Comprehensive Review and a Taxonomy Proposal of Team
                 Formation Problems",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "153:1--153:33",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3465399",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3465399",
  abstract =     "With a growing interest in high-performing work teams
                 and how to form them, a new computational challenge,
                 denominated Team Formation Problem (TFP), has emerged.
                 After almost two decades of research on this problem,
                 many works continue to raise \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "153",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2022:SSB,
  author =       "Shoujin Wang and Longbing Cao and Yan Wang and Quan Z.
                 Sheng and Mehmet A. Orgun and Defu Lian",
  title =        "A Survey on Session-based Recommender Systems",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "154:1--154:38",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3465401",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3465401",
  abstract =     "Recommender systems (RSs) have been playing an
                 increasingly important role for informed consumption,
                 services, and decision-making in the overloaded
                 information era and digitized economy. In recent years,
                 session-based recommender systems (SBRSs) have
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "154",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Magrofuoco:2022:TDS,
  author =       "Nathan Magrofuoco and Paolo Roselli and Jean
                 Vanderdonckt",
  title =        "Two-dimensional Stroke Gesture Recognition: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "155:1--155:36",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3465400",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3465400",
  abstract =     "The expansion of touch-sensitive technologies, ranging
                 from smartwatches to wall screens, triggered a wider
                 use of gesture-based user interfaces and encouraged
                 researchers to invent recognizers that are fast and
                 accurate for end-users while being simple \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "155",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chefrour:2022:OWD,
  author =       "Djalel Chefrour",
  title =        "One-Way Delay Measurement From Traditional Networks to
                 {SDN}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "7",
  pages =        "156:1--156:35",
  month =        sep,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3466167",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Sep 18 07:43:03 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3466167",
  abstract =     "We expose the state of the art in the topic of one-way
                 delay measurement in both traditional and
                 software-defined networks. A representative range of
                 standard mechanisms and recent research works,
                 including OpenFlow and Programming Protocol-independent
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "156",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jabbar:2022:SGA,
  author =       "Abdul Jabbar and Xi Li and Bourahla Omar",
  title =        "A Survey on Generative Adversarial Networks: Variants,
                 Applications, and Training",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "157:1--157:49",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3463475",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3463475",
  abstract =     "The Generative Models have gained considerable
                 attention in unsupervised learning via a new and
                 practical framework called Generative Adversarial
                 Networks (GAN) due to their outstanding data generation
                 capability. Many GAN models have been proposed, and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "157",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2022:SAA,
  author =       "Jianguo Chen and Kenli Li and Zhaolei Zhang and Keqin
                 Li and Philip S. Yu",
  title =        "A Survey on Applications of Artificial Intelligence in
                 Fighting Against {COVID-19}",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "158:1--158:32",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3465398",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3465398",
  abstract =     "The COVID-19 pandemic caused by the SARS-CoV-2 virus
                 has spread rapidly worldwide, leading to a global
                 outbreak. Most governments, enterprises, and scientific
                 research institutions are participating in the COVID-19
                 struggle to curb the spread of the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "158",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2022:APD,
  author =       "Xingwei Zhang and Xiaolong Zheng and Wenji Mao",
  title =        "Adversarial Perturbation Defense on Deep Neural
                 Networks",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "159:1--159:36",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3465397",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3465397",
  abstract =     "Deep neural networks (DNNs) have been verified to be
                 easily attacked by well-designed adversarial
                 perturbations. Image objects with small perturbations
                 that are imperceptible to human eyes can induce
                 DNN-based image class classifiers towards making
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "159",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zou:2022:IBC,
  author =       "Jinglin Zou and Debiao He and Sherali Zeadally and
                 Neeraj Kumar and Huaqun Wang and Kkwang Raymond Choo",
  title =        "Integrated Blockchain and Cloud Computing Systems: a
                 Systematic Survey, Solutions, and Challenges",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "160:1--160:36",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3456628",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3456628",
  abstract =     "Cloud computing is a network model of on-demand access
                 for sharing configurable computing resource pools.
                 Compared with conventional service architectures, cloud
                 computing introduces new security challenges in secure
                 service management and control, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "160",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Telikani:2022:EML,
  author =       "Akbar Telikani and Amirhessam Tahmassebi and Wolfgang
                 Banzhaf and Amir H. Gandomi",
  title =        "Evolutionary Machine Learning: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "161:1--161:35",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3467477",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3467477",
  abstract =     "Evolutionary Computation (EC) approaches are inspired
                 by nature and solve optimization problems in a
                 stochastic manner. They can offer a reliable and
                 effective approach to address complex problems in
                 real-world applications. EC algorithms have recently
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "161",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2022:UST,
  author =       "Weijia Zhang and Jiuyong Li and Lin Liu",
  title =        "A Unified Survey of Treatment Effect Heterogeneity
                 Modelling and Uplift Modelling",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "162:1--162:36",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3466818",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3466818",
  abstract =     "A central question in many fields of scientific
                 research is to determine how an outcome is affected by
                 an action, i.e., to estimate the causal effect or
                 treatment effect of an action. In recent years, in
                 areas such as personalised healthcare, sociology,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "162",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Souza:2022:MPV,
  author =       "Vinicius Souza and Anderson Maciel and Luciana Nedel
                 and Regis Kopper",
  title =        "Measuring Presence in Virtual Environments: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "163:1--163:37",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3466817",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3466817",
  abstract =     "The effectiveness of a virtual reality experience is
                 strongly affected by the sense of presence of the users
                 involved. This article reviews the different
                 definitions of presence and the main proposed methods
                 to measure it through the analysis of 1,214 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "163",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ajaykumar:2022:SEU,
  author =       "Gopika Ajaykumar and Maureen Steele and Chien-Ming
                 Huang",
  title =        "A Survey on End-User Robot Programming",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "164:1--164:36",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3466819",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3466819",
  abstract =     "As robots interact with a broader range of end-users,
                 end-user robot programming has helped democratize robot
                 programming by empowering end-users who may not have
                 experience in robot programming to customize robots to
                 meet their individual contextual \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "164",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lee:2022:TAR,
  author =       "Lik-Hang Lee and Tristan Braud and Simo Hosio and Pan
                 Hui",
  title =        "Towards Augmented Reality Driven Human-City
                 Interaction: Current Research on Mobile Headsets and
                 Future Challenges",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "165:1--165:38",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3467963",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3467963",
  abstract =     "Interaction design for Augmented Reality (AR) is
                 gaining attention from both academia and industry. This
                 survey discusses 260 articles (68.8\% of articles
                 published between 2015-2019) to review the field of
                 human interaction in connected cities with \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "165",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Roy:2022:TRN,
  author =       "Satyaki Roy and Preetam Ghosh and Nirnay Ghosh and
                 Sajal K. Das",
  title =        "Transcriptional Regulatory Network Topology with
                 Applications to Bio-inspired Networking: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "166:1--166:36",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3468266",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3468266",
  abstract =     "The advent of the edge computing network paradigm
                 places the computational and storage resources away
                 from the data centers and closer to the edge of the
                 network largely comprising the heterogeneous IoT
                 devices collecting huge volumes of data. This
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "166",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Tian:2022:DAA,
  author =       "Haiman Tian and Maria Presa-Reyes and Yudong Tao and
                 Tianyi Wang and Samira Pouyanfar and Alonso Miguel and
                 Steven Luis and Mei-Ling Shyu and Shu-Ching Chen and
                 Sundaraja Sitharama Iyengar",
  title =        "Data Analytics for Air Travel Data: a Survey and New
                 Perspectives",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "167:1--167:35",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3469028",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3469028",
  abstract =     "From the start, the airline industry has remarkably
                 connected countries all over the world through rapid
                 long-distance transportation, helping people overcome
                 geographic barriers. Consequently, this has ushered in
                 substantial economic growth, both \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "167",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Belchior:2022:SBI,
  author =       "Rafael Belchior and Andr{\'e} Vasconcelos and
                 S{\'e}rgio Guerreiro and Miguel Correia",
  title =        "A Survey on Blockchain Interoperability: Past,
                 Present, and Future Trends",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "168:1--168:41",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3471140",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3471140",
  abstract =     "Blockchain interoperability is emerging as one of the
                 crucial features of blockchain technology, but the
                 knowledge necessary for achieving it is fragmented.
                 This fact makes it challenging for academics and the
                 industry to achieve interoperability among \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "168",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lee:2022:DNN,
  author =       "Royson Lee and Stylianos I. Venieris and Nicholas D.
                 Lane",
  title =        "Deep Neural Network-based Enhancement for Image and
                 Video Streaming Systems: a Survey and Future
                 Directions",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "169:1--169:30",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3469094",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3469094",
  abstract =     "Internet-enabled smartphones and ultra-wide displays
                 are transforming a variety of visual apps spanning from
                 on-demand movies and 360${}^\circ $ videos to
                 video-conferencing and live streaming. However,
                 robustly delivering visual content under fluctuating
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "169",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Murshed:2022:MLN,
  author =       "M. G. Sarwar Murshed and Christopher Murphy and Daqing
                 Hou and Nazar Khan and Ganesh Ananthanarayanan and
                 Faraz Hussain",
  title =        "Machine Learning at the Network Edge: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "170:1--170:37",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3469029",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3469029",
  abstract =     "Resource-constrained IoT devices, such as sensors and
                 actuators, have become ubiquitous in recent years. This
                 has led to the generation of large quantities of data
                 in real-time, which is an appealing target for AI
                 systems. However, deploying machine \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "170",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lamothe:2022:SRA,
  author =       "Maxime Lamothe and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
                 Weiyi Shang",
  title =        "A Systematic Review of {API} Evolution Literature",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "171:1--171:36",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3470133",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3470133",
  abstract =     "Recent software advances have led to an expansion of
                 the development and usage of application programming
                 interfaces (APIs). From millions of Android packages
                 (APKs) available on Google Store to millions of
                 open-source packages available in Maven, PyPI,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "171",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{McBroom:2022:SAP,
  author =       "Jessica McBroom and Irena Koprinska and Kalina Yacef",
  title =        "A Survey of Automated Programming Hint Generation: The
                 {HINTS} Framework",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "172:1--172:27",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3469885",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3469885",
  abstract =     "Automated tutoring systems offer the flexibility and
                 scalability necessary to facilitate the provision of
                 high-quality and universally accessible programming
                 education. To realise the potential of these systems,
                 recent work has proposed a diverse range of \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "172",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Desolda:2022:HFP,
  author =       "Giuseppe Desolda and Lauren S. Ferro and Andrea
                 Marrella and Tiziana Catarci and Maria Francesca
                 Costabile",
  title =        "Human Factors in Phishing Attacks: a Systematic
                 Literature Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "173:1--173:35",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3469886",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3469886",
  abstract =     "Phishing is the fraudulent attempt to obtain sensitive
                 information by disguising oneself as a trustworthy
                 entity in digital communication. It is a type of cyber
                 attack often successful because users are not aware of
                 their vulnerabilities or are unable to \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "173",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Tian:2022:ELS,
  author =       "Ye Tian and Langchun Si and Xingyi Zhang and Ran Cheng
                 and Cheng He and Kay Chen Tan and Yaochu Jin",
  title =        "Evolutionary Large-Scale Multi-Objective Optimization:
                 a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "174:1--174:34",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3470971",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3470971",
  abstract =     "Multi-objective evolutionary algorithms (MOEAs) have
                 shown promising performance in solving various
                 optimization problems, but their performance may
                 deteriorate drastically when tackling problems
                 containing a large number of decision variables. In
                 recent \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "174",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{S:2022:ADB,
  author =       "Shubhra Kanti Karmaker (``Santu'') and Md. Mahadi
                 Hassan and Micah J. Smith and Lei Xu and Chengxiang
                 Zhai and Kalyan Veeramachaneni",
  title =        "{AutoML} to Date and Beyond: Challenges and
                 Opportunities",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "175:1--175:36",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3470918",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3470918",
  abstract =     "As big data becomes ubiquitous across domains, and
                 more and more stakeholders aspire to make the most of
                 their data, demand for machine learning tools has
                 spurred researchers to explore the possibilities of
                 automated machine learning (AutoML). AutoML \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "175",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Dias:2022:SLR,
  author =       "Alexandre H. T. Dias and Luiz. H. A. Correia and
                 Neumar Malheiros",
  title =        "A Systematic Literature Review on Virtual Machine
                 Consolidation",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "176:1--176:38",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3470972",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3470972",
  abstract =     "Virtual machine consolidation has been a widely
                 explored topic in recent years due to Cloud Data
                 Centers' effect on global energy consumption. Thus,
                 academia and companies made efforts to achieve green
                 computing, reducing energy consumption to minimize
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "176",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gu:2022:SDL,
  author =       "Fuqiang Gu and Mu-Huan Chung and Mark Chignell and
                 Shahrokh Valaee and Baoding Zhou and Xue Liu",
  title =        "A Survey on Deep Learning for Human Activity
                 Recognition",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "8",
  pages =        "177:1--177:34",
  month =        nov,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3472290",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 5 08:39:24 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3472290",
  abstract =     "Human activity recognition is a key to a lot of
                 applications such as healthcare and smart home. In this
                 study, we provide a comprehensive survey on recent
                 advances and challenges in human activity recognition
                 (HAR) with deep learning. Although there are \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "177",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Arakadakis:2022:FAP,
  author =       "Konstantinos Arakadakis and Pavlos Charalampidis and
                 Antonis Makrogiannakis and Alexandros Fragkiadakis",
  title =        "Firmware Over-the-air Programming Techniques for {IoT}
                 Networks --- A Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "178:1--178:36",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3472292",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3472292",
  abstract =     "The devices forming Internet of Things (IoT) networks
                 need to be re-programmed over the air, so that new
                 features are added, software bugs or security
                 vulnerabilities are resolved, and their applications
                 can be re-purposed. The limitations of IoT devices,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "178",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bustio-Martinez:2022:FGB,
  author =       "L{\'a}zaro Bustio-Mart{\'\i}nez and Ren{\'e} Cumplido
                 and Mart{\'\i}n Letras and Raudel
                 Hern{\'a}ndez-Le{\'o}n and Claudia Feregrino-Uribe and
                 Jos{\'e} Hern{\'a}ndez-Palancar",
  title =        "{FPGA\slash GPU}-based Acceleration for Frequent
                 Itemsets Mining: a Comprehensive Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "179:1--179:35",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3472289",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3472289",
  abstract =     "In data mining, Frequent Itemsets Mining is a
                 technique used in several domains with notable results.
                 However, the large volume of data in modern datasets
                 increases the processing time of Frequent Itemset
                 Mining algorithms, making them unsuitable for many
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "179",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ren:2022:SDA,
  author =       "Pengzhen Ren and Yun Xiao and Xiaojun Chang and Po-Yao
                 Huang and Zhihui Li and Brij B. Gupta and Xiaojiang
                 Chen and Xin Wang",
  title =        "A Survey of Deep Active Learning",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "180:1--180:40",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3472291",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3472291",
  abstract =     "Active learning (AL) attempts to maximize a model's
                 performance gain while annotating the fewest samples
                 possible. Deep learning (DL) is greedy for data and
                 requires a large amount of data supply to optimize a
                 massive number of parameters if the model is \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "180",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kakaletsis:2022:CVA,
  author =       "Efstratios Kakaletsis and Charalampos Symeonidis and
                 Maria Tzelepi and Ioannis Mademlis and Anastasios Tefas
                 and Nikos Nikolaidis and Ioannis Pitas",
  title =        "Computer Vision for Autonomous {UAV} Flight Safety: an
                 Overview and a Vision-based Safe Landing Pipeline
                 Example",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "181:1--181:37",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3472288",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3472288",
  abstract =     "Recent years have seen an unprecedented spread of
                 Unmanned Aerial Vehicles (UAVs, or ``drones''), which
                 are highly useful for both civilian and military
                 applications. Flight safety is a crucial issue in UAV
                 navigation, having to ensure accurate compliance
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "181",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chou:2022:SDD,
  author =       "Dylan Chou and Meng Jiang",
  title =        "A Survey on Data-driven Network Intrusion Detection",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "182:1--182:36",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3472753",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3472753",
  abstract =     "Data-driven network intrusion detection (NID) has a
                 tendency towards minority attack classes compared to
                 normal traffic. Many datasets are collected in
                 simulated environments rather than real-world networks.
                 These challenges undermine the performance of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "182",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xie:2022:WSN,
  author =       "Lingxi Xie and Xin Chen and Kaifeng Bi and Longhui Wei
                 and Yuhui Xu and Lanfei Wang and Zhengsu Chen and An
                 Xiao and Jianlong Chang and Xiaopeng Zhang and Qi
                 Tian",
  title =        "Weight-Sharing Neural Architecture Search: a Battle to
                 Shrink the Optimization Gap",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "183:1--183:37",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3473330",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3473330",
  abstract =     "Neural architecture search (NAS) has attracted
                 increasing attention. In recent years, individual
                 search methods have been replaced by weight-sharing
                 search methods for higher search efficiency, but the
                 latter methods often suffer lower instability. This
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "183",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bermejo:2022:SHT,
  author =       "Carlos Bermejo and Pan Hui",
  title =        "A Survey on Haptic Technologies for Mobile Augmented
                 Reality",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "184:1--184:35",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3465396",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3465396",
  abstract =     "Augmented reality (AR) applications have gained much
                 research and industry attention. Moreover, the mobile
                 counterpart-mobile augmented reality (MAR) is one of
                 the most explosive growth areas for AR applications in
                 the mobile environment (e.g., \ldots{})",
  acknowledgement = ack-nhfb,
  articleno =    "184",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{AlRidhawi:2022:DGC,
  author =       "Ismaeel {Al Ridhawi} and Ouns Bouachir and Moayad
                 Aloqaily and Azzedine Boukerche",
  title =        "Design Guidelines for Cooperative {UAV}-supported
                 Services and Applications",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "185:1--185:35",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3467964",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3467964",
  abstract =     "Internet of Things (IoT) systems have advanced greatly
                 in the past few years, especially with the support of
                 Machine Learning (ML) and Artificial Intelligence (AI)
                 solutions. Numerous AI-supported IoT devices are
                 playing a significant role in providing \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "185",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ranaweera:2022:MEU,
  author =       "Pasika Ranaweera and Anca Jurcut and Madhusanka
                 Liyanage",
  title =        "{MEC}-enabled {5G} Use Cases: a Survey on Security
                 Vulnerabilities and Countermeasures",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "186:1--186:37",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3474552",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3474552",
  abstract =     "The future of mobile and internet technologies are
                 manifesting advancements beyond the existing scope of
                 science. The concepts of automated driving,
                 augmented-reality, and machine-type-communication are
                 quite sophisticated and require an elevation of the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "186",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Min:2022:SCQ,
  author =       "Xiongkuo Min and Ke Gu and Guangtao Zhai and Xiaokang
                 Yang and Wenjun Zhang and Patrick {Le Callet} and Chang
                 Wen Chen",
  title =        "Screen Content Quality Assessment: Overview,
                 Benchmark, and Beyond",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "187:1--187:36",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3470970",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3470970",
  abstract =     "Screen content, which is often computer-generated, has
                 many characteristics distinctly different from
                 conventional camera-captured natural scene content.
                 Such characteristic differences impose major challenges
                 to the corresponding content quality \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "187",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Siqueira:2022:SCI,
  author =       "Frank Siqueira and Joseph G. Davis",
  title =        "Service Computing for {Industry 4.0}: State of the
                 Art, Challenges, and Research Opportunities",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "188:1--188:38",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3478680",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3478680",
  abstract =     "Recent advances in the large-scale adoption of
                 information and communication technologies in
                 manufacturing processes, known as Industry 4.0 or Smart
                 Manufacturing, provide us a window into how the
                 manufacturing sector will evolve in the coming decades.
                 As \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "188",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sato:2022:SCD,
  author =       "Denise Maria {Vecino Sato} and Sheila Cristiana {De
                 Freitas} and Jean Paul Barddal and Edson Emilio
                 Scalabrin",
  title =        "A Survey on Concept Drift in Process Mining",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "189:1--189:38",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3472752",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3472752",
  abstract =     "Concept drift in process mining (PM) is a challenge as
                 classical methods assume processes are in a
                 steady-state, i.e., events share the same process
                 version. We conducted a systematic literature review on
                 the intersection of these areas, and thus, we
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "189",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2022:EEW,
  author =       "Bing Zhang and Jingyue Li and Jiadong Ren and Guoyan
                 Huang",
  title =        "Efficiency and Effectiveness of {Web} Application
                 Vulnerability Detection Approaches: a Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "190:1--190:35",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3474553",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3474553",
  abstract =     "Most existing surveys and reviews on web application
                 vulnerability detection (WAVD) approaches focus on
                 comparing and summarizing the approaches' technical
                 details. Although some studies have analyzed the
                 efficiency and effectiveness of specific methods,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "190",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Abadal:2022:CGN,
  author =       "Sergi Abadal and Akshay Jain and Robert Guirado and
                 Jorge L{\'o}pez-Alonso and Eduard Alarc{\'o}n",
  title =        "Computing Graph Neural Networks: a Survey from
                 Algorithms to Accelerators",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "191:1--191:38",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3477141",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3477141",
  abstract =     "Graph Neural Networks (GNNs) have exploded onto the
                 machine learning scene in recent years owing to their
                 capability to model and learn from graph-structured
                 data. Such an ability has strong implications in a wide
                 variety of fields whose data are \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "191",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Guerar:2022:GCE,
  author =       "Meriem Guerar and Luca Verderame and Mauro Migliardi
                 and Francesco Palmieri and Alessio Merlo",
  title =        "Gotta {CAPTCHA} 'Em All: a Survey of 20 Years of the
                 Human-or-computer Dilemma",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "192:1--192:33",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3477142",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3477142",
  abstract =     "A recent study has found that malicious bots generated
                 nearly a quarter of overall website traffic in 2019
                 [102]. These malicious bots perform activities such as
                 price and content scraping, account creation and
                 takeover, credit card fraud, denial of \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "192",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mena:2022:SUE,
  author =       "Jos{\'e} Mena and Oriol Pujol and Jordi Vitri{\`a}",
  title =        "A Survey on Uncertainty Estimation in Deep Learning
                 Classification Systems from a {Bayesian} Perspective",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "193:1--193:35",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3477140",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3477140",
  abstract =     "Decision-making based on machine learning systems,
                 especially when this decision-making can affect human
                 lives, is a subject of maximum interest in the Machine
                 Learning community. It is, therefore, necessary to
                 equip these systems with a means of \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "193",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Schmid:2022:SCT,
  author =       "Josef Schmid and Alfred H{\"o}ss and Bj{\"o}rn W.
                 Schuller",
  title =        "A Survey on Client Throughput Prediction Algorithms in
                 Wired and Wireless Networks",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "194:1--194:33",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3477204",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3477204",
  abstract =     "Network communication has become a part of everyday
                 life, and the interconnection among devices and people
                 will increase even more in the future. Nevertheless,
                 prediction of Quality of Service parameters,
                 particularly throughput, is quite a challenging
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "194",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Aloufi:2022:CBD,
  author =       "Asma Aloufi and Peizhao Hu and Yongsoo Song and
                 Kristin Lauter",
  title =        "Computing Blindfolded on Data Homomorphically
                 Encrypted under Multiple Keys: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "195:1--195:37",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3477139",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3477139",
  abstract =     "With capability of performing computations on
                 encrypted data without needing the secret key,
                 homomorphic encryption (HE) is a promising
                 cryptographic technique that makes outsourced
                 computations secure and privacy-preserving. A decade
                 after Gentry's \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "195",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2022:OCC,
  author =       "Chao Liu and Xin Xia and David Lo and Cuiyun Gao and
                 Xiaohu Yang and John Grundy",
  title =        "Opportunities and Challenges in Code Search Tools",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "196:1--196:40",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3480027",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3480027",
  abstract =     "Code search is a core software engineering task.
                 Effective code search tools can help developers
                 substantially improve their software development
                 efficiency and effectiveness. In recent years, many
                 code search studies have leveraged different
                 techniques, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "196",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{McIntosh:2022:RMM,
  author =       "Timothy McIntosh and A. S. M. Kayes and Yi-Ping Phoebe
                 Chen and Alex Ng and Paul Watters",
  title =        "Ransomware Mitigation in the Modern Era: a
                 Comprehensive Review, Research Challenges, and Future
                 Directions",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "197:1--197:36",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3479393",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3479393",
  abstract =     "Although ransomware has been around since the early
                 days of personal computers, its sophistication and
                 aggression have increased substantially over the years.
                 Ransomware, as a type of malware to extort ransom
                 payments from victims, has evolved to deliver
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "197",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mayrhofer:2022:AMM,
  author =       "Ren{\'e} Mayrhofer and Stephan Sigg",
  title =        "Adversary Models for Mobile Device Authentication",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "198:1--198:35",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3477601",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3477601",
  abstract =     "Mobile device authentication has been a highly active
                 research topic for over 10 years, with a vast range of
                 methods proposed and analyzed. In related areas, such
                 as secure channel protocols, remote authentication, or
                 desktop user authentication, strong, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "198",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gevay:2022:HID,
  author =       "G{\'a}bor E. G{\'e}vay and Juan Soto and Volker
                 Markl",
  title =        "Handling Iterations in Distributed Dataflow Systems",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "9",
  pages =        "199:1--199:38",
  month =        dec,
  year =         "2022",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3477602",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 26 07:04:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3477602",
  abstract =     "Over the past decade, distributed dataflow systems
                 (DDS) have become a standard technology. In these
                 systems, users write programs in restricted dataflow
                 programming models, such as MapReduce, which enable
                 them to scale out program execution to a shared-.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "199",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Khan:2022:TVS,
  author =       "Salman Khan and Muzammal Naseer and Munawar Hayat and
                 Syed Waqas Zamir and Fahad Shahbaz Khan and Mubarak
                 Shah",
  title =        "Transformers in Vision: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "200:1--200:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3505244",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3505244",
  abstract =     "Astounding results from Transformer models on natural
                 language tasks have intrigued the vision community to
                 study their application to computer vision problems.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "200",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Nanfack:2022:CED,
  author =       "G{\'e}raldin Nanfack and Paul Temple and Beno{\^\i}t
                 Fr{\'e}nay",
  title =        "Constraint Enforcement on Decision Trees: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "201:1--201:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3506734",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3506734",
  abstract =     "Decision trees have the particularity of being machine
                 learning models that are visually easy to interpret and
                 understand. Therefore, they are primarily suited for
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "201",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Dao:2022:CSL,
  author =       "Nhu-Ngoc Dao and Anh-Tien Tran and Ngo Hoang Tu and
                 Tran Thien Thanh and Vo Nguyen Quoc Bao and Sungrae
                 Cho",
  title =        "A Contemporary Survey on Live Video Streaming from a
                 Computation-Driven Perspective",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "202:1--202:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3519552",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3519552",
  abstract =     "Live video streaming services have experienced
                 significant growth since the emergence of social
                 networking paradigms in recent years. In this scenario,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "202",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Messina:2022:SDL,
  author =       "Pablo Messina and Pablo Pino and Denis Parra and
                 Alvaro Soto and Cecilia Besa and Sergio Uribe and
                 Marcelo And{\'{\i}}a and Cristian Tejos and Claudia
                 Prieto and Daniel Capurro",
  title =        "A Survey on Deep Learning and Explainability for
                 Automatic Report Generation from Medical Images",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "203:1--203:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3522747",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3522747",
  abstract =     "Every year physicians face an increasing demand of
                 image-based diagnosis from patients, a problem that can
                 be addressed with recent artificial intelligence
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "203",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gruetzemacher:2022:DTL,
  author =       "Ross Gruetzemacher and David Paradice",
  title =        "Deep Transfer Learning \& Beyond: Transformer Language
                 Models in Information Systems Research",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "204:1--204:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3505245",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3505245",
  abstract =     "AI is widely thought to be poised to transform
                 business, yet current perceptions of the scope of this
                 transformation may be myopic. Recent progress in
                 natural \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "204",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ward:2022:PTG,
  author =       "Isaac Ronald Ward and Jack Joyner and Casey Lickfold
                 and Yulan Guo and Mohammed Bennamoun",
  title =        "A Practical Tutorial on Graph Neural Networks",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "205:1--205:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3503043",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3503043",
  abstract =     "Graph neural networks (GNNs) have recently grown in
                 popularity in the field of artificial intelligence (AI)
                 due to their unique ability to ingest relatively
                 unstructured \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "205",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yang:2022:SDL,
  author =       "Yanming Yang and Xin Xia and David Lo and John
                 Grundy",
  title =        "A Survey on Deep Learning for Software Engineering",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "206:1--206:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3505243",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3505243",
  abstract =     "In 2006, Geoffrey Hinton proposed the concept of
                 training ``Deep Neural Networks (DNNs)'' and an
                 improved model training method to break the bottleneck
                 of \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "206",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhao:2022:SDP,
  author =       "Ying Zhao and Jinjun Chen",
  title =        "A Survey on Differential Privacy for Unstructured Data
                 Content",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "207:1--207:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3490237",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3490237",
  abstract =     "Huge amounts of unstructured data including image,
                 video, audio, and text are ubiquitously generated and
                 shared, and it is a challenge to protect sensitive
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "207",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bansal:2022:SRD,
  author =       "Ms. Aayushi Bansal and Dr. Rewa Sharma and Dr. Mamta
                 Kathuria",
  title =        "A Systematic Review on Data Scarcity Problem in Deep
                 Learning: Solution and Applications",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "208:1--208:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3502287",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3502287",
  abstract =     "Recent advancements in deep learning architecture have
                 increased its utility in real-life applications. Deep
                 learning models require a large amount of data to
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "208",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2022:BBP,
  author =       "Xin Wang and Sisi Duan and James Clavin and Haibin
                 Zhang",
  title =        "{BFT} in Blockchains: From Protocols to Use Cases",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "209:1--209:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3503042",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3503042",
  abstract =     "A blockchain is a distributed system that achieves
                 strong security guarantees in storing, managing, and
                 processing data. All blockchains achieve a common
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "209",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Schlett:2022:FIQ,
  author =       "Torsten Schlett and Christian Rathgeb and Olaf
                 Henniger and Javier Galbally and Julian Fierrez and
                 Christoph Busch",
  title =        "Face Image Quality Assessment: a Literature Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "210:1--210:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3507901",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3507901",
  abstract =     "The performance of face analysis and recognition
                 systems depends on the quality of the acquired face
                 data, which is influenced by numerous factors.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "210",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yadav:2022:SOT,
  author =       "Vijay Kumar Yadav and Nitish Andola and Shekhar Verma
                 and S. Venkatesan",
  title =        "A Survey of Oblivious Transfer Protocol",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "211:1--211:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3503045",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3503045",
  abstract =     "Oblivious transfer (OT) protocol is an essential tool
                 in cryptography that provides a wide range of
                 applications such as secure multi-party computation,
                 private \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "211",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Du:2022:EEE,
  author =       "Hang Du and Hailin Shi and Dan Zeng and Xiao-Ping
                 Zhang and Tao Mei",
  title =        "The Elements of End-to-end Deep Face Recognition: a
                 Survey of Recent Advances",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "212:1--212:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3507902",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3507902",
  abstract =     "Face recognition (FR) is one of the most popular and
                 long-standing topics in computer vision. With the
                 recent development of deep learning \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "212",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{DosSantos:2022:AOS,
  author =       "Claudio Filipi Gon{\c{c}}alves {Dos Santos} and
                 Jo{\~a}o Paulo Papa",
  title =        "Avoiding Overfitting: a Survey on Regularization
                 Methods for Convolutional Neural Networks",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "213:1--213:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3510413",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3510413",
  abstract =     "Several image processing tasks, such as image
                 classification and object detection, have been
                 significantly improved using Convolutional Neural
                 Networks \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "213",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Junior:2022:DTT,
  author =       "Misael C. J{\'u}nior and Domenico Amalfitano and Lina
                 Garc{\'e}s and Anna Rita Fasolino and Stev{\~a}o A.
                 Andrade and M{\'a}rcio Delamaro",
  title =        "Dynamic Testing Techniques of Non-functional
                 Requirements in Mobile Apps: a Systematic Mapping
                 Study",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "214:1--214:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3507903",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3507903",
  abstract =     "Context: The mobile app market is continually growing
                 offering solutions to almost all aspects of people's
                 lives, e.g., healthcare, business, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "214",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Churchill:2022:ETM,
  author =       "Rob Churchill and Lisa Singh",
  title =        "The Evolution of Topic Modeling",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "215:1--215:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3507900",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3507900",
  abstract =     "Topic models have been applied to everything from
                 books to newspapers to social media posts in an effort
                 to identify the most prevalent themes of a text
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "215",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Martin:2022:MVS,
  author =       "Daniel Martin and Sandra Malpica and Diego Gutierrez
                 and Belen Masia and Ana Serrano",
  title =        "Multimodality in {VR}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "216:1--216:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3508361",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3508361",
  abstract =     "Virtual reality (VR) is rapidly growing, with the
                 potential to change the way we create and consume
                 content. In VR, users integrate multimodal sensory
                 information \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "216",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhong:2022:MLB,
  author =       "Zhiheng Zhong and Minxian Xu and Maria Alejandra
                 Rodriguez and Chengzhong Xu and Rajkumar Buyya",
  title =        "Machine Learning-based Orchestration of Containers: a
                 Taxonomy and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "217:1--217:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3510415",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3510415",
  abstract =     "Containerization is a lightweight application
                 virtualization technology, providing high environmental
                 consistency, operating system distribution portability,
                 and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "217",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zafar:2022:CCA,
  author =       "Farkhanda Zafar and Hasan Ali Khattak and Moayad
                 Aloqaily and Rasheed Hussain",
  title =        "Carpooling in Connected and Autonomous Vehicles:
                 Current Solutions and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "218:1--218:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3501295",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3501295",
  abstract =     "Owing to the advancements in communication and
                 computation technologies, the dream of commercialized
                 connected and autonomous cars is \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "218",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alam:2022:SST,
  author =       "Md Mahbub Alam and Luis Torgo and Albert Bifet",
  title =        "A Survey on Spatio-temporal Data Analytics Systems",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "219:1--219:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3507904",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3507904",
  abstract =     "Due to the surge of spatio-temporal data volume, the
                 popularity of location-based services and applications,
                 and the importance of extracted \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "219",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2022:SCS,
  author =       "Zijun Li and Linsong Guo and Jiagan Cheng and Quan
                 Chen and Bingsheng He and Minyi Guo",
  title =        "The Serverless Computing Survey: a Technical Primer
                 for Design Architecture",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "220:1--220:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3508360",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3508360",
  abstract =     "The development of cloud infrastructures inspires the
                 emergence of cloud-native computing. As the most
                 promising architecture for deploying \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "220",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2022:SAD,
  author =       "Peng Liu and Lizhe Wang and Rajiv Ranjan and Guojin He
                 and Lei Zhao",
  title =        "A Survey on Active Deep Learning: From Model Driven to
                 Data Driven",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "10s",
  pages =        "221:1--221:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3510414",
  bibdate =      "Thu Mar 23 11:02:53 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3510414",
  abstract =     "Which samples should be labelled in a large dataset is
                 one of the most important problems for the training of
                 deep learning. So far, a variety of active sample
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "221",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mampage:2022:HVR,
  author =       "Anupama Mampage and Shanika Karunasekera and Rajkumar
                 Buyya",
  title =        "A Holistic View on Resource Management in Serverless
                 Computing Environments: Taxonomy and Future
                 Directions",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "222:1--222:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3510412",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3510412",
  abstract =     "Serverless computing has emerged as an attractive
                 deployment option for cloud applications in recent
                 times. The unique features of this computing model
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "222",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sanchez:2022:PIR,
  author =       "Pablo S{\'a}nchez and Alejandro Bellog{\'\i}n",
  title =        "Point-of-Interest Recommender Systems Based on
                 Location-Based Social Networks: a Survey from an
                 Experimental Perspective",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "223:1--223:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3510409",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3510409",
  abstract =     "Point-of-Interest recommendation is an area of
                 increasing research and development interest within the
                 widely adopted technologies known as \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "223",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Delgado-Santos:2022:SPV,
  author =       "Paula Delgado-Santos and Giuseppe Stragapede and Ruben
                 Tolosana and Richard Guest and Farzin Deravi and Ruben
                 Vera-Rodriguez",
  title =        "A Survey of Privacy Vulnerabilities of Mobile Device
                 Sensors",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "224:1--224:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3510579",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3510579",
  abstract =     "The number of mobile devices, such as smartphones and
                 smartwatches, is relentlessly increasing, to almost 6.8
                 billion by 2022, and along with it, the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "224",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Witharana:2022:SAB,
  author =       "Hasini Witharana and Yangdi Lyu and Subodha Charles
                 and Prabhat Mishra",
  title =        "A Survey on Assertion-based Hardware Verification",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "225:1--225:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3510578",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3510578",
  abstract =     "Hardware verification of modern electronic systems has
                 been identified as a major bottleneck due to the
                 increasing complexity and time-to-market constraints.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "225",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fagerholm:2022:CSE,
  author =       "Fabian Fagerholm and Michael Felderer and Davide Fucci
                 and Michael Unterkalmsteiner and Bogdan Marculescu and
                 Markus Martini and Lars G{\"o}ran Wallgren Tengberg and
                 Robert Feldt and Bettina Lehtel{\"a} and Bal{\'a}zs
                 Nagyv{\'a}radi and Jehan Khattak",
  title =        "Cognition in Software Engineering: a Taxonomy and
                 Survey of a Half-Century of Research",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "226:1--226:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3508359",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3508359",
  abstract =     "Cognition plays a fundamental role in most software
                 engineering activities. This article provides a
                 taxonomy of cognitive concepts and a survey of the
                 literature since \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "226",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yu:2022:SKE,
  author =       "Wenhao Yu and Chenguang Zhu and Zaitang Li and Zhiting
                 Hu and Qingyun Wang and Heng Ji and Meng Jiang",
  title =        "A Survey of Knowledge-enhanced Text Generation",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "227:1--227:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3512467",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3512467",
  abstract =     "The goal of text-to-text generation is to make
                 machines express like a human in many applications such
                 as conversation, summarization, and translation. It
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "227",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Korala:2022:STF,
  author =       "Harindu Korala and Dimitrios Georgakopoulos and Prem
                 Prakash Jayaraman and Ali Yavari",
  title =        "A Survey of Techniques for Fulfilling the Time-Bound
                 Requirements of Time-Sensitive {IoT} Applications",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "228:1--228:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3510411",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3510411",
  abstract =     "This article surveys existing techniques for meeting
                 the time-bound requirements of time-sensitive
                 applications in the Internet of Things (IoT). To
                 provide the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "228",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kayan:2022:CIC,
  author =       "Hakan Kayan and Matthew Nunes and Omer Rana and Pete
                 Burnap and Charith Perera",
  title =        "Cybersecurity of Industrial Cyber-Physical Systems: a
                 Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "229:1--229:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3510410",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3510410",
  abstract =     "Industrial cyber-physical systems (ICPSs) manage
                 critical infrastructures by controlling the processes
                 based on the ``physics'' data gathered by edge sensor
                 networks. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "229",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhu:2022:FSR,
  author =       "Xiaogang Zhu and Sheng Wen and Seyit Camtepe and Yang
                 Xiang",
  title =        "Fuzzing: a Survey for Roadmap",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "230:1--230:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3512345",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3512345",
  abstract =     "Fuzz testing (fuzzing) has witnessed its prosperity in
                 detecting security flaws recently. It generates a large
                 number of test cases and monitors the executions
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "230",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zadnik:2022:IVC,
  author =       "Jakub {\v{Z}}{\'a}dn{\'{\i}}k and Markku M{\"a}kitalo
                 and Jarno Vanne and Pekka J{\"a}{\"a}skel{\"a}inen",
  title =        "Image and Video Coding Techniques for Ultra-low
                 Latency",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "231:1--231:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3512342",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3512342",
  abstract =     "The next generation of wireless networks fosters the
                 adoption of latency-critical applications such as XR,
                 connected industry, or autonomous driving. This
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "231",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chandramouli:2022:SPS,
  author =       "Anirudh Chandramouli and Ashish Choudhury and Arpita
                 Patra",
  title =        "A Survey on Perfectly Secure Verifiable
                 Secret-sharing",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "232:1--232:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3512344",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3512344",
  abstract =     "Verifiable Secret-Sharing (VSS) is a fundamental
                 primitive in secure distributed computing. It is used
                 as a building block in several distributed computing
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "232",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jamil:2022:RAT,
  author =       "Bushra Jamil and Humaira Ijaz and Mohammad Shojafar
                 and Kashif Munir and Rajkumar Buyya",
  title =        "Resource Allocation and Task Scheduling in Fog
                 Computing and {Internet} of Everything Environments: a
                 Taxonomy, Review, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "233:1--233:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3513002",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3513002",
  abstract =     "The Internet of Everything paradigm is being rapidly
                 adopted in developing applications for different
                 domains like smart agriculture, smart city, big data
                 streaming, and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "233",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mittal:2022:AAB,
  author =       "Ajay Mittal and Sabrina Dhalla and Savita Gupta and
                 Aastha Gupta",
  title =        "Automated Analysis of Blood Smear Images for Leukemia
                 Detection: a Comprehensive Review",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "234:1--234:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3514495",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3514495",
  abstract =     "Leukemia, the malignancy of blood-forming tissues,
                 becomes fatal if not detected in the early stages. It
                 is detected through a blood smear test that involves
                 the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "234",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hu:2022:MIA,
  author =       "Hongsheng Hu and Zoran Salcic and Lichao Sun and
                 Gillian Dobbie and Philip S. Yu and Xuyun Zhang",
  title =        "Membership Inference Attacks on Machine Learning: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "235:1--235:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3523273",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3523273",
  abstract =     "Machine learning (ML) models have been widely applied
                 to various applications, including image
                 classification, text generation, audio recognition, and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "235",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Muralidhar:2022:EEC,
  author =       "Rajeev Muralidhar and Renata Borovica-Gajic and
                 Rajkumar Buyya",
  title =        "Energy Efficient Computing Systems: Architectures,
                 Abstractions and Modeling to Techniques and Standards",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "236:1--236:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3511094",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3511094",
  abstract =     "Computing systems have undergone a tremendous change
                 in the last few decades with several inflexion points.
                 While Moore's law guided the semiconductor \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "236",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cardellini:2022:RAD,
  author =       "Valeria Cardellini and Francesco {Lo Presti} and
                 Matteo Nardelli and Gabriele {Russo Russo}",
  title =        "Runtime Adaptation of Data Stream Processing Systems:
                 The State of the Art",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "237:1--237:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3514496",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3514496",
  abstract =     "Data stream processing (DSP) has emerged over the
                 years as the reference paradigm for the analysis of
                 continuous and fast information flows, which often
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "237",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Oz:2022:SRE,
  author =       "Harun Oz and Ahmet Aris and Albert Levi and A. Selcuk
                 Uluagac",
  title =        "A Survey on Ransomware: Evolution, Taxonomy, and
                 Defense Solutions",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "238:1--238:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3514229",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3514229",
  abstract =     "In recent years, ransomware has been one of the most
                 notorious malware targeting end-users, governments, and
                 business organizations. It has become a \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "238",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Shafiei:2022:SCS,
  author =       "Hossein Shafiei and Ahmad Khonsari and Payam Mousavi",
  title =        "Serverless Computing: a Survey of Opportunities,
                 Challenges, and Applications",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "239:1--239:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3510611",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3510611",
  abstract =     "The emerging serverless computing paradigm has
                 attracted attention from both academia and industry.
                 This paradigm brings benefits such as less operational
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "239",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Suhail:2022:BBD,
  author =       "Sabah Suhail and Rasheed Hussain and Raja Jurdak and
                 Alma Oracevic and Khaled Salah and Choong Seon Hong and
                 Raimundas Matulevi{\v{c}}ius",
  title =        "Blockchain-Based Digital Twins: Research Trends,
                 Issues, and Future Challenges",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "240:1--240:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3517189",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3517189",
  abstract =     "Industrial processes rely on sensory data for
                 decision-making processes, risk assessment, and
                 performance evaluation. Extracting actionable insights
                 from the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "240",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ribeiro:2022:LVS,
  author =       "Matheus A. O. Ribeiro and F{\'a}tima L. S. Nunes",
  title =        "Left Ventricle Segmentation in Cardiac {MR}: a
                 Systematic Mapping of the Past Decade",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "241:1--241:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3517190",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3517190",
  abstract =     "Left ventricle segmentation in short-axis cardiac
                 magnetic resonance images is important to diagnose
                 heart disease. However, repetitive manual \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "241",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Antonelli:2022:FSO,
  author =       "Simone Antonelli and Danilo Avola and Luigi Cinque and
                 Donato Crisostomi and Gian Luca Foresti and Fabio
                 Galasso and Marco Raoul Marini and Alessio Mecca and
                 Daniele Pannone",
  title =        "Few-Shot Object Detection: a Survey",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "242:1--242:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3519022",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3519022",
  abstract =     "Deep learning approaches have recently raised the bar
                 in many fields, from Natural Language Processing to
                 Computer Vision, by leveraging large amounts of data.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "242",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2022:STL,
  author =       "Shengmei Liu and Xiaokun Xu and Mark Claypool",
  title =        "A Survey and Taxonomy of Latency Compensation
                 Techniques for Network Computer Games",
  journal =      j-COMP-SURV,
  volume =       "54",
  number =       "11s",
  pages =        "243:1--243:??",
  month =        jan,
  year =         "2022",
  DOI =          "https://doi.org/10.1145/3519023",
  bibdate =      "Thu Mar 23 11:02:54 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3519023",
  abstract =     "Computer games, one of the most popular forms of
                 entertainment in the world, are increasingly online
                 multiplayer, connecting geographically dispersed
                 players in \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "243",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Qi:2023:SOM,
  author =       "Shuren Qi and Yushu Zhang and Chao Wang and Jiantao
                 Zhou and Xiaochun Cao",
  title =        "A Survey of Orthogonal Moments for Image
                 Representation: Theory, Implementation, and
                 Evaluation",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "1:1--1:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3479428",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3479428",
  abstract =     "Image representation is an important topic in computer
                 vision and pattern recognition. It plays a fundamental
                 role in a range of applications toward understanding
                 visual contents. Moment-based image representation has
                 been reported to be effective in \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sarwar:2023:SPP,
  author =       "Kinza Sarwar and Sira Yongchareon and Jian Yu and
                 Saeed Ur Rehman",
  title =        "A Survey on Privacy Preservation in Fog-Enabled
                 {Internet of Things}",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "2:1--2:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3474554",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3474554",
  abstract =     "Despite the rapid growth and advancement in the
                 Internet of Things (IoT), there are critical challenges
                 that need to be addressed before the full adoption of
                 the IoT. Data privacy is one of the hurdles towards the
                 adoption of IoT as there might be \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cicala:2023:PFA,
  author =       "Fabrizio Cicala and Weicheng Wang and Tianhao Wang and
                 Ninghui Li and Elisa Bertino and Faming Liang and Yang
                 Yang",
  title =        "{PURE}: a Framework for Analyzing Proximity-based
                 Contact Tracing Protocols",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "3:1--3:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485131",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485131",
  abstract =     "Many proximity-based tracing (PCT) protocols have been
                 proposed and deployed to combat the spreading of
                 COVID-19. In this article, we take a systematic
                 approach to analyze PCT protocols. We identify a list
                 of desired properties of a contact tracing design
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Meneguette:2023:VEC,
  author =       "Rodolfo Meneguette and Robson {De Grande} and Jo
                 Ueyama and Geraldo P. Rocha Filho and Edmundo Madeira",
  title =        "Vehicular Edge Computing: Architecture, Resource
                 Management, Security, and Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "4:1--4:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485129",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485129",
  abstract =     "Vehicular Edge Computing (VEC), based on the Edge
                 Computing motivation and fundamentals, is a promising
                 technology supporting Intelligent Transport Systems
                 services, smart city applications, and urban computing.
                 VEC can provide and manage computational \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yu:2023:RLH,
  author =       "Chao Yu and Jiming Liu and Shamim Nemati and Guosheng
                 Yin",
  title =        "Reinforcement Learning in Healthcare: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "5:1--5:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3477600",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3477600",
  abstract =     "As a subfield of machine learning, reinforcement
                 learning (RL) aims at optimizing decision making by
                 using interaction samples of an agent with its
                 environment and the potentially delayed feedbacks. In
                 contrast to traditional supervised learning that
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xu:2023:UPD,
  author =       "Fan Xu and Victor S. Sheng and Mingwen Wang",
  title =        "A Unified Perspective for Disinformation Detection and
                 Truth Discovery in Social Sensing: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "6:1--6:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3477138",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3477138",
  abstract =     "With the proliferation of social sensing, large
                 amounts of observation are contributed by people or
                 devices. However, these observations contain
                 disinformation. Disinformation can propagate across
                 online social networks at a relatively low cost, but
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Luca:2023:SDL,
  author =       "Massimiliano Luca and Gianni Barlacchi and Bruno Lepri
                 and Luca Pappalardo",
  title =        "A Survey on Deep Learning for Human Mobility",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "7:1--7:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485125",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485125",
  abstract =     "The study of human mobility is crucial due to its
                 impact on several aspects of our society, such as
                 disease spreading, urban planning, well-being,
                 pollution, and more. The proliferation of digital
                 mobility data, such as phone records, GPS traces, and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Machado:2023:AML,
  author =       "Gabriel Resende Machado and Eug{\^e}nio Silva and
                 Ronaldo Ribeiro Goldschmidt",
  title =        "Adversarial Machine Learning in Image Classification:
                 a Survey Toward the Defender's Perspective",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "8:1--8:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485133",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485133",
  abstract =     "Deep Learning algorithms have achieved
                 state-of-the-art performance for Image Classification.
                 For this reason, they have been used even in
                 security-critical applications, such as biometric
                 recognition systems and self-driving cars. However,
                 recent works \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hazra:2023:CSI,
  author =       "Abhishek Hazra and Mainak Adhikari and Tarachand
                 Amgoth and Satish Narayana Srirama",
  title =        "A Comprehensive Survey on Interoperability for {IIoT}:
                 Taxonomy, Standards, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "9:1--9:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485130",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485130",
  abstract =     "In the era of Industry 4.0, the Internet-of-Things
                 (IoT) performs the driving position analogous to the
                 initial industrial metamorphosis. IoT affords the
                 potential to couple machine-to-machine
                 intercommunication and real-time information-gathering
                 within \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Barros:2023:SED,
  author =       "Claudio D. T. Barros and Matheus R. F. Mendon{\c{c}}a
                 and Alex B. Vieira and Artur Ziviani",
  title =        "A Survey on Embedding Dynamic Graphs",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "10:1--10:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3483595",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3483595",
  abstract =     "Embedding static graphs in low-dimensional vector
                 spaces plays a key role in network analytics and
                 inference, supporting applications like node
                 classification, link prediction, and graph
                 visualization. However, many real-world networks
                 present dynamic \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rosenfeld:2023:QPH,
  author =       "Viktor Rosenfeld and Sebastian Bre{\ss} and Volker
                 Markl",
  title =        "Query Processing on Heterogeneous {CPU\slash GPU}
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "11:1--11:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485126",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485126",
  abstract =     "Due to their high computational power and internal
                 memory bandwidth, graphic processing units (GPUs) have
                 been extensively studied by the database systems
                 research community. A heterogeneous query processing
                 system that employs CPUs and GPUs at the same
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bekoulis:2023:RFE,
  author =       "Giannis Bekoulis and Christina Papagiannopoulou and
                 Nikos Deligiannis",
  title =        "A Review on Fact Extraction and Verification",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "12:1--12:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485127",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485127",
  abstract =     "We study the fact-checking problem, which aims to
                 identify the veracity of a given claim. Specifically,
                 we focus on the task of Fact Extraction and
                 VERification (FEVER) and its accompanied dataset. The
                 task consists of the subtasks of retrieving the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jiang:2023:DLB,
  author =       "Junjun Jiang and Chenyang Wang and Xianming Liu and
                 Jiayi Ma",
  title =        "Deep Learning-based Face Super-resolution: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "13:1--13:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485132",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485132",
  abstract =     "Face super-resolution (FSR), also known as face
                 hallucination, which is aimed at enhancing the
                 resolution of low-resolution (LR) face images to
                 generate high-resolution face images, is a
                 domain-specific image super-resolution problem.
                 Recently, FSR has \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ge:2023:NNB,
  author =       "Wenbo Ge and Pooia Lalbakhsh and Leigh Isai and Artem
                 Lenskiy and Hanna Suominen",
  title =        "Neural Network-Based Financial Volatility Forecasting:
                 a Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "14:1--14:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3483596",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3483596",
  abstract =     "Volatility forecasting is an important aspect of
                 finance as it dictates many decisions of market
                 players. A snapshot of state-of-the-art neural
                 network-based financial volatility forecasting was
                 generated by examining 35 studies, published after
                 2015. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2023:ARA,
  author =       "Deqiang Li and Qianmu Li and Yanfang (Fanny) Ye and
                 Shouhuai Xu",
  title =        "Arms Race in Adversarial Malware Detection: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "15:1--15:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3484491",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3484491",
  abstract =     "Malicious software (malware) is a major cyber threat
                 that has to be tackled with Machine Learning (ML)
                 techniques because millions of new malware examples are
                 injected into cyberspace on a daily basis. However, ML
                 is vulnerable to attacks known as \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Amadini:2023:SSC,
  author =       "Roberto Amadini",
  title =        "A Survey on String Constraint Solving",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "16:1--16:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3484198",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3484198",
  abstract =     "String constraint solving refers to solving
                 combinatorial problems involving constraints over
                 string variables. String solving approaches have become
                 popular over the past few years given the massive use
                 of strings in different application domains like
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Brant:2023:COP,
  author =       "Christopher Brant and Prakash Shrestha and Benjamin
                 Mixon-Baca and Kejun Chen and Said Varlioglu and Nelly
                 Elsayed and Yier Jin and Jedidiah Crandall and Daniela
                 Oliveira",
  title =        "Challenges and Opportunities for Practical and
                 Effective Dynamic Information Flow Tracking",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "17:1--17:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3483790",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3483790",
  abstract =     "Information flow tracking was proposed more than 40
                 years ago to address the limitations of access control
                 mechanisms to guarantee the confidentiality and
                 integrity of information flowing within a system, but
                 has not yet been widely applied in practice \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Blanco:2023:SVA,
  author =       "Alison Fernandez Blanco and Alexandre Bergel and Juan
                 Pablo Sandoval Alcocer",
  title =        "Software Visualizations to Analyze Memory Consumption:
                 a Literature Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "18:1--18:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485134",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485134",
  abstract =     "Understanding and optimizing memory usage of software
                 applications is a difficult task, usually involving the
                 analysis of large amounts of memory-related complex
                 data. Over the years, numerous software visualizations
                 have been proposed to help developers \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alrabaee:2023:SBC,
  author =       "Saed Alrabaee and Mourad Debbabi and Lingyu Wang",
  title =        "A Survey of Binary Code Fingerprinting Approaches:
                 Taxonomy, Methodologies, and Features",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "19:1--19:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3486860",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3486860",
  abstract =     "Binary code fingerprinting is crucial in many security
                 applications. Examples include malware detection,
                 software infringement, vulnerability analysis, and
                 digital forensics. It is also useful for security
                 researchers and reverse engineers since it \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hu:2023:AIS,
  author =       "Yupeng Hu and Wenxin Kuang and Zheng Qin and Kenli Li
                 and Jiliang Zhang and Yansong Gao and Wenjia Li and
                 Keqin Li",
  title =        "Artificial Intelligence Security: Threats and
                 Countermeasures",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "20:1--20:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3487890",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3487890",
  abstract =     "In recent years, with rapid technological advancement
                 in both computing hardware and algorithm, Artificial
                 Intelligence (AI) has demonstrated significant
                 advantage over human being in a wide range of fields,
                 such as image recognition, education, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rugo:2023:SRU,
  author =       "Alessio Rugo and Claudio A. Ardagna and Nabil {El
                 Ioini}",
  title =        "A Security Review in the {UAVNet} Era: Threats,
                 Countermeasures, and Gap Analysis",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "21:1--21:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485272",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485272",
  abstract =     "Unmanned Aerial Vehicles (UAVs) are becoming one of
                 the main technological supports for commercial
                 applications, embracing many domains ranging from human
                 safety to the medical field, agriculture and
                 environment, multimedia production, and even commercial
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2023:CDI,
  author =       "Huacheng Li and Chunhe Xia and Tianbo Wang and Sheng
                 Wen and Chao Chen and Yang Xiang",
  title =        "Capturing Dynamics of Information Diffusion in {SNS}:
                 a Survey of Methodology and Techniques",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "22:1--22:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485273",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485273",
  abstract =     "Studying information diffusion in SNS (Social Networks
                 Service) has remarkable significance in both academia
                 and industry. Theoretically, it boosts the development
                 of other subjects such as statistics, sociology, and
                 data mining. Practically, diffusion \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Nguyen:2023:CTD,
  author =       "Thanh Tuan Nguyen and Thanh Phuong Nguyen",
  title =        "A Comprehensive Taxonomy of Dynamic Texture
                 Representation",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "1",
  pages =        "23:1--23:??",
  month =        jan,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3487892",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:27 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3487892",
  abstract =     "Representing dynamic textures (DTs) plays an important
                 role in many real implementations in the computer
                 vision community. Due to the turbulent and
                 non-directional motions of DTs along with the negative
                 impacts of different factors (e.g., environmental
                 \ldots{})",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ciccozzi:2023:CEL,
  author =       "Federico Ciccozzi and Lorenzo Addazi and Sara
                 Abbaspour Asadollah and Bj{\"o}rn Lisper and Abu Naser
                 Masud and Saad Mubeen",
  title =        "A Comprehensive Exploration of Languages for Parallel
                 Computing",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "24:1--24:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485008",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485008",
  abstract =     "Software-intensive systems in most domains, from
                 autonomous vehicles to health, are becoming
                 predominantly parallel to efficiently manage large
                 amount of data in short (even real-) time. There is an
                 incredibly rich literature on languages for parallel
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lai:2023:SGB,
  author =       "Zhao-Rong Lai and Haisheng Yang",
  title =        "A Survey on Gaps between Mean-Variance Approach and
                 Exponential Growth Rate Approach for Portfolio
                 Optimization",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "25:1--25:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485274",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485274",
  abstract =     "Portfolio optimization can be roughly categorized as
                 the mean-variance approach and the exponential growth
                 rate approach based on different theoretical
                 foundations, trading logics, optimization objectives,
                 and methodologies. The former and the latter are
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sai:2023:SEM,
  author =       "Ananya B. Sai and Akash Kumar Mohankumar and Mitesh M.
                 Khapra",
  title =        "A Survey of Evaluation Metrics Used for {NLG}
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "26:1--26:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485766",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485766",
  abstract =     "In the last few years, a large number of automatic
                 evaluation metrics have been proposed for evaluating
                 Natural Language Generation (NLG) systems. The rapid
                 development and adoption of such automatic evaluation
                 metrics in a relatively short time has \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Khan:2023:LAD,
  author =       "Manzoor Ahmed Khan and Hesham {El Sayed} and Sumbal
                 Malik and Talha Zia and Jalal Khan and Najla Alkaabi
                 and Henry Ignatious",
  title =        "Level-5 Autonomous Driving-Are We There Yet? {A}
                 Review of Research Literature",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "27:1--27:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485767",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485767",
  abstract =     "Autonomous vehicles are revolutionizing transport and
                 next-generation autonomous mobility. Such vehicles are
                 promising to increase road safety, improve traffic
                 efficiency, reduce vehicle emission, and improve
                 mobility. However, for these vehicles to live
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Adeleke:2023:NTG,
  author =       "Oluwamayowa Ade Adeleke and Nicholas Bastin and Deniz
                 Gurkan",
  title =        "Network Traffic Generation: a Survey and Methodology",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "28:1--28:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3488375",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3488375",
  abstract =     "Network traffic workloads are widely utilized in
                 applied research to verify correctness and to measure
                 the impact of novel algorithms, protocols, and network
                 functions. We provide a comprehensive survey of traffic
                 generators referenced by researchers over \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Costa:2023:OFC,
  author =       "Breno Costa and Joao Bachiega and Leonardo
                 Rebou{\c{c}}as de Carvalho and Aleteia P. F. Araujo",
  title =        "Orchestration in Fog Computing: a Comprehensive
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "29:1--29:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3486221",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3486221",
  abstract =     "Fog computing is a paradigm that brings computational
                 resources and services to the network edge in the
                 vicinity of user devices, lowering latency and
                 connecting with cloud computing resources. Unlike cloud
                 computing, fog resources are based on \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Aldausari:2023:VGA,
  author =       "Nuha Aldausari and Arcot Sowmya and Nadine Marcus and
                 Gelareh Mohammadi",
  title =        "Video Generative Adversarial Networks: a Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "30:1--30:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3487891",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3487891",
  abstract =     "With the increasing interest in the content creation
                 field in multiple sectors such as media, education, and
                 entertainment, there is an increased trend in the
                 papers that use AI algorithms to generate content such
                 as images, videos, audio, and text. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Deng:2023:SRT,
  author =       "Libing Deng and Guoqi Xie and Hong Liu and Yunbo Han
                 and Renfa Li and Keqin Li",
  title =        "A Survey of Real-Time {Ethernet} Modeling and Design
                 Methodologies: From {AVB} to {TSN}",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "31:1--31:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3487330",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3487330",
  abstract =     "With the development of real-time critical systems,
                 the ever-increasing communication data traffic puts
                 forward high-bandwidth and low-delay requirements for
                 communication networks. Therefore, various real-time
                 Ethernet protocols have been proposed, but \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hasan:2023:PPR,
  author =       "Omar Hasan and Lionel Brunie and Elisa Bertino",
  title =        "Privacy-Preserving Reputation Systems Based on
                 Blockchain and Other Cryptographic Building Blocks: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "32:1--32:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3490236",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3490236",
  abstract =     "The purpose of a reputation system is to hold the
                 users of a distributed application accountable for
                 their behavior. The reputation of a user is computed as
                 an aggregate of the feedback provided by fellow users
                 in the system. Truthful feedback is clearly \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sarwar:2023:SUE,
  author =       "Tabinda Sarwar and Sattar Seifollahi and Jeffrey Chan
                 and Xiuzhen Zhang and Vural Aksakalli and Irene Hudson
                 and Karin Verspoor and Lawrence Cavedon",
  title =        "The Secondary Use of Electronic Health Records for
                 Data Mining: Data Characteristics and Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "33:1--33:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3490234",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3490234",
  abstract =     "The primary objective of implementing Electronic
                 Health Records (EHRs) is to improve the management of
                 patients' health-related information. However, these
                 records have also been extensively used for the
                 secondary purpose of clinical research and to
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{dosSantos:2023:GRB,
  author =       "Claudio Filipi Gon{\c{c}}alves dos Santos and Diego de
                 Souza Oliveira and Leandro A. Passos and Rafael
                 Gon{\c{c}}alves Pires and Daniel Felipe Silva Santos
                 and Lucas Pascotti Valem and Thierry P. Moreira and
                 Marcos Cleison S. Santana and Mateus Roder and Jo Paulo
                 Papa and Danilo Colombo",
  title =        "Gait Recognition Based on Deep Learning: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "34:1--34:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3490235",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3490235",
  abstract =     "In general, biometry-based control systems may not
                 rely on individual expected behavior or cooperation to
                 operate appropriately. Instead, such systems should be
                 aware of malicious procedures for unauthorized access
                 attempts. Some works available in the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jin:2023:BQA,
  author =       "Qiao Jin and Zheng Yuan and Guangzhi Xiong and Qianlan
                 Yu and Huaiyuan Ying and Chuanqi Tan and Mosha Chen and
                 Songfang Huang and Xiaozhong Liu and Sheng Yu",
  title =        "Biomedical Question Answering: a Survey of Approaches
                 and Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "35:1--35:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3490238",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3490238",
  abstract =     "Automatic Question Answering (QA) has been
                 successfully applied in various domains such as search
                 engines and chatbots. Biomedical QA (BQA), as an
                 emerging QA task, enables innovative applications to
                 effectively perceive, access, and understand complex
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xie:2023:SRC,
  author =       "Yiqun Xie and Shashi Shekhar and Yan Li",
  title =        "Statistically-Robust Clustering Techniques for Mapping
                 Spatial Hotspots: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "36:1--36:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3487893",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3487893",
  abstract =     "Mapping of spatial hotspots, i.e., regions with
                 significantly higher rates of generating cases of
                 certain events (e.g., disease or crime cases), is an
                 important task in diverse societal domains, including
                 public health, public safety, transportation,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alemany:2023:RPD,
  author =       "J. Alemany and E. {Del Val} and A.
                 Garc{\'\i}a-Fornes",
  title =        "A Review of Privacy Decision-making Mechanisms in
                 Online Social Networks",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "37:1--37:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3494067",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3494067",
  abstract =     "Personal information of online social networks (OSNs)
                 is governed by the privacy policies chosen by users
                 besides OSN's policies. Users make these decisions
                 using privacy mechanisms, but privacy problems and
                 regrets are daily reported. This article \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhou:2023:NRL,
  author =       "Jingya Zhou and Ling Liu and Wenqi Wei and Jianxi
                 Fan",
  title =        "Network Representation Learning: From Preprocessing,
                 Feature Extraction to Node Embedding",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "38:1--38:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3491206",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3491206",
  abstract =     "Network representation learning (NRL) advances the
                 conventional graph mining of social networks, knowledge
                 graphs, and complex biomedical and physics information
                 networks. Dozens of NRL algorithms have been reported
                 in the literature. Most of them focus \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kaur:2023:TAI,
  author =       "Davinder Kaur and Suleyman Uslu and Kaley J.
                 Rittichier and Arjan Durresi",
  title =        "Trustworthy Artificial Intelligence: a Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "39:1--39:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3491209",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3491209",
  abstract =     "Artificial intelligence (AI) and algorithmic decision
                 making are having a profound impact on our daily lives.
                 These systems are vastly used in different high-stakes
                 applications like healthcare, business, government,
                 education, and justice, moving us \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fahy:2023:SLN,
  author =       "Conor Fahy and Shengxiang Yang and Mario Gongora",
  title =        "Scarcity of Labels in Non-Stationary Data Streams: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "40:1--40:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3494832",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3494832",
  abstract =     "In a dynamic stream there is an assumption that the
                 underlying process generating the stream is
                 non-stationary and that concepts within the stream will
                 drift and change as the stream progresses. Concepts
                 learned by a classification model are prone to
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fernandes:2023:SAU,
  author =       "Jos{\'e} Marcelo Fernandes and Jorge S{\'a} Silva and
                 Andr{\'e} Rodrigues and Fernando Boavida",
  title =        "A Survey of Approaches to Unobtrusive Sensing of
                 Humans",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "41:1--41:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3491208",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3491208",
  abstract =     "The increasing amount of human-related and/or
                 human-originated data in current systems is both an
                 opportunity and a challenge. Nevertheless, despite
                 relying on the processing of large amounts of data,
                 most of the so-called smart systems that we have
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rolnick:2023:TCC,
  author =       "David Rolnick and Priya L. Donti and Lynn H. Kaack and
                 Kelly Kochanski and Alexandre Lacoste and Kris Sankaran
                 and Andrew Slavin Ross and Nikola Milojevic-Dupont and
                 Natasha Jaques and Anna Waldman-Brown and Alexandra
                 Sasha Luccioni and Tegan Maharaj and Evan D. Sherwin
                 and S. Karthik Mukkavilli and Konrad P. Kording and
                 Carla P. Gomes and Andrew Y. Ng and Demis Hassabis and
                 John C. Platt and Felix Creutzig and Jennifer Chayes
                 and Yoshua Bengio",
  title =        "Tackling Climate Change with Machine Learning",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "42:1--42:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3485128",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485128",
  abstract =     "Climate change is one of the greatest challenges
                 facing humanity, and we, as machine learning (ML)
                 experts, may wonder how we can help. Here we describe
                 how ML can be a powerful tool in reducing greenhouse
                 gas emissions and helping society adapt to a \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sharma:2023:CRM,
  author =       "Shallu Sharma and Pravat Kumar Mandal",
  title =        "A Comprehensive Report on Machine Learning-based Early
                 Detection of {Alzheimer}'s Disease using Multi-modal
                 Neuroimaging Data",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "43:1--43:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3492865",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3492865",
  abstract =     "Alzheimer's Disease (AD) is a devastating
                 neurodegenerative brain disorder with no cure. An early
                 identification helps patients with AD sustain a normal
                 living. We have outlined machine learning (ML)
                 methodologies with different schemes of feature
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bang:2023:ARA,
  author =       "Ankur O. Bang and Udai Pratap Rao and Pallavi Kaliyar
                 and Mauro Conti",
  title =        "Assessment of Routing Attacks and Mitigation
                 Techniques with {RPL} Control Messages: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "2",
  pages =        "44:1--44:??",
  month =        mar,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3494524",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:28 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3494524",
  abstract =     "Routing Protocol for Low-Power and Lossy Networks
                 (RPL) is a standard routing protocol for the Low Power
                 and Lossy Networks (LLNs). It is a part of the IPv6
                 over Low-Power Wireless Personal Area Network (6LoWPAN)
                 protocol stack. Features such as energy-. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Anand:2023:ECC,
  author =       "Sanjay Kumar Anand and Suresh Kumar",
  title =        "Experimental Comparisons of Clustering Approaches for
                 Data Representation",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "45:1--45:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3490384",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3490384",
  abstract =     "Clustering approaches are extensively used by many
                 areas such as IR, Data Integration, Document
                 Classification, Web Mining, Query Processing, and many
                 other domains and disciplines. Nowadays, much
                 literature describes clustering algorithms on
                 multivariate \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "45",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alyahya:2023:SBS,
  author =       "Tasniem Nasser Alyahya and Mohamed {El Bachir Menai}
                 and Hassan Mathkour",
  title =        "On the Structure of the {Boolean} Satisfiability
                 Problem: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "46:1--46:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3491210",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3491210",
  abstract =     "The Boolean satisfiability problem (SAT) is a
                 fundamental NP-complete decision problem in automated
                 reasoning and mathematical logic. As evidenced by the
                 results of SAT competitions, the performance of SAT
                 solvers varies substantially between different
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "46",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{RobertoeSouza:2023:SDV,
  author =       "Marcos {Roberto e Souza} and Helena {de Almeida Maia}
                 and Helio Pedrini",
  title =        "Survey on Digital Video Stabilization: Concepts,
                 Methods, and Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "47:1--47:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3494525",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3494525",
  abstract =     "Digital video stabilization is a challenging task that
                 aims to transform a potentially shaky video into a
                 pleasant one by smoothing the camera trajectory.
                 Despite the various works found in the literature
                 addressing this task, their organization and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "47",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Muske:2023:SAP,
  author =       "Tukaram Muske and Alexander Serebrenik",
  title =        "Survey of Approaches for Postprocessing of Static
                 Analysis Alarms",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "48:1--48:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3494521",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3494521",
  abstract =     "Static analysis tools have showcased their importance
                 and usefulness in automated detection of defects.
                 However, the tools are known to generate a large number
                 of alarms which are warning messages to the user. The
                 large number of alarms and cost incurred \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hettiachchi:2023:STA,
  author =       "Danula Hettiachchi and Vassilis Kostakos and Jorge
                 Goncalves",
  title =        "A Survey on Task Assignment in Crowdsourcing",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "49:1--49:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3494522",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3494522",
  abstract =     "Quality improvement methods are essential to gathering
                 high-quality crowdsourced data, both for research and
                 industry applications. A popular and broadly applicable
                 method is task assignment that dynamically adjusts
                 crowd workflow parameters. In this \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "49",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Singh:2023:TMS,
  author =       "Raj Mohan Singh and Lalit Kumar Awasthi and Geeta
                 Sikka",
  title =        "Towards Metaheuristic Scheduling Techniques in Cloud
                 and Fog: an Extensive Taxonomic Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "50:1--50:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3494520",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3494520",
  abstract =     "Task scheduling is a critical issue in distributed
                 computing environments like cloud and fog. The
                 objective is to provide an optimal distribution of
                 tasks among the resources. Several research initiatives
                 to use metaheuristic techniques for finding near-.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Pessach:2023:RFM,
  author =       "Dana Pessach and Erez Shmueli",
  title =        "A Review on Fairness in Machine Learning",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "51:1--51:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3494672",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3494672",
  abstract =     "An increasing number of decisions regarding the daily
                 lives of human beings are being controlled by
                 artificial intelligence and machine learning (ML)
                 algorithms in spheres ranging from healthcare,
                 transportation, and education to college admissions,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "51",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2023:LNT,
  author =       "Chenning Li and Zhichao Cao",
  title =        "{LoRa} Networking Techniques for Large-scale and
                 Long-term {IoT}: a Down-to-top Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "52:1--52:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3494673",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3494673",
  abstract =     "Low-Power Wide-Area Networks (LPWANs) are an emerging
                 Internet-of-Things (IoT) paradigm, which caters to
                 large-scale and long-term sensory data collection
                 demand. Among the commercialized LPWAN technologies,
                 LoRa (Long Range) attracts much interest from
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Plopski:2023:EER,
  author =       "Alexander Plopski and Teresa Hirzle and Nahal Norouzi
                 and Long Qian and Gerd Bruder and Tobias Langlotz",
  title =        "The Eye in Extended Reality: a Survey on Gaze
                 Interaction and Eye Tracking in Head-worn Extended
                 Reality",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "53:1--53:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3491207",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3491207",
  abstract =     "With innovations in the field of gaze and eye
                 tracking, a new concentration of research in the area
                 of gaze-tracked systems and user interfaces has formed
                 in the field of Extended Reality (XR). Eye trackers are
                 being used to explore novel forms of spatial \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wu:2023:SML,
  author =       "Nan Wu and Yuan Xie",
  title =        "A Survey of Machine Learning for Computer Architecture
                 and Systems",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "54:1--54:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3494523",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3494523",
  abstract =     "It has been a long time that computer architecture and
                 systems are optimized for efficient execution of
                 machine learning (ML) models. Now, it is time to
                 reconsider the relationship between ML and systems and
                 let ML transform the way that computer \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Reisinger:2023:SPU,
  author =       "Thomas Reisinger and Isabel Wagner and Eerke Albert
                 Boiten",
  title =        "Security and Privacy in Unified Communication",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "55:1--55:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3498335",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3498335",
  abstract =     "The use of unified communication; video conferencing,
                 audio conferencing, and instant messaging has
                 skyrocketed during the COVID-19 pandemic. However,
                 security and privacy considerations have often been
                 neglected. This article provides a comprehensive
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "55",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2023:BOU,
  author =       "Ruiqi Li and Xiang Zhao and Marie-Francine Moens",
  title =        "A Brief Overview of Universal Sentence Representation
                 Methods: a Linguistic View",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "56:1--56:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3482853",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3482853",
  abstract =     "How to transfer the semantic information in a sentence
                 to a computable numerical embedding form is a
                 fundamental problem in natural language processing. An
                 informative universal sentence embedding can greatly
                 promote subsequent natural language processing
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "56",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2023:SDQ,
  author =       "Huan Li and Hua Lu and Christian S. Jensen and Bo Tang
                 and Muhammad Aamir Cheema",
  title =        "Spatial Data Quality in the {Internet of Things}:
                 Management, Exploitation, and Prospects",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "57:1--57:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3498338",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3498338",
  abstract =     "With the continued deployment of the Internet of
                 Things (IoT), increasing volumes of devices are being
                 deployed that emit massive spatially referenced data.
                 Due in part to the dynamic, decentralized, and
                 heterogeneous architecture of the IoT, the varying
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "57",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mahmoud:2023:ELA,
  author =       "Dina G. Mahmoud and Vincent Lenders and Mirjana
                 Stojilovi{\'c}",
  title =        "Electrical-Level Attacks on {CPUs}, {FPGAs}, and
                 {GPUs}: Survey and Implications in the Heterogeneous
                 Era",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "58:1--58:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3498337",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3498337",
  abstract =     "Given the need for efficient high-performance
                 computing, computer architectures combining central
                 processing units (CPUs), graphics processing units
                 (GPUs), and field-programmable gate arrays (FPGAs) are
                 currently prevalent. However, each of these \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "58",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Soldani:2023:ADF,
  author =       "Jacopo Soldani and Antonio Brogi",
  title =        "Anomaly Detection and Failure Root Cause Analysis in
                 (Micro) Service-Based Cloud Applications: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "59:1--59:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3501297",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3501297",
  abstract =     "The proliferation of services and service interactions
                 within microservices and cloud-native applications,
                 makes it harder to detect failures and to identify
                 their possible root causes, which is, on the other hand
                 crucial to promptly recover and fix \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "59",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Nguyen:2023:FLS,
  author =       "Dinh C. Nguyen and Quoc-Viet Pham and Pubudu N.
                 Pathirana and Ming Ding and Aruna Seneviratne and
                 Zihuai Lin and Octavia Dobre and Won-Joo Hwang",
  title =        "Federated Learning for Smart Healthcare: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "60:1--60:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3501296",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3501296",
  abstract =     "Recent advances in communication technologies and the
                 Internet-of-Medical-Things (IOMT) have transformed
                 smart healthcare enabled by artificial intelligence
                 (AI). Traditionally, AI techniques require centralized
                 data collection and processing that may be \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "60",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Berenberg:2023:DAC,
  author =       "Anna Berenberg and Brad Calder",
  title =        "Deployment Archetypes for Cloud Applications",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "61:1--61:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3498336",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3498336",
  abstract =     "This is a survey article that explores six Cloud-based
                 deployment archetypes for Cloud applications and the
                 tradeoffs between them to achieve high availability,
                 low end-user latency, and acceptable costs. These are
                 (1) Zonal, (2) Regional, (3) Multi-. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "61",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gavrilut:2023:COO,
  author =       "Voica Gavrilut and Aleksander Pruski and Michael
                 St{\"u}bert Berger",
  title =        "Constructive or Optimized: an Overview of Strategies
                 to Design Networks for Time-Critical Applications",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "62:1--62:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3501294",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3501294",
  abstract =     "Distributed systems are pervasive nowadays, being
                 found in different areas, from smart toys to smart
                 factories. As the usage of such systems increases, so
                 does their complexity and design. Therefore, this work
                 aims to overview the methods for designing \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "62",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Barth:2023:UOP,
  author =       "Susanne Barth and Dan Ionita and Pieter Hartel",
  title =        "Understanding Online Privacy --- a Systematic Review
                 of Privacy Visualizations and Privacy by Design
                 Guidelines",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "63:1--63:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3502288",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3502288",
  abstract =     "Privacy visualizations help users understand the
                 privacy implications of using an online service.
                 Privacy by Design guidelines provide generally accepted
                 privacy standards for developers of online services. To
                 obtain a comprehensive understanding of \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "63",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cao:2023:AFC,
  author =       "Longbing Cao",
  title =        "{AI} in Finance: Challenges, Techniques, and
                 Opportunities",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "3",
  pages =        "64:1--64:??",
  month =        apr,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3502289",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 11 06:29:30 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3502289",
  abstract =     "AI in finance refers to the applications of AI
                 techniques in financial businesses. This area has
                 attracted attention for decades, with both classic and
                 modern AI techniques applied to increasingly broader
                 areas of finance, economy, and society. In \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "64",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Brauwers:2023:SAB,
  author =       "Gianni Brauwers and Flavius Frasincar",
  title =        "A Survey on Aspect-Based Sentiment Classification",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "65:1--65:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3503044",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3503044",
  abstract =     "With the constantly growing number of reviews and
                 other sentiment-bearing texts on the Web, the demand
                 for automatic sentiment analysis algorithms continues
                 to expand. Aspect-based sentiment classification (ABSC)
                 allows \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "65",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Willard:2023:ISK,
  author =       "Jared Willard and Xiaowei Jia and Shaoming Xu and
                 Michael Steinbach and Vipin Kumar",
  title =        "Integrating Scientific Knowledge with Machine Learning
                 for Engineering and Environmental Systems",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "66:1--66:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3514228",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3514228",
  abstract =     "There is a growing consensus that solutions to complex
                 science and engineering problems require novel
                 methodologies that are able to integrate traditional
                 physics-based modeling approaches with state-of-the-art
                 machine learning \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "66",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Santos:2023:ESS,
  author =       "Daniel S. Santos and Brauner R. N. Oliveira and Rick
                 Kazman and Elisa Y. Nakagawa",
  title =        "Evaluation of Systems-of-Systems Software
                 Architectures: State of the Art and Future
                 Perspectives",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "67:1--67:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3519020",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3519020",
  abstract =     "The quality of large and complex Systems-of-Systems
                 (SoS) that have emerged in critical application domains
                 depends on the quality of their architectures, which
                 are inherently dynamic in terms of reorganization at
                 runtime to \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "67",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{daSilveira:2023:SGE,
  author =       "Thiago L. T. da Silveira and Paulo G. L. Pinto and
                 Jeffri Murrugarra-Llerena and Cl{\'a}udio R. Jung",
  title =        "{$3$D} Scene Geometry Estimation from 360${}^\circ $
                 Imagery: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "68:1--68:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3519021",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3519021",
  abstract =     "This article provides a comprehensive survey on
                 pioneer and state-of-the-art 3D scene geometry
                 estimation methodologies based on single, two, or
                 multiple images captured under omnidirectional optics.
                 We first revisit the basic \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "68",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ferrari:2023:FMR,
  author =       "Alessio Ferrari and Maurice H. Ter Beek",
  title =        "Formal Methods in Railways: a Systematic Mapping
                 Study",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "69:1--69:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3520480",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3520480",
  abstract =     "Formal methods are mathematically based techniques for
                 the rigorous development of software-intensive systems.
                 The railway signaling domain is a field in which formal
                 methods have traditionally been applied, with several
                 success \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "69",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Qu:2023:BEF,
  author =       "Youyang Qu and Md Palash Uddin and Chenquan Gan and
                 Yong Xiang and Longxiang Gao and John Yearwood",
  title =        "Blockchain-enabled Federated Learning: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "70:1--70:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3524104",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3524104",
  abstract =     "Federated learning (FL) has experienced a boom in
                 recent years, which is jointly promoted by the
                 prosperity of machine learning and Artificial
                 Intelligence along with emerging privacy issues. In the
                 FL paradigm, a central server and local end devices
                 maintain the same model by exchanging model updates
                 instead of raw data, with which the privacy of data
                 stored on end devices is not directly revealed. In this
                 way, the privacy violation caused by the growing
                 collection of sensitive data can be mitigated. However,
                 the performance of FL with a central server is reaching
                 a bottleneck, while new threats are emerging
                 simultaneously. There are various reasons, among which
                 the most significant ones are centralized processing,
                 data falsification, and lack of incentives. To
                 accelerate the proliferation of FL, blockchain-enabled
                 FL has attracted substantial attention from both
                 academia and industry. A considerable number of novel
                 solutions are devised to meet the emerging demands of
                 diverse scenarios. Blockchain-enabled FL provides both
                 theories and techniques to improve the performance of
                 FL from various perspectives. In this survey, we will
                 comprehensively summarize and evaluate existing
                 variants of blockchain-enabled FL, identify the
                 emerging challenges, and propose potentially promising
                 research directions in this under-explored domain.",
  acknowledgement = ack-nhfb,
  articleno =    "70",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kanakis:2023:MLC,
  author =       "Marios Evangelos Kanakis and Ramin Khalili and Lin
                 Wang",
  title =        "Machine Learning for Computer Systems and Networking:
                 a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "71:1--71:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3523057",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3523057",
  abstract =     "Machine learning (ML) has become the de-facto approach
                 for various scientific domains such as computer vision
                 and natural language processing. Despite recent
                 breakthroughs, machine learning has only made its way
                 into the fundamental \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "71",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Troya:2023:MTT,
  author =       "Javier Troya and Sergio Segura and Lola Burgue{\~n}o
                 and Manuel Wimmer",
  title =        "Model Transformation Testing and Debugging: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "72:1--72:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3523056",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3523056",
  abstract =     "Model transformations are the key technique in
                 Model-Driven Engineering (MDE) to manipulate and
                 construct models. As a consequence, the correctness of
                 software systems built with MDE approaches relies
                 mainly on the correctness of \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "72",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Husen:2023:SRF,
  author =       "Arif Husen and Muhammad Hasanain Chaudary and Farooq
                 Ahmad",
  title =        "A Survey on Requirements of Future Intelligent
                 Networks: Solutions and Future Research Directions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "73:1--73:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3524106",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3524106",
  abstract =     "The context of this study examines the requirements of
                 Future Intelligent Networks (FIN), solutions, and
                 current research directions through a survey technique.
                 The background of this study is hinged on the
                 applications of Machine \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "73",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cui:2023:SSM,
  author =       "Yingan Cui and Xue Li and Junhuai Li and Huaijun Wang
                 and Xiaogang Chen",
  title =        "A Survey of Sampling Method for Social Media
                 Embeddedness Relationship",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "74:1--74:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3524105",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3524105",
  abstract =     "Social media embeddedness relationships consist of
                 online social networks formed by self-organized
                 individual actors and significantly affect many aspects
                 of our lives. Since the high cost and inefficiency of
                 using population \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "74",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gomes:2023:SSS,
  author =       "Heitor Murilo Gomes and Maciej Grzenda and Rodrigo
                 Mello and Jesse Read and Minh Huong Le Nguyen and
                 Albert Bifet",
  title =        "A Survey on Semi-supervised Learning for Delayed
                 Partially Labelled Data Streams",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "75:1--75:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3523055",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3523055",
  abstract =     "Unlabelled data appear in many domains and are
                 particularly relevant to streaming applications, where
                 even though data is abundant, labelled data is rare. To
                 address the learning problems associated with such
                 data, one can ignore \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "75",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jiang:2023:EDM,
  author =       "Shouyong Jiang and Juan Zou and Shengxiang Yang and
                 Xin Yao",
  title =        "Evolutionary Dynamic Multi-objective Optimisation: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "76:1--76:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3524495",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3524495",
  abstract =     "Evolutionary dynamic multi-objective optimisation
                 (EDMO) is a relatively young but rapidly growing area
                 of investigation. EDMO employs evolutionary approaches
                 to handle multi-objective optimisation problems that
                 have \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "76",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lamsal:2023:SES,
  author =       "Rabindra Lamsal and Aaron Harwood and Maria Rodriguez
                 Read",
  title =        "Socially Enhanced Situation Awareness from Microblogs
                 Using Artificial Intelligence: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "77:1--77:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3524498",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3524498",
  abstract =     "The rise of social media platforms provides an
                 unbounded, infinitely rich source of aggregate
                 knowledge of the world around us, both historic and
                 real-time, from a human perspective. The greatest
                 challenge we face is how to \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "77",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chitty-Venkata:2023:NAS,
  author =       "Krishna Teja Chitty-Venkata and Arun K. Somani",
  title =        "Neural Architecture Search Survey: a Hardware
                 Perspective",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "78:1--78:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3524500",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3524500",
  abstract =     "We review the problem of automating hardware-aware
                 architectural design process of Deep Neural Networks
                 (DNNs). The field of Convolutional Neural Network (CNN)
                 algorithm design has led to advancements in many
                 fields, such \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "78",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2023:EBE,
  author =       "Xiang Li and Yazhou Zhang and Prayag Tiwari and Dawei
                 Song and Bin Hu and Meihong Yang and Zhigang Zhao and
                 Neeraj Kumar and Pekka Marttinen",
  title =        "{EEG} Based Emotion Recognition: a Tutorial and
                 Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "79:1--79:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3524499",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3524499",
  abstract =     "Emotion recognition technology through analyzing the
                 EEG signal is currently an essential concept in
                 Artificial Intelligence and holds great potential in
                 emotional health care, human-computer interaction,
                 multimedia content \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "79",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2023:RAM,
  author =       "Wu Liu and Qian Bao and Yu Sun and Tao Mei",
  title =        "Recent Advances of Monocular {$2$D} and {$3$D} Human
                 Pose Estimation: a Deep Learning Perspective",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "80:1--80:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3524497",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3524497",
  abstract =     "Estimation of the human pose from a monocular camera
                 has been an emerging research topic in the computer
                 vision community with many applications. Recently,
                 benefiting from the deep learning technologies, a
                 significant amount \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "80",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fan:2023:DLM,
  author =       "Zhaoxin Fan and Yazhi Zhu and Yulin He and Qi Sun and
                 Hongyan Liu and Jun He",
  title =        "Deep Learning on Monocular Object Pose Detection and
                 Tracking: a Comprehensive Overview",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "81:1--81:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3524496",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3524496",
  abstract =     "Object pose detection and tracking has recently
                 attracted increasing attention due to its wide
                 applications in many areas, such as autonomous driving,
                 robotics, and augmented reality. Among methods for
                 object pose detection and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "81",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Vowels:2023:DLD,
  author =       "Matthew J. Vowels and Necati Cihan Camgoz and Richard
                 Bowden",
  title =        "D'ya Like {DAGs}? {A} Survey on Structure Learning and
                 Causal Discovery",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "82:1--82:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3527154",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3527154",
  abstract =     "Causal reasoning is a crucial part of science and
                 human intelligence. In order to discover causal
                 relationships from data, we need structure discovery
                 methods. We provide a review of background theory and a
                 survey of methods for \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "82",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Armeniakos:2023:HAT,
  author =       "Giorgos Armeniakos and Georgios Zervakis and Dimitrios
                 Soudris and J{\"o}rg Henkel",
  title =        "Hardware Approximate Techniques for Deep Neural
                 Network Accelerators: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "83:1--83:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3527156",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3527156",
  abstract =     "Deep Neural Networks (DNNs) are very popular because
                 of their high performance in various cognitive tasks in
                 Machine Learning (ML). Recent advancements in DNNs have
                 brought levels beyond human accuracy in many tasks, but
                 at \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "83",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yan:2023:SVA,
  author =       "Chen Yan and Xiaoyu Ji and Kai Wang and Qinhong Jiang
                 and Zizhi Jin and Wenyuan Xu",
  title =        "A Survey on Voice Assistant Security: Attacks and
                 Countermeasures",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "84:1--84:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3527153",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3527153",
  abstract =     "Voice assistants (VA) have become prevalent on a wide
                 range of personal devices such as smartphones and smart
                 speakers. As companies build voice assistants with
                 extra functionalities, attacks that trick a voice
                 assistant into performing malicious \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "84",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{AlmarazLuengo:2023:GPR,
  author =       "Elena {Almaraz Luengo}",
  title =        "Gamma Pseudo Random Number Generators",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "85:1--85:33",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3527157",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3527157",
  abstract =     "The generation of random values corresponding to an
                 underlying Gamma distribution is a key capability in
                 many areas of knowledge, such as Probability and
                 Statistics, Signal Processing, or Digital
                 Communication, among others. Throughout history,
                 different algorithms have been developed for the
                 generation of such values and advances in computing
                 have made them increasingly faster and more efficient
                 from a computational point of view. These advances also
                 allow the generation of higher-quality inputs (from the
                 point of view of randomness and uniformity) for these
                 algorithms that are easily tested by different
                 statistical batteries such as NIST, Dieharder, or
                 TestU01 among others. This article describes the
                 existing algorithms for the generation of (independent
                 and identically distributed --- i.i.d.) Gamma
                 distribution values as well as the theoretical and
                 mathematical foundations that support their validity.",
  acknowledgement = ack-nhfb,
  articleno =    "85",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
  remark =       "The article presents 39 tables with algorithms for
                 beta- and gamma-distribution pseudo-random numbers.
                 Most require at least one invocation of $ \exp (x) $ or
                 $ \ln (x) $.",
}

@Article{Baksi:2023:SFA,
  author =       "Anubhab Baksi and Shivam Bhasin and Jakub Breier and
                 Dirmanto Jap and Dhiman Saha",
  title =        "A Survey on Fault Attacks on Symmetric Key
                 Cryptosystems",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "4",
  pages =        "86:1--86:??",
  month =        may,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3530054",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 26 08:32:02 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3530054",
  abstract =     "Fault attacks are among the well-studied topics in the
                 area of cryptography. These attacks constitute a
                 powerful tool to recover the secret key used in the
                 encryption process. Fault attacks work by forcing a
                 device to work under non-ideal environmental conditions
                 (such as high temperature) or external disturbances
                 (such as glitch in the power supply) while performing a
                 cryptographic operation. The recent trend shows that
                 the amount of research in this direction --- which
                 ranges from attacking a particular primitive, proposing
                 a fault countermeasure, to attacking countermeasures
                 --- has grown up substantially and is going to stay as
                 an active research interest for the foreseeable future.
                 Hence, it becomes apparent to have a comprehensive yet
                 compact study of the (major) works. This work, which
                 covers a wide spectrum in the present-day research on
                 fault attacks that fall under the purview of the
                 symmetric key cryptography, aims at fulfilling the
                 absence of an up-to-date survey. We present mostly all
                 aspects of the topic in a way that is not only
                 understandable for a non-expert reader, but also
                 helpful for an expert as a reference.",
  acknowledgement = ack-nhfb,
  articleno =    "86",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Orphanou:2023:MBA,
  author =       "Kalia Orphanou and Jahna Otterbacher and Styliani
                 Kleanthous and Khuyagbaatar Batsuren and Fausto
                 Giunchiglia and Veronika Bogina and Avital Shulner Tal
                 and Alan Hartman and Tsvi Kuflik",
  title =        "Mitigating Bias in Algorithmic Systems --- a Fish-eye
                 View",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "87:1--87:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3527152",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3527152",
  abstract =     "Mitigating bias in algorithmic systems is a critical
                 issue drawing attention across communities within the
                 information and computer sciences. Given the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "87",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xiao:2023:SWD,
  author =       "Jiang Xiao and Huichuwu Li and Minrui Wu and Hai Jin
                 and M. Jamal Deen and Jiannong Cao",
  title =        "A Survey on Wireless Device-free Human Sensing:
                 Application Scenarios, Current Solutions, and Open
                 Issues",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "88:1--88:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3530682",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3530682",
  abstract =     "In the last decade, many studies have significantly
                 pushed the limits of wireless device-free human sensing
                 (WDHS) technology and facilitated various \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "88",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{He:2023:CTC,
  author =       "Yuan He and Xiuzhen Guo and Xiaolong Zheng and Zihao
                 Yu and Jia Zhang and Haotian Jiang and Xin Na and
                 Jiacheng Zhang",
  title =        "Cross-Technology Communication for the {Internet of
                 Things}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "89:1--89:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3530049",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3530049",
  abstract =     "The ever-developing Internet of Things (IoT) brings
                 the prosperity of wireless sensing and control
                 applications. In many scenarios, different wireless
                 technologies \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "89",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Matsubara:2023:SCE,
  author =       "Yoshitomo Matsubara and Marco Levorato and Francesco
                 Restuccia",
  title =        "Split Computing and Early Exiting for Deep Learning
                 Applications: Survey and Research Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "90:1--90:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3527155",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3527155",
  abstract =     "Mobile devices such as smartphones and autonomous
                 vehicles increasingly rely on deep neural networks
                 (DNNs) to execute complex inference tasks such as
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "90",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Motger:2023:SBD,
  author =       "Quim Motger and Xavier Franch and Jordi Marco",
  title =        "Software-Based Dialogue Systems: Survey, Taxonomy, and
                 Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "91:1--91:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3527450",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3527450",
  abstract =     "The use of natural language interfaces in the field of
                 human-computer interaction (HCI) is undergoing intense
                 study through dedicated scientific and industrial
                 research. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "91",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Vouros:2023:EDR,
  author =       "George A. Vouros",
  title =        "Explainable Deep Reinforcement Learning: State of the
                 Art and Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "92:1--92:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3527448",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3527448",
  abstract =     "Interpretability, explainability, and transparency are
                 key issues to introducing artificial intelligence
                 methods in many critical domains. This is important
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "92",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alhijawi:2023:SOR,
  author =       "Bushra Alhijawi and Arafat Awajan and Salam Fraihat",
  title =        "Survey on the Objectives of Recommender Systems:
                 Measures, Solutions, Evaluation Methodology, and New
                 Perspectives",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "93:1--93:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3527449",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3527449",
  abstract =     "Recently, recommender systems have played an
                 increasingly important role in a wide variety of
                 commercial applications to help users find favourite
                 products. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "93",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kammoun:2023:GAN,
  author =       "Amina Kammoun and Rim Slama and Hedi Tabia and Tarek
                 Ouni and Mohmed Abid",
  title =        "Generative Adversarial Networks for Face Generation: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "94:1--94:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3527850",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3527850",
  abstract =     "Recently, generative adversarial networks (GANs) have
                 progressed enormously, which makes them able to learn
                 complex data distributions in particular faces.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "94",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Karimi:2023:SAR,
  author =       "Amir-Hossein Karimi and Gilles Barthe and Bernhard
                 Sch{\"o}lkopf and Isabel Valera",
  title =        "A Survey of Algorithmic Recourse: Contrastive
                 Explanations and Consequential Recommendations",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "95:1--95:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3527848",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3527848",
  abstract =     "Machine learning is increasingly used to inform
                 decision making in sensitive situations where decisions
                 have consequential effects on \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "95",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alamir:2023:RGA,
  author =       "Manal Alamir and Manal Alghamdi",
  title =        "The Role of Generative Adversarial Network in Medical
                 Image Analysis: an In-depth Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "96:1--96:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3527849",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3527849",
  abstract =     "A generative adversarial network (GAN) is one of the
                 most significant research directions in the field of
                 artificial intelligence, and its superior data
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "96",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wu:2023:GNN,
  author =       "Shiwen Wu and Fei Sun and Wentao Zhang and Xu Xie and
                 Bin Cui",
  title =        "Graph Neural Networks in Recommender Systems: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "97:1--97:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3535101",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3535101",
  abstract =     "With the explosive growth of online information,
                 recommender systems play a key role to alleviate such
                 information overload. Due to the important \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "97",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Massoli:2023:LAQ,
  author =       "Fabio Valerio Massoli and Lucia Vadicamo and Giuseppe
                 Amato and Fabrizio Falchi",
  title =        "A Leap among Quantum Computing and Quantum Neural
                 Networks: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "98:1--98:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3529756",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3529756",
  abstract =     "In recent years, Quantum Computing witnessed massive
                 improvements in terms of available resources and
                 algorithms development. The ability to \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "98",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cruz:2023:EDS,
  author =       "Pedro Cruz and Nadjib Achir and Aline Carneiro Viana",
  title =        "On the Edge of the Deployment: a Survey on
                 Multi-access Edge Computing",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "99:1--99:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3529758",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3529758",
  abstract =     "Multi-Access Edge Computing (MEC) attracts much
                 attention from the scientific community due to its
                 scientific, technical, and commercial implications. In
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "99",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Le:2023:SDD,
  author =       "Triet H. M. Le and Huaming Chen and M. Ali Babar",
  title =        "A Survey on Data-driven Software Vulnerability
                 Assessment and Prioritization",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "100:1--100:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3529757",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3529757",
  abstract =     "Software Vulnerabilities (SVs) are increasing in
                 complexity and scale, posing great security risks to
                 many software systems. Given the limited resources in
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "100",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yates:2023:DMS,
  author =       "Darren Yates and Md Zahidul Islam",
  title =        "Data Mining on Smartphones: an Introduction and
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "101:1--101:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3529753",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3529753",
  abstract =     "Data mining is the science of extracting information
                 or ``knowledge'' from data. It is a task commonly
                 executed on cloud computing resources, personal
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "101",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ma:2023:MDS,
  author =       "Congbo Ma and Wei Emma Zhang and Mingyu Guo and Hu
                 Wang and Quan Z. Sheng",
  title =        "Multi-document Summarization via Deep Learning
                 Techniques: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "102:1--102:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3529754",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3529754",
  abstract =     "Multi-document summarization (MDS) is an effective
                 tool for information aggregation that generates an
                 informative and concise summary from a cluster of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "102",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{ElZini:2023:ENL,
  author =       "Julia {El Zini} and Mariette Awad",
  title =        "On the Explainability of Natural Language Processing
                 Deep Models",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "103:1--103:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3529755",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3529755",
  abstract =     "Despite their success, deep networks are used as
                 black-box models with outputs that are not easily
                 explainable during the learning and the prediction
                 phases. This \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "103",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lee:2023:SSA,
  author =       "Hansoo Lee and Joonyoung Park and Uichin Lee",
  title =        "A Systematic Survey on {Android API} Usage for
                 Data-driven Analytics with Smartphones",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "104:1--104:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3530814",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3530814",
  abstract =     "Recent industrial and academic research has focused on
                 data-driven analytics with smartphones by collecting
                 user interaction, context, and device systems data
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "104",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2023:MLE,
  author =       "Zhiyan Chen and Jinxin Liu and Yu Shen and Murat
                 Simsek and Burak Kantarci and Hussein T. Mouftah and
                 Petar Djukic",
  title =        "Machine Learning-Enabled {IoT} Security: Open Issues
                 and Challenges Under Advanced Persistent Threats",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "105:1--105:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3530812",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3530812",
  abstract =     "Despite its technological benefits, the Internet of
                 Things (IoT) has cyber weaknesses due to
                 vulnerabilities in the wireless medium. Machine Larning
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "105",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sozzo:2023:PLA,
  author =       "Emanuele {Del Sozzo} and Davide Conficconi and Alberto
                 Zeni and Mirko Salaris and Donatella Sciuto and Marco
                 D. Santambrogio",
  title =        "Pushing the Level of Abstraction of Digital System
                 Design: a Survey on How to Program {FPGAs}",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "106:1--106:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3532989",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3532989",
  abstract =     "Field Programmable Gate Arrays (FPGAs) are spatial
                 architectures with a heterogeneous reconfigurable
                 fabric. They are state-of-the-art for prototyping,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "106",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alavizadeh:2023:SCS,
  author =       "Hooman Alavizadeh and Julian Jang-Jaccard and Simon
                 Yusuf Enoch and Harith Al-Sahaf and Ian Welch and Seyit
                 A. Camtepe and Dan Dongseong Kim",
  title =        "A Survey on Cyber Situation-awareness Systems:
                 Framework, Techniques, and Insights",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "107:1--107:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3530809",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3530809",
  abstract =     "Cyberspace is full of uncertainty in terms of advanced
                 and sophisticated cyber threats that are equipped with
                 novel approaches to learn the system and propagate
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "107",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Muralidharan:2023:FPM,
  author =       "Trivikram Muralidharan and Aviad Cohen and Noa Gerson
                 and Nir Nissim",
  title =        "File Packing from the Malware Perspective: Techniques,
                 Analysis Approaches, and Directions for Enhancements",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "5",
  pages =        "108:1--108:??",
  month =        jun,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3530810",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Dec 5 06:42:04 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3530810",
  abstract =     "With the growing sophistication of malware, the need
                 to devise improved malware detection schemes is
                 crucial. The packing of executable files, which is one
                 of \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "108",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Tay:2023:ETS,
  author =       "Yi Tay and Mostafa Dehghani and Dara Bahri and Donald
                 Metzler",
  title =        "Efficient Transformers: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "109:1--109:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3530811",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3530811",
  abstract =     "Transformer model architectures have garnered immense
                 interest lately due to their effectiveness across a
                 range of domains like language, vision, and
                 reinforcement learning. In the field of natural
                 language processing for example, Transformers have
                 become \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "109",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fahmideh:2023:EBB,
  author =       "Mahdi Fahmideh and John Grundy and Aakash Ahmad and
                 Jun Shen and Jun Yan and Davoud Mougouei and Peng Wang
                 and Aditya Ghose and Anuradha Gunawardana and Uwe
                 Aickelin and Babak Abedin",
  title =        "Engineering Blockchain-based Software Systems:
                 Foundations, Survey, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "110:1--110:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3530813",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3530813",
  abstract =     "Many scientific and practical areas have shown
                 increasing interest in reaping the benefits of
                 blockchain technology to empower software systems.
                 However, the unique characteristics and requirements
                 associated with Blockchain-based Software (BBS) systems
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "110",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Guo:2023:EED,
  author =       "Binglei Guo and Jiong Yu and Dexian Yang and Hongyong
                 Leng and Bin Liao",
  title =        "Energy-Efficient Database Systems: a Systematic
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "111:1--111:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3538225",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3538225",
  abstract =     "Constructing energy-efficient database systems to
                 reduce economic costs and environmental impact has been
                 studied for 10 years. With the emergence of the big
                 data age, along with the data-centric and
                 data-intensive computing trend, the great amount of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "111",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Roy:2023:STA,
  author =       "Shanto Roy and Nazia Sharmin and Jaime C. Acosta and
                 Christopher Kiekintveld and Aron Laszka",
  title =        "Survey and Taxonomy of Adversarial Reconnaissance
                 Techniques",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "112:1--112:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3538704",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3538704",
  abstract =     "Adversaries are often able to penetrate networks and
                 compromise systems by exploiting vulnerabilities in
                 people and systems. The key to the success of these
                 attacks is information that adversaries collect
                 throughout the phases of the cyber kill chain. We
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "112",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xia:2023:HNA,
  author =       "Dan Xia and Chun Jiang and Jiafu Wan and Jiong Jin and
                 Victor C. M. Leung and Miguel
                 Mart{\'\i}nez-Garc{\'\i}a",
  title =        "Heterogeneous Network Access and Fusion in Smart
                 Factory: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "113:1--113:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3530815",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3530815",
  abstract =     "With the continuous expansion of the Industrial
                 Internet of Things (IIoT) and the increasing
                 connectivity among the various intelligent devices or
                 systems, the control of access and fusion in smart
                 factory networks has significantly gained importance.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "113",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Paleyes:2023:CDM,
  author =       "Andrei Paleyes and Raoul-Gabriel Urma and Neil D.
                 Lawrence",
  title =        "Challenges in Deploying Machine Learning: a Survey of
                 Case Studies",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "114:1--114:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3533378",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3533378",
  abstract =     "In recent years, machine learning has transitioned
                 from a field of academic research interest to a field
                 capable of solving real-world business problems.
                 However, the deployment of machine learning models in
                 production systems can present a number of \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "114",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Goncalves:2023:SRC,
  author =       "Guilherme Gon{\c{c}}alves and Hugo Coelho and Pedro
                 Monteiro and Miguel Melo and Maximino Bessa",
  title =        "Systematic Review of Comparative Studies of the Impact
                 of Realism in Immersive Virtual Experiences",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "115:1--115:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3533377",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3533377",
  abstract =     "The adoption of immersive virtual experiences (IVEs)
                 opened new research lines where the impact of realism
                 is being studied, allowing developers to focus
                 resources on realism factors proven to improve the user
                 experience the most. We analyzed papers that \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "115",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Schafer:2023:SSA,
  author =       "Alexander Sch{\"a}fer and Gerd Reis and Didier
                 Stricker",
  title =        "A Survey on Synchronous Augmented, Virtual, and Mixed
                 Reality Remote Collaboration Systems",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "116:1--116:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3533376",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3533376",
  abstract =     "Remote collaboration systems have become increasingly
                 important in today's society, especially during times
                 when physical distancing is advised. Industry,
                 research, and individuals face the challenging task of
                 collaborating and networking over long \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "116",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zehlike:2023:FRPa,
  author =       "Meike Zehlike and Ke Yang and Julia Stoyanovich",
  title =        "Fairness in Ranking, {Part II}: Learning-to-Rank and
                 Recommender Systems",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "117:1--117:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3533380",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3533380",
  abstract =     "In the past few years, there has been much work on
                 incorporating fairness requirements into algorithmic
                 rankers, with contributions coming from the data
                 management, algorithms, information retrieval, and
                 recommender systems communities. In this survey, we
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "117",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zehlike:2023:FRPb,
  author =       "Meike Zehlike and Ke Yang and Julia Stoyanovich",
  title =        "Fairness in Ranking, {Part I}: Score-Based Ranking",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "118:1--118:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3533379",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3533379",
  abstract =     "In the past few years, there has been much work on
                 incorporating fairness requirements into algorithmic
                 rankers, with contributions coming from the data
                 management, algorithms, information retrieval, and
                 recommender systems communities. In this survey, we
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "118",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Erdogmus:2023:BHT,
  author =       "Hakan Erdogmus",
  title =        "{Bayesian} Hypothesis Testing Illustrated: an
                 Introduction for Software Engineering Researchers",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "119:1--119:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3533383",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3533383",
  abstract =     "Bayesian data analysis is gaining traction in many
                 fields, including empirical studies in software
                 engineering. Bayesian approaches provide many
                 advantages over traditional, or frequentist, data
                 analysis, but the mechanics often remain opaque to
                 beginners \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "119",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Topham:2023:HBP,
  author =       "Luke K. Topham and Wasiq Khan and Dhiya Al-Jumeily and
                 Abir Hussain",
  title =        "Human Body Pose Estimation for Gait Identification: a
                 Comprehensive Survey of Datasets and Models",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "120:1--120:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3533384",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3533384",
  abstract =     "Person identification is a problem that has received
                 substantial attention, particularly in security
                 domains. Gait recognition is one of the most convenient
                 approaches enabling person identification at a distance
                 without the need for high-quality images. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "120",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Benidis:2023:DLT,
  author =       "Konstantinos Benidis and Syama Sundar Rangapuram and
                 Valentin Flunkert and Yuyang Wang and Danielle Maddix
                 and Caner Turkmen and Jan Gasthaus and Michael
                 Bohlke-Schneider and David Salinas and Lorenzo Stella
                 and Fran{\c{c}}ois-Xavier Aubet and Laurent Callot and
                 Tim Januschowski",
  title =        "Deep Learning for Time Series Forecasting: Tutorial
                 and Literature Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "121:1--121:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3533382",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3533382",
  abstract =     "Deep learning based forecasting methods have become
                 the methods of choice in many applications of time
                 series prediction or forecasting often outperforming
                 other approaches. Consequently, over the last years,
                 these methods are now ubiquitous in large-. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "121",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jeong:2023:ECS,
  author =       "Jongkil Jay Jeong and Yevhen Zolotavkin and Robin
                 Doss",
  title =        "Examining the Current Status and Emerging Trends in
                 Continuous Authentication Technologies through Citation
                 Network Analysis",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "122:1--122:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3533705",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3533705",
  abstract =     "Continuous Authentication (CA) technologies enable
                 users to be authenticated beyond just the point of
                 entry. In this article, we conduct a comprehensive
                 review of over 2,300 articles to (a) identify the main
                 components of CA research to date, and (b) \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "122",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Parkinson:2023:SES,
  author =       "Simon Parkinson and Saad Khan",
  title =        "A Survey on Empirical Security Analysis of
                 Access-control Systems: a Real-world Perspective",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "123:1--123:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3533703",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3533703",
  abstract =     "There any many different access-control systems, yet a
                 commonality is that they provide flexible mechanisms to
                 enforce different access levels. Their importance in
                 organisations to adequately restrict resources, coupled
                 with their use in a dynamic \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "123",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jero:2023:TTA,
  author =       "Samuel Jero and Nathan Burow and Bryan Ward and
                 Richard Skowyra and Roger Khazan and Howard Shrobe and
                 Hamed Okhravi",
  title =        "{TAG: Tagged Architecture Guide}",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "124:1--124:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3533704",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3533704",
  abstract =     "Software security defenses are routinely broken by the
                 persistence of both security researchers and attackers.
                 Hardware solutions based on tagging are emerging as a
                 promising technique that provides strong security
                 guarantees (e.g., memory safety) while \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "124",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Branco:2023:CRH,
  author =       "Rodrigo Branco and Ben Lee",
  title =        "Cache-related Hardware Capabilities and Their Impact
                 on Information Security",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "125:1--125:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3534962",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3534962",
  abstract =     "Caching is an important technique to speed-up
                 execution, and its implementation and use cases vary.
                 When applied specifically to the memory hierarchy,
                 caching is used to speed up memory accesses and memory
                 translations. Different cache implementations are
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "125",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Olugbade:2023:HMD,
  author =       "Temitayo Olugbade and Marta Bie{\'n}kiewicz and Giulia
                 Barbareschi and Vincenzo D'amato and Luca Oneto and
                 Antonio Camurri and Catherine Holloway and M{\aa}rten
                 Bj{\"o}rkman and Peter Keller and Martin Clayton and
                 Amanda C. De C. Williams and Nicolas Gold and Cristina
                 Becchio and Beno{\^\i}t Bardy and Nadia
                 Bianchi-Berthouze",
  title =        "Human Movement Datasets: an Interdisciplinary Scoping
                 Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "126:1--126:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3534970",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3534970",
  abstract =     "Movement dataset reviews exist but are limited in
                 coverage, both in terms of size and research
                 discipline. While topic-specific reviews clearly have
                 their merit, it is critical to have a comprehensive
                 overview based on a systematic survey across \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "126",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Arcile:2023:TAF,
  author =       "Johan Arcile and {\'E}tienne Andr{\'e}",
  title =        "Timed Automata as a Formalism for Expressing Security:
                 a Survey on Theory and Practice",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "127:1--127:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3534967",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3534967",
  abstract =     "Timed automata are a common formalism for the
                 verification of concurrent systems subject to timing
                 constraints. They extend finite-state automata with
                 clocks, that constrain the system behavior in
                 locations, and to take transitions. While timed
                 automata \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "127",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2023:IMS,
  author =       "Lu Chen and Yunjun Gao and Xuan Song and Zheng Li and
                 Yifan Zhu and Xiaoye Miao and Christian S. Jensen",
  title =        "Indexing Metric Spaces for Exact Similarity Search",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "128:1--128:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3534963",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3534963",
  abstract =     "With the continued digitization of societal processes,
                 we are seeing an explosion in available data. This is
                 referred to as big data. In a research setting, three
                 aspects of the data are often viewed as the main
                 sources of challenges when attempting to \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "128",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Keyvan:2023:HAA,
  author =       "Kimiya Keyvan and Jimmy Xiangji Huang",
  title =        "How to Approach Ambiguous Queries in Conversational
                 Search: a Survey of Techniques, Approaches, Tools, and
                 Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "129:1--129:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3534965",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3534965",
  abstract =     "The advent of recent Natural Language Processing
                 technology has led human and machine interactions more
                 toward conversation. In Conversational Search Systems
                 (CSS) like chatbots and Virtual Personal Assistants
                 such as Apple's Siri, Amazon Alexa, Microsoft'.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "129",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kleyko:2023:SHCa,
  author =       "Denis Kleyko and Dmitri A. Rachkovskij and Evgeny
                 Osipov and Abbas Rahimi",
  title =        "A Survey on Hyperdimensional Computing aka Vector
                 Symbolic Architectures, {Part I}: Models and Data
                 Transformations",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "6",
  pages =        "130:1--130:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3538531",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Dec 8 05:59:01 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3538531",
  abstract =     "This two-part comprehensive survey is devoted to a
                 computing framework most commonly known under the names
                 Hyperdimensional Computing and Vector Symbolic
                 Architectures (HDC/VSA). Both names refer to a family
                 of computational models that use high-. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "130",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sallaberry:2023:APA,
  author =       "Lucas H. Sallaberry and Romero Tori and F{\'a}tima L.
                 S. Nunes",
  title =        "Automatic Performance Assessment in Three-dimensional
                 Interactive Haptic Medical Simulators: a Systematic
                 Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "131:1--131:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3539222",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3539222",
  abstract =     "This study presents a literature systematic review of
                 automatic performance assessment in three-dimensional
                 interactive medical and dental simulators with haptic
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "131",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chebolu:2023:SAC,
  author =       "Siva Uday Sampreeth Chebolu and Paolo Rosso and
                 Sudipta Kar and Thamar Solorio",
  title =        "Survey on Aspect Category Detection",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "132:1--132:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3544557",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3544557",
  abstract =     "In recent years, aspect category detection has become
                 popular due to the rapid growth in customer reviews
                 data on e-commerce and other online platforms. Aspect
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "132",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Adhikari:2023:CSI,
  author =       "Deepak Adhikari and Wei Jiang and Jinyu Zhan and
                 Zhiyuan He and Danda B. Rawat and Uwe Aickelin and Hadi
                 A. Khorshidi",
  title =        "A Comprehensive Survey on Imputation of Missing Data
                 in {Internet of Things}",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "133:1--133:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3533381",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3533381",
  abstract =     "The Internet of Things (IoT) is enabled by the latest
                 developments in smart sensors, communication
                 technologies, and Internet protocols with broad
                 applications. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "133",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2023:TTS,
  author =       "Zhibo Wang and Jingjing Ma and Xue Wang and Jiahui Hu
                 and Zhan Qin and Kui Ren",
  title =        "Threats to Training: a Survey of Poisoning Attacks and
                 Defenses on Machine Learning Systems",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "134:1--134:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3538707",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3538707",
  abstract =     "Machine learning (ML) has been universally adopted for
                 automated decisions in a variety of fields, including
                 recognition and classification applications, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "134",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zipperle:2023:PBI,
  author =       "Michael Zipperle and Florian Gottwalt and Elizabeth
                 Chang and Tharam Dillon",
  title =        "Provenance-based Intrusion Detection Systems: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "135:1--135:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3539605",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3539605",
  abstract =     "Traditional Intrusion Detection Systems (IDS) cannot
                 cope with the increasing number and sophistication of
                 cyberattacks such as Advanced Persistent Threats
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "135",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Han:2023:HCI,
  author =       "Rong Han and Zheng Yan and Xueqin Liang and Laurence
                 T. Yang",
  title =        "How Can Incentive Mechanisms and Blockchain Benefit
                 with Each Other? {A} Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "136:1--136:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3539604",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3539604",
  abstract =     "In a blockchain-based system, the lack of centralized
                 control requires active participation and cooperative
                 behaviors of system entities to ensure system
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "136",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yun:2023:FES,
  author =       "Joobeom Yun and Fayozbek Rustamov and Juhwan Kim and
                 Youngjoo Shin",
  title =        "Fuzzing of Embedded Systems: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "137:1--137:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3538644",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3538644",
  abstract =     "Security attacks abuse software vulnerabilities of IoT
                 devices; hence, detecting and eliminating these
                 vulnerabilities immediately are \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "137",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Carrion:2023:KST,
  author =       "Carmen Carri{\'o}n",
  title =        "{Kubernetes} Scheduling: Taxonomy, Ongoing Issues and
                 Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "138:1--138:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3539606",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3539606",
  abstract =     "Continuous integration enables the development of
                 microservices-based applications using container
                 virtualization technology. Container \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "138",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Benmoussa:2023:IFA,
  author =       "Ahmed Benmoussa and Chaker Abdelaziz Kerrache and
                 Nasreddine Lagraa and Spyridon Mastorakis and
                 Abderrahmane Lakas and Abdou {El Karim Tahari}",
  title =        "Interest Flooding Attacks in Named Data Networking:
                 Survey of Existing Solutions, Open Issues,
                 Requirements, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "139:1--139:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3539730",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3539730",
  abstract =     "Named Data Networking (NDN) is a prominent realization
                 of the vision of Information-Centric Networking. The
                 NDN architecture adopts name-based \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "139",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Opdahl:2023:SKG,
  author =       "Andreas L. Opdahl and Tareq Al-Moslmi and Duc-Tien
                 Dang-Nguyen and Marc Gallofr{\'e} Oca{\~n}a and
                 Bj{\o}rnar Tessem and Csaba Veres",
  title =        "Semantic Knowledge Graphs for the News: a Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "140:1--140:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3543508",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3543508",
  abstract =     "ICT platforms for news production, distribution, and
                 consumption must exploit the ever-growing availability
                 of digital data. These data originate from \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "140",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Tao:2023:SDD,
  author =       "Yudong Tao and Chuang Yang and Tianyi Wang and Erik
                 Coltey and Yanxiu Jin and Yinghao Liu and Renhe Jiang
                 and Zipei Fan and Xuan Song and Ryosuke Shibasaki and
                 Shu-Ching Chen and Mei-Ling Shyu and Steven Luis",
  title =        "A Survey on Data-driven {COVID-19} and Future Pandemic
                 Management",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "141:1--141:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3542818",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3542818",
  abstract =     "The COVID-19 pandemic has resulted in more than 440
                 million confirmed cases globally and almost 6 million
                 reported deaths as of March 2022. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "141",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Naghibijouybari:2023:MAH,
  author =       "Hoda Naghibijouybari and Esmaeil Mohammadian Koruyeh
                 and Nael Abu-Ghazaleh",
  title =        "Microarchitectural Attacks in Heterogeneous Systems: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "142:1--142:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3544102",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3544102",
  abstract =     "With the increasing proliferation of hardware
                 accelerators and the predicted continued increase in
                 the heterogeneity of future computing systems, it is
                 necessary \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "142",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sarsenbayeva:2023:MSA,
  author =       "Zhanna Sarsenbayeva and Niels {Van Berkel} and Eduardo
                 Velloso and Jorge Goncalves and Vassilis Kostakos",
  title =        "Methodological Standards in Accessibility Research on
                 Motor Impairments: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "143:1--143:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3543509",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3543509",
  abstract =     "The design and evaluation of accessibility technology
                 is a core component of the computer science landscape,
                 aiming to ensure that digital innovations are
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "143",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Idowu:2023:AMM,
  author =       "Samuel Idowu and Daniel Str{\"u}ber and Thorsten
                 Berger",
  title =        "Asset Management in Machine Learning:
                 State-of-research and State-of-practice",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "144:1--144:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3543847",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3543847",
  abstract =     "Machine learning components are essential for today's
                 software systems, causing a need to adapt traditional
                 software engineering practices when developing
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "144",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Afsar:2023:RLB,
  author =       "M. Mehdi Afsar and Trafford Crump and Behrouz Far",
  title =        "Reinforcement Learning based Recommender Systems: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "145:1--145:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3543846",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3543846",
  abstract =     "Recommender systems (RSs) have become an inseparable
                 part of our everyday lives. They help us find our
                 favorite items to purchase, our friends on social
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "145",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bayer:2023:SDA,
  author =       "Markus Bayer and Marc-Andr{\'e} Kaufhold and Christian
                 Reuter",
  title =        "A Survey on Data Augmentation for Text
                 Classification",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "146:1--146:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3544558",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3544558",
  abstract =     "Data augmentation, the artificial creation of training
                 data for machine learning by transformations, is a
                 widely studied research field across machine learning
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "146",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Perez-Cerrolaza:2023:GDS,
  author =       "Jon Perez-Cerrolaza and Jaume Abella and Leonidas
                 Kosmidis and Alejandro J. Calderon and Francisco
                 Cazorla and Jose Luis Flores",
  title =        "{GPU} Devices for Safety-Critical Systems: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "147:1--147:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3549526",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3549526",
  abstract =     "Graphics Processing Unit (GPU) devices and their
                 associated software programming languages and
                 frameworks can deliver the computing performance
                 required \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "147",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Tran:2023:AAI,
  author =       "Tung Minh Tran and Tu N. Vu and Nguyen D. Vo and Tam
                 V. Nguyen and Khang Nguyen",
  title =        "Anomaly Analysis in Images and Videos: a Comprehensive
                 Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "148:1--148:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3544014",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3544014",
  abstract =     "Anomaly analysis is an important component of any
                 surveillance system. In recent years, it has drawn the
                 attention of the computer vision and machine learning
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "148",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2023:SDF,
  author =       "Li Liu and Fanzhang Li",
  title =        "A Survey on Dynamic Fuzzy Machine Learning",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "149:1--149:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3544013",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3544013",
  abstract =     "Dynamic fuzzy characteristics are ubiquitous in a lot
                 of scientific and engineering problems. Specifically,
                 the physical systems and learning processes in machine
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "149",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sleeman:2023:MCC,
  author =       "William C. Sleeman and Rishabh Kapoor and Preetam
                 Ghosh",
  title =        "Multimodal Classification: Current Landscape, Taxonomy
                 and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "150:1--150:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3543848",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3543848",
  abstract =     "Multimodal classification research has been gaining
                 popularity with new datasets in domains such as
                 satellite imagery, biometrics, and medicine. Prior
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "150",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rejiba:2023:CSK,
  author =       "Zeineb Rejiba and Javad Chamanara",
  title =        "Custom Scheduling in {Kubernetes}: a Survey on Common
                 Problems and Solution Approaches",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "151:1--151:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3544788",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3544788",
  abstract =     "Since its release in 2014, Kubernetes has become a
                 popular choice for orchestrating containerized
                 workloads at scale. To determine the most appropriate
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "151",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Goudarzi:2023:SIA,
  author =       "Mohammad Goudarzi and Marimuthu Palaniswami and
                 Rajkumar Buyya",
  title =        "Scheduling {IoT} Applications in Edge and Fog
                 Computing Environments: a Taxonomy and Future
                 Directions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "7",
  pages =        "152:1--152:??",
  month =        jul,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3544836",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:15 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3544836",
  abstract =     "Fog computing, as a distributed paradigm, offers
                 cloud-like services at the edge of the network with low
                 latency and high-access bandwidth to support a diverse
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "152",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2023:DLA,
  author =       "Yue Liu and Chakkrit Tantithamthavorn and Li Li and
                 Yepang Liu",
  title =        "Deep Learning for {Android} Malware Defenses: a
                 Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "153:1--153:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3544968",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3544968",
  abstract =     "Malicious applications (particularly those targeting
                 the Android platform) pose a serious threat to
                 developers and end-users. Numerous research efforts
                 have \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "153",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Koh:2023:ESL,
  author =       "Huan Yee Koh and Jiaxin Ju and Ming Liu and Shirui
                 Pan",
  title =        "An Empirical Survey on Long Document Summarization:
                 Datasets, Models, and Metrics",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "154:1--154:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3545176",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3545176",
  abstract =     "Long documents such as academic articles and business
                 reports have been the standard format to detail out
                 important issues and complicated subjects that require
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "154",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Madsen:2023:PHI,
  author =       "Andreas Madsen and Siva Reddy and Sarath Chandar",
  title =        "Post-hoc Interpretability for Neural {NLP}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "155:1--155:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3546577",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3546577",
  abstract =     "Neural networks for NLP are becoming increasingly
                 complex and widespread, and there is a growing concern
                 if these models are responsible to use. Explaining
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "155",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Weld:2023:SJI,
  author =       "Henry Weld and Xiaoqi Huang and Siqu Long and Josiah
                 Poon and Soyeon Caren Han",
  title =        "A Survey of Joint Intent Detection and Slot Filling
                 Models in Natural Language Understanding",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "156:1--156:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3547138",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3547138",
  abstract =     "Intent classification, to identify the speaker's
                 intention, and slot filling, to label each token with a
                 semantic type, are critical tasks in natural language
                 understanding. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "156",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mohseni:2023:TML,
  author =       "Sina Mohseni and Haotao Wang and Chaowei Xiao and
                 Zhiding Yu and Zhangyang Wang and Jay Yadawa",
  title =        "Taxonomy of Machine Learning Safety: a Survey and
                 Primer",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "157:1--157:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3551385",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3551385",
  abstract =     "The open-world deployment of Machine Learning (ML)
                 algorithms in safety-critical applications such as
                 autonomous vehicles needs to address a variety of ML
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "157",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gunawardena:2023:ETT,
  author =       "Nishan Gunawardena and Jeewani Anupama Ginige and
                 Bahman Javadi",
  title =        "Eye-tracking Technologies in Mobile Devices Using Edge
                 Computing: a Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "158:1--158:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3546938",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3546938",
  abstract =     "Eye-tracking provides invaluable insight into the
                 cognitive activities underlying a wide range of human
                 behaviours. Identifying cognitive activities provides
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "158",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Abdullah:2023:DLS,
  author =       "Tariq Abdullah and Ahmed Ahmet",
  title =        "Deep Learning in Sentiment Analysis: Recent
                 Architectures",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "159:1--159:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3548772",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3548772",
  abstract =     "Humans are increasingly integrated with devices that
                 enable the collection of vast unstructured opinionated
                 data. Accurately analysing subjective information
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "159",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Blanco-Justicia:2023:CRU,
  author =       "Alberto Blanco-Justicia and David S{\'a}nchez and
                 Josep Domingo-Ferrer and Krishnamurty Muralidhar",
  title =        "A Critical Review on the Use (and Misuse) of
                 Differential Privacy in Machine Learning",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "160:1--160:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3547139",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3547139",
  abstract =     "We review the use of differential privacy (DP) for
                 privacy protection in machine learning (ML). We show
                 that, driven by the aim of preserving the accuracy of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "160",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2023:PIS,
  author =       "Chi Liu and Tianqing Zhu and Jun Zhang and Wanlei
                 Zhou",
  title =        "Privacy Intelligence: a Survey on Image Privacy in
                 Online Social Networks",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "161:1--161:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3547299",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3547299",
  abstract =     "Image sharing on online social networks (OSNs) has
                 become an indispensable part of daily social
                 activities, but it has also increased the risk of
                 privacy \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "161",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lyu:2023:SDE,
  author =       "Minzhao Lyu and Hassan Habibi Gharakheili and Vijay
                 Sivaraman",
  title =        "A Survey on {DNS} Encryption: Current Development,
                 Malware Misuse, and Inference Techniques",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "162:1--162:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3547331",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3547331",
  abstract =     "The domain name system (DNS) that maps alphabetic
                 names to numeric Internet Protocol (IP) addresses plays
                 a foundational role in Internet communications.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "162",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhou:2023:AAD,
  author =       "Shuai Zhou and Chi Liu and Dayong Ye and Tianqing Zhu
                 and Wanlei Zhou and Philip S. Yu",
  title =        "Adversarial Attacks and Defenses in Deep Learning:
                 From a Perspective of Cybersecurity",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "163:1--163:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3547330",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3547330",
  abstract =     "The outstanding performance of deep neural networks
                 has promoted deep learning applications in a broad set
                 of domains. However, the potential risks \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "163",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Serrano:2023:QSC,
  author =       "Manuel A. Serrano and Jos{\'e} A. Cruz-Lemus and
                 Ricardo Perez-Castillo and Mario Piattini",
  title =        "Quantum Software Components and Platforms: Overview
                 and Quality Assessment",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "164:1--164:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3548679",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3548679",
  abstract =     "Quantum computing is the latest revolution in
                 computing and will probably come to be seen as an
                 advance as important as the steam engine or the
                 information \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "164",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Velayudhan:2023:RAB,
  author =       "Divya Velayudhan and Taimur Hassan and Ernesto Damiani
                 and Naoufel Werghi",
  title =        "Recent Advances in Baggage Threat Detection: a
                 Comprehensive and Systematic Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "165:1--165:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3549932",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3549932",
  abstract =     "X-ray imagery systems have enabled security personnel
                 to identify potential threats contained within the
                 baggage and cargo since the early 1970s. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "165",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Tian:2023:CSP,
  author =       "Zhiyi Tian and Lei Cui and Jie Liang and Shui Yu",
  title =        "A Comprehensive Survey on Poisoning Attacks and
                 Countermeasures in Machine Learning",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "166:1--166:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3551636",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3551636",
  abstract =     "The prosperity of machine learning has been
                 accompanied by increasing attacks on the training
                 process. Among them, poisoning attacks have become an
                 emerging \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "166",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Heinl:2023:REV,
  author =       "Michael P. Heinl and Simon G{\"o}lz and Christoph
                 B{\"o}sch",
  title =        "Remote Electronic Voting in Uncontrolled Environments:
                 a Classifying Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "167:1--167:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3551386",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3551386",
  abstract =     "Remote electronic voting, often called online or
                 Internet voting, has been subject to research for the
                 last four decades. It is regularly discussed in public
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "167",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Roscoe:2023:FCA,
  author =       "Sarah Roscoe and Minal Khatri and Adam Voshall and
                 Surinder Batra and Sukhwinder Kaur and Jitender
                 Deogun",
  title =        "Formal Concept Analysis Applications in
                 Bioinformatics",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "168:1--168:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3554728",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3554728",
  abstract =     "The bioinformatics discipline seeks to solve problems
                 in biology with computational theories and methods.
                 Formal concept analysis (FCA) is one such \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "168",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chakraborty:2023:HBA,
  author =       "Nilesh Chakraborty and Jianqiang Li and Victor C. M.
                 Leung and Samrat Mondal and Yi Pan and Chengwen Luo and
                 Mithun Mukherjee",
  title =        "Honeyword-based Authentication Techniques for
                 Protecting Passwords: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "169:1--169:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3552431",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3552431",
  abstract =     "Honeyword (or decoy password) based authentication,
                 first introduced by Juels and Rivest in 2013, has
                 emerged as a security mechanism that can provide
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "169",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zangerle:2023:ERS,
  author =       "Eva Zangerle and Christine Bauer",
  title =        "Evaluating Recommender Systems: Survey and Framework",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "170:1--170:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3556536",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3556536",
  abstract =     "The comprehensive evaluation of the performance of a
                 recommender system is a complex endeavor: many facets
                 need to be considered in configuring an \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "170",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Almeida:2023:SLR,
  author =       "Andr{\'e} Lu{\'{\i}}s Barroso Almeida and Joubert de
                 Castro Lima and Marco Antonio M. Carvalho",
  title =        "Systematic Literature Review on Parallel
                 Trajectory-based Metaheuristics",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "171:1--171:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3550484",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3550484",
  abstract =     "In the past 35 years, parallel computing has drawn
                 increasing interest from the academic community,
                 especially in solving complex optimization problems
                 that require \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "171",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yang:2023:AME,
  author =       "Tianbao Yang and Yiming Ying",
  title =        "{AUC} Maximization in the Era of Big Data and {AI}: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "172:1--172:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3554729",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3554729",
  abstract =     "Area under the ROC curve, a.k.a. AUC, is a measure of
                 choice for assessing the performance of a classifier
                 for imbalanced data. AUC maximization refers to a
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "172",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Dong:2023:SNL,
  author =       "Chenhe Dong and Yinghui Li and Haifan Gong and Miaoxin
                 Chen and Junxin Li and Ying Shen and Min Yang",
  title =        "A Survey of Natural Language Generation",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "173:1--173:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3554727",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3554727",
  abstract =     "This article offers a comprehensive review of the
                 research on Natural Language Generation (NLG) over the
                 past two decades, especially in relation to
                 data-to-text \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "173",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kong:2023:ECD,
  author =       "Linghe Kong and Jinlin Tan and Junqin Huang and Guihai
                 Chen and Shuaitian Wang and Xi Jin and Peng Zeng and
                 Muhammad Khan and Sajal K. Das",
  title =        "Edge-computing-driven {Internet of Things}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "8",
  pages =        "174:1--174:??",
  month =        aug,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3555308",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:16 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3555308",
  abstract =     "The Internet of Things (IoT) is impacting the world's
                 connectivity landscape. More and more IoT devices are
                 connected, bringing many benefits to our daily lives.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "174",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kleyko:2023:SHCb,
  author =       "Denis Kleyko and Dmitri Rachkovskij and Evgeny Osipov
                 and Abbas Rahimi",
  title =        "A Survey on Hyperdimensional Computing aka Vector
                 Symbolic Architectures, {Part II}: Applications,
                 Cognitive Models, and Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "175:1--175:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3558000",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3558000",
  abstract =     "This is Part II of the two-part comprehensive survey
                 devoted to a computing framework most commonly known
                 under the names Hyperdimensional Computing and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "175",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{McDuff:2023:CMP,
  author =       "Daniel McDuff",
  title =        "Camera Measurement of Physiological Vital Signs",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "176:1--176:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3558518",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3558518",
  abstract =     "The need for remote tools for healthcare monitoring
                 has never been more apparent. Camera measurement of
                 vital signs leverages imaging devices to compute
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "176",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2023:TAP,
  author =       "Bo Li and Peng Qi and Bo Liu and Shuai Di and Jingen
                 Liu and Jiquan Pei and Jinfeng Yi and Bowen Zhou",
  title =        "Trustworthy {AI}: From Principles to Practices",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "177:1--177:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3555803",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3555803",
  abstract =     "The rapid development of Artificial Intelligence (AI)
                 technology has enabled the deployment of various
                 systems based on it. However, many current AI systems
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "177",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Benedetto:2023:SRA,
  author =       "Luca Benedetto and Paolo Cremonesi and Andrew Caines
                 and Paula Buttery and Andrea Cappelli and Andrea
                 Giussani and Roberto Turrin",
  title =        "A Survey on Recent Approaches to Question Difficulty
                 Estimation from Text",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "178:1--178:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3556538",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3556538",
  abstract =     "Question Difficulty Estimation from Text (QDET) is the
                 application of Natural Language Processing techniques
                 to the estimation of a value, either \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "178",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{North:2023:LCP,
  author =       "Kai North and Marcos Zampieri and Matthew Shardlow",
  title =        "Lexical Complexity Prediction: an Overview",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "179:1--179:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3557885",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3557885",
  abstract =     "The occurrence of unknown words in texts significantly
                 hinders reading comprehension. To improve accessibility
                 for specific target populations, computational
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "179",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Pattnaik:2023:SUP,
  author =       "Nandita Pattnaik and Shujun Li and Jason R. C. Nurse",
  title =        "A Survey of User Perspectives on Security and Privacy
                 in a Home Networking Environment",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "180:1--180:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3558095",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3558095",
  abstract =     "The security and privacy of smart home systems,
                 particularly from a home user's perspective, have been
                 a very active research area in recent years. However,
                 via \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "180",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Park:2023:EOS,
  author =       "Eun Hee Park and Veda C. Storey",
  title =        "Emotion Ontology Studies: a Framework for Expressing
                 Feelings Digitally and its Application to Sentiment
                 Analysis",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "181:1--181:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3555719",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3555719",
  abstract =     "Emotion ontologies have been developed to capture
                 affect, a concept that encompasses discrete emotions
                 and feelings, especially for research on sentiment
                 analysis, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "181",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fotia:2023:TEB,
  author =       "Lidia Fotia and Fl{\'a}via Delicato and Giancarlo
                 Fortino",
  title =        "Trust in Edge-based {Internet of Things}
                 Architectures: State of the Art and Research
                 Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "182:1--182:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3558779",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3558779",
  abstract =     "The Internet of Things (IoT) aims to enable a scenario
                 where smart objects, inserted into information
                 networks, supply smart services for human beings. The
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "182",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bitton:2023:ECR,
  author =       "Ron Bitton and Nadav Maman and Inderjeet Singh and
                 Satoru Momiyama and Yuval Elovici and Asaf Shabtai",
  title =        "Evaluating the Cybersecurity Risk of Real-world,
                 Machine Learning Production Systems",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "183:1--183:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3559104",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3559104",
  abstract =     "Although cyberattacks on machine learning (ML)
                 production systems can be harmful, today, security
                 practitioners are ill-equipped, lacking methodologies
                 and tactical \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "183",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hua:2023:ECA,
  author =       "Haochen Hua and Yutong Li and Tonghe Wang and Nanqing
                 Dong and Wei Li and Junwei Cao",
  title =        "Edge Computing with Artificial Intelligence: a Machine
                 Learning Perspective",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "184:1--184:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3555802",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3555802",
  abstract =     "Recent years have witnessed the widespread popularity
                 of Internet of things (IoT). By providing sufficient
                 data for model training and inference, IoT has promoted
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "184",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yoshizawa:2023:SSP,
  author =       "Takahito Yoshizawa and Dave Singel{\'e}e and Jan
                 Tobias Muehlberg and Stephane Delbruel and Amir
                 Taherkordi and Danny Hughes and Bart Preneel",
  title =        "A Survey of Security and Privacy Issues in {V2X}
                 Communication Systems",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "185:1--185:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3558052",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3558052",
  abstract =     "Vehicle-to-Everything (V2X) communication is receiving
                 growing attention from industry and academia as
                 multiple pilot projects explore its capabilities and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "185",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liatifis:2023:ASO,
  author =       "Athanasios Liatifis and Panagiotis Sarigiannidis and
                 Vasileios Argyriou and Thomas Lagkas",
  title =        "Advancing {SDN} from {OpenFlow} to {P4}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "186:1--186:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3556973",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3556973",
  abstract =     "Software-defined Networking (SDN) marked the beginning
                 of a new era in the field of networking by decoupling
                 the control and forwarding processes through the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "186",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Senanayake:2023:ASC,
  author =       "Janaka Senanayake and Harsha Kalutarage and Mhd Omar
                 Al-Kadri and Andrei Petrovski and Luca Piras",
  title =        "{Android} Source Code Vulnerability Detection: a
                 Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "187:1--187:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3556974",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3556974",
  abstract =     "The use of mobile devices is rising daily in this
                 technological era. A continuous and increasing number
                 of mobile applications are constantly offered on mobile
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "187",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2023:SVM,
  author =       "Meng Liu and Liqiang Nie and Yunxiao Wang and Meng
                 Wang and Yong Rui",
  title =        "A Survey on Video Moment Localization",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "188:1--188:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3556537",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3556537",
  abstract =     "Video moment localization, also known as video moment
                 retrieval, aims to search a target segment within a
                 video described by a given natural language query.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "188",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cao:2023:MAR,
  author =       "Jacky Cao and Kit-Yung Lam and Lik-Hang Lee and Xiaoli
                 Liu and Pan Hui and Xiang Su",
  title =        "Mobile Augmented Reality: User Interfaces, Frameworks,
                 and Intelligence",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "189:1--189:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3557999",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3557999",
  abstract =     "Mobile Augmented Reality (MAR) integrates
                 computer-generated virtual objects with physical
                 environments for mobile devices. MAR systems enable
                 users to \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "189",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sim:2023:TRA,
  author =       "Junsik Sim and Beomjoong Kim and Kiseok Jeon and
                 Moonho Joo and Jihun Lim and Junghee Lee and Kim-Kwang
                 Raymond Choo",
  title =        "Technical Requirements and Approaches in Personal Data
                 Control",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "190:1--190:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3558766",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3558766",
  abstract =     "There has been a trend of moving from simply
                 de-identification to providing extended data control to
                 their owner (e.g., data portability and right to be
                 \ldots{})",
  acknowledgement = ack-nhfb,
  articleno =    "190",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Issa:2023:BBF,
  author =       "Wael Issa and Nour Moustafa and Benjamin Turnbull and
                 Nasrin Sohrabi and Zahir Tari",
  title =        "Blockchain-Based Federated Learning for Securing
                 {Internet of Things}: a Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "191:1--191:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3560816",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3560816",
  abstract =     "The Internet of Things (IoT) ecosystem connects
                 physical devices to the internet, offering significant
                 advantages in agility, responsiveness, and potential
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "191",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ahmad:2023:RCS,
  author =       "Hussain Ahmad and Isuru Dharmadasa and Faheem Ullah
                 and Muhammad Ali Babar",
  title =        "A Review on {C3I} Systems' Security: Vulnerabilities,
                 Attacks, and Countermeasures",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "192:1--192:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3558001",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3558001",
  abstract =     "Command, Control, Communication, and Intelligence
                 (C3I) systems are increasingly used in critical civil
                 and military domains for achieving information
                 superiority, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "192",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Luo:2023:PPU,
  author =       "Junhai Luo and Zhiyan Wang and Ming Xia and Linyong Wu
                 and Yuxin Tian and Yu Chen",
  title =        "Path Planning for {UAV} Communication Networks:
                 Related Technologies, Solutions, and Opportunities",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "193:1--193:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3560261",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3560261",
  abstract =     "Path planning has been a hot and challenging field in
                 unmanned aerial vehicles (UAV). With the increasing
                 demand of society and the continuous \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "193",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Dwivedi:2023:EAX,
  author =       "Rudresh Dwivedi and Devam Dave and Het Naik and Smiti
                 Singhal and Rana Omer and Pankesh Patel and Bin Qian
                 and Zhenyu Wen and Tejal Shah and Graham Morgan and
                 Rajiv Ranjan",
  title =        "Explainable {AI (XAI)}: Core Ideas, Techniques, and
                 Solutions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "194:1--194:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3561048",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3561048",
  abstract =     "As our dependence on intelligent machines continues to
                 grow, so does the demand for more transparent and
                 interpretable models. In addition, the ability to
                 explain \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "194",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2023:PTP,
  author =       "Pengfei Liu and Weizhe Yuan and Jinlan Fu and Zhengbao
                 Jiang and Hiroaki Hayashi and Graham Neubig",
  title =        "Pre-train, Prompt, and Predict: a Systematic Survey of
                 Prompting Methods in Natural Language Processing",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "195:1--195:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3560815",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3560815",
  abstract =     "This article surveys and organizes research works in a
                 new paradigm in natural language processing, which we
                 dub ``prompt-based learning.'' Unlike traditional
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "195",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2023:EIT,
  author =       "Ping Wang and Haichang Gao and Xiaoyan Guo and
                 Chenxuan Xiao and Fuqi Qi and Zheng Yan",
  title =        "An Experimental Investigation of Text-based {CAPTCHA}
                 Attacks and Their Robustness",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "9",
  pages =        "196:1--196:??",
  month =        sep,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3559754",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3559754",
  abstract =     "Text-based CAPTCHA has become one of the most popular
                 methods for preventing bot attacks. With the rapid
                 development of deep learning techniques, many new
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "196",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rogers:2023:QDE,
  author =       "Anna Rogers and Matt Gardner and Isabelle Augenstein",
  title =        "{QA} Dataset Explosion: a Taxonomy of {NLP} Resources
                 for Question Answering and Reading Comprehension",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "197:1--197:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3560260",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3560260",
  abstract =     "Alongside huge volumes of research on deep learning
                 models in NLP in the recent years, there has been much
                 work on benchmark datasets needed to track modeling
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "197",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chiarot:2023:TSC,
  author =       "Giacomo Chiarot and Claudio Silvestri",
  title =        "Time Series Compression Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "198:1--198:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3560814",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3560814",
  abstract =     "Smart objects are increasingly widespread and their
                 ecosystem, also known as the Internet of Things (IoT),
                 is relevant in many application scenarios. The huge
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "198",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Brophy:2023:GAN,
  author =       "Eoin Brophy and Zhengwei Wang and Qi She and Tom{\'a}s
                 Ward",
  title =        "Generative Adversarial Networks in Time Series: a
                 Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "199:1--199:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3559540",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3559540",
  abstract =     "Generative adversarial network (GAN) studies have
                 grown exponentially in the past few years. Their impact
                 has been seen mainly in the computer vision field
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "199",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ullah:2023:CRV,
  author =       "Fath U Min Ullah and Mohammad S. Obaidat and Amin
                 Ullah and Khan Muhammad and Mohammad Hijji and Sung
                 Wook Baik",
  title =        "A Comprehensive Review on Vision-Based Violence
                 Detection in Surveillance Videos",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "200:1--200:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3561971",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3561971",
  abstract =     "Recent advancements in intelligent surveillance
                 systems for video analysis have been a topic of great
                 interest in the research community due to the vast
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "200",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhao:2023:SSJ,
  author =       "Yunhua Zhao and Kostadin Damevski and Hui Chen",
  title =        "A Systematic Survey of Just-in-Time Software Defect
                 Prediction",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "201:1--201:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3567550",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3567550",
  abstract =     "Recent years have experienced sustained focus in
                 research on software defect prediction that aims to
                 predict the likelihood of software defects. Moreover,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "201",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Quina-Mera:2023:GSM,
  author =       "Antonio Qui{\~n}a-Mera and Pablo Fernandez and
                 Jos{\'e} Mar{\'{\i}}a Garc{\'{\i}}a and Antonio
                 Ruiz-Cort{\'e}s",
  title =        "{GraphQL}: a Systematic Mapping Study",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "202:1--202:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3561818",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3561818",
  abstract =     "GraphQL is a query language and execution engine for
                 web application programming interfaces (APIs) proposed
                 as an alternative to improve data access problems
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "202",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rethmeier:2023:PCP,
  author =       "Nils Rethmeier and Isabelle Augenstein",
  title =        "A Primer on Contrastive Pretraining in Language
                 Processing: Methods, Lessons Learned, and
                 Perspectives",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "203:1--203:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3561970",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3561970",
  abstract =     "Modern natural language processing (NLP) methods
                 employ self-supervised pretraining objectives such as
                 masked language modeling to boost the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "203",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ganapathi:2023:SER,
  author =       "Iyyakutti Iyappan Ganapathi and Syed Sadaf Ali and
                 Surya Prakash and Ngoc-Son Vu and Naoufel Werghi",
  title =        "A Survey of {$3$D} Ear Recognition Techniques",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "204:1--204:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3560884",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3560884",
  abstract =     "Human recognition with biometrics is a rapidly
                 emerging area of computer vision. Compared to other
                 well-known biometric features such as the face,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "204",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Parmar:2023:OWM,
  author =       "Jitendra Parmar and Satyendra Chouhan and Vaskar
                 Raychoudhury and Santosh Rathore",
  title =        "Open-world Machine Learning: Applications, Challenges,
                 and Opportunities",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "205:1--205:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3561381",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3561381",
  abstract =     "Traditional machine learning, mainly supervised
                 learning, follows the assumptions of closed-world
                 learning, i.e., for each testing class, a training
                 class is \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "205",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ibrahim:2023:ECN,
  author =       "Rami Ibrahim and M. Omair Shafiq",
  title =        "Explainable Convolutional Neural Networks: a Taxonomy,
                 Review, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "206:1--206:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3563691",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3563691",
  abstract =     "Convolutional neural networks (CNNs) have shown
                 promising results and have outperformed classical
                 machine learning techniques in tasks such as image
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "206",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sun:2023:FFI,
  author =       "Ling Sun and Yuan Rao and Lianwei Wu and Xiangbo Zhang
                 and Yuqian Lan and Ambreen Nazir",
  title =        "Fighting False Information from Propagation Process: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "207:1--207:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3563388",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3563388",
  abstract =     "The recent serious cases of spreading false
                 information have posed a significant threat to the
                 social stability and even national security, urgently
                 requiring all \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "207",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Pasdar:2023:CAB,
  author =       "Amirmohammad Pasdar and Young Choon Lee and Zhongli
                 Dong",
  title =        "Connect {API} with Blockchain: a Survey on Blockchain
                 Oracle Implementation",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "208:1--208:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3567582",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3567582",
  abstract =     "A blockchain is a form of distributed ledger
                 technology where transactions as data state changes are
                 permanently recorded securely and transparently without
                 the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "208",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Catania:2023:CAT,
  author =       "Fabio Catania and Micol Spitale and Franca Garzotto",
  title =        "Conversational Agents in Therapeutic Interventions for
                 Neurodevelopmental Disorders: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "209:1--209:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3564269",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3564269",
  abstract =     "Neurodevelopmental Disorders (NDD) are a group of
                 conditions with onset in the developmental period
                 characterized by deficits in the cognitive and social
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "209",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gonnord:2023:SPD,
  author =       "Laure Gonnord and Ludovic Henrio and Lionel Morel and
                 Gabriel Radanne",
  title =        "A Survey on Parallelism and Determinism",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "210:1--210:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3564529",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3564529",
  abstract =     "Parallelism is often required for performance. In
                 these situations an excess of non-determinism is
                 harmful as it means the program can have several
                 different \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "210",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sado:2023:EGD,
  author =       "Fatai Sado and Chu Kiong Loo and Wei Shiung Liew and
                 Matthias Kerzel and Stefan Wermter",
  title =        "Explainable Goal-driven Agents and Robots --- a
                 Comprehensive Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "211:1--211:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3564240",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3564240",
  abstract =     "Recent applications of autonomous agents and robots
                 have brought attention to crucial trust-related
                 challenges associated with the current generation of
                 artificial \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "211",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2023:SED,
  author =       "Jou-An Chen and Wei Niu and Bin Ren and Yanzhi Wang
                 and Xipeng Shen",
  title =        "Survey: Exploiting Data Redundancy for Optimization of
                 Deep Learning",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "212:1--212:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3564663",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3564663",
  abstract =     "Data redundancy is ubiquitous in the inputs and
                 intermediate results of Deep Neural Networks (DNN). It
                 offers many significant opportunities for improving DNN
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "212",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Antonyshyn:2023:MMR,
  author =       "Luke Antonyshyn and Jefferson Silveira and Sidney
                 Givigi and Joshua Marshall",
  title =        "Multiple Mobile Robot Task and Motion Planning: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "213:1--213:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3564696",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3564696",
  abstract =     "With recent advances in mobile robotics, autonomous
                 systems, and artificial intelligence, there is a
                 growing expectation that robots are able to solve
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "213",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{deOliveira:2023:VRS,
  author =       "Tain{\~a} Ribeiro de Oliveira and Brenda Biancardi
                 Rodrigues and Matheus Moura da Silva and Rafael Antonio
                 N. Spinass{\'e} and Gabriel Giesen Ludke and Mateus Ruy
                 Soares Gaudio and Guilherme Iglesias Rocha Gomes and
                 Luan Guio Cotini and Daniel da Silva Vargens and
                 Marcelo Queiroz Schimidt and Rodrigo Varej{\~a}o
                 Andre{\~a}o and M{\'a}rio Mestria",
  title =        "Virtual Reality Solutions Employing Artificial
                 Intelligence Methods: a Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "214:1--214:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3565020",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3565020",
  abstract =     "Although there are methods of artificial intelligence
                 (AI) applied to virtual reality (VR) solutions, there
                 are few studies in the literature. Thus, to fill this
                 gap, we \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "214",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Nafees:2023:SGC,
  author =       "Muhammad Nouman Nafees and Neetesh Saxena and Alvaro
                 Cardenas and Santiago Grijalva and Pete Burnap",
  title =        "Smart Grid Cyber-Physical Situational Awareness of
                 Complex Operational Technology Attacks: a Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "215:1--215:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3565570",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3565570",
  abstract =     "The smart grid (SG), regarded as the complex
                 cyber-physical ecosystem of infrastructures,
                 orchestrates advanced communication, computation, and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "215",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Papagiannopoulos:2023:SCM,
  author =       "Kostas Papagiannopoulos and Ognjen Glamo{\v{c}}anin
                 and Melissa Azouaoui and Dorian Ros and Francesco
                 Regazzoni and Mirjana Stojilovi{\'c}",
  title =        "The Side-channel Metrics Cheat Sheet",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "216:1--216:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3565571",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3565571",
  abstract =     "Side-channel attacks exploit a physical observable
                 originating from a cryptographic device in order to
                 extract its secrets. Many practically relevant advances
                 in \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "216",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Boulila:2023:WWP,
  author =       "Elyssa Boulila and Marc Dacier",
  title =        "{WPAD}: Waiting Patiently for an Announced Disaster",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "217:1--217:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3565361",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3565361",
  abstract =     "The Web Proxy Auto-Discovery protocol (wpad $^1$ ) is
                 widely used despite being flawed. Its purpose is to
                 enable a client machine to autonomously identify an
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "217",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yuan:2023:SMS,
  author =       "Gongsheng Yuan and Jiaheng Lu and Zhengtong Yan and
                 Sai Wu",
  title =        "A Survey on Mapping Semi-Structured Data and Graph
                 Data to Relational Data",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "10",
  pages =        "218:1--218:??",
  month =        oct,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3567444",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:17 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3567444",
  abstract =     "The data produced by various services should be stored
                 and managed in an appropriate format for gaining
                 valuable knowledge conveniently. This leads to the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "218",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Georgoulias:2023:BBM,
  author =       "Dimitrios Georgoulias and Jens Myrup Pedersen and
                 Morten Falch and Emmanouil Vasilomanolakis",
  title =        "Botnet Business Models, Takedown Attempts, and the
                 Darkweb Market: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "219:1--219:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3575808",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3575808",
  abstract =     "Botnets account for a substantial portion of
                 cybercrime. Botmasters utilize darkweb marketplaces to
                 promote and provide their services, which can vary from
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "219",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{DiGrazia:2023:CSS,
  author =       "Luca {Di Grazia} and Michael Pradel",
  title =        "Code Search: a Survey of Techniques for Finding Code",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "220:1--220:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3565971",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3565971",
  abstract =     "The immense amounts of source code provide ample
                 challenges and opportunities during software
                 development. To handle the size of code bases,
                 developers \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "220",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Viola:2023:SVN,
  author =       "Roberto Viola and {\'A}ngel Mart{\'{\i}}n and Mikel
                 Zorrilla and Jon Montalb{\'a}n and Pablo Angueira and
                 Gabriel-Miro Muntean",
  title =        "A Survey on Virtual Network Functions for Media
                 Streaming: Solutions and Future Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "221:1--221:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3567826",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3567826",
  abstract =     "Media services must ensure an enhanced user's
                 perceived quality during content playback to attract
                 and retain audiences, especially while the streams are
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "221",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Valero:2023:CEA,
  author =       "Jos{\'e} Mar{\'{\i}}a Jorquera Valero and Pedro Miguel
                 S{\'a}nchez S{\'a}nchez and Manuel Gil P{\'e}rez and
                 Alberto Huertas Celdr{\'a}n and Gregorio Martinez
                 Perez",
  title =        "Cutting-Edge Assets for Trust in {5G} and Beyond:
                 Requirements, State of the Art, Trends, and
                 Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "222:1--222:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3572717",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3572717",
  abstract =     "In 5G and beyond, the figure of cross-operator/domain
                 connections and relationships grows exponentially among
                 stakeholders, resources, and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "222",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Choudhary:2023:SSS,
  author =       "Priyankar Choudhary and Neeraj Goel and Mukesh Saini",
  title =        "A Survey on Seismic Sensor based Target Detection,
                 Localization, Identification, and Activity
                 Recognition",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "223:1--223:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3568671",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3568671",
  abstract =     "Current sensor technologies facilitate device-free and
                 non-invasive monitoring of target activities and
                 infrastructures to ensure a safe and inhabitable
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "223",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Abdelrahman:2023:KTS,
  author =       "Ghodai Abdelrahman and Qing Wang and Bernardo Nunes",
  title =        "Knowledge Tracing: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "224:1--224:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3569576",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3569576",
  abstract =     "Humans' ability to transfer knowledge through teaching
                 is one of the essential aspects for human intelligence.
                 A human teacher can track the knowledge of \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "224",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Dann:2023:NRD,
  author =       "Jonas Dann and Daniel Ritter and Holger Fr{\"o}ning",
  title =        "Non-relational Databases on {FPGAs}: Survey, Design
                 Decisions, Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "225:1--225:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3568990",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3568990",
  abstract =     "Non-relational database systems (NRDS) such as graph
                 and key-value have gained attention in various trending
                 business and analytical application domains. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "225",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2023:PGD,
  author =       "Yang Li and Michael Purcell and Thierry Rakotoarivelo
                 and David Smith and Thilina Ranbaduge and Kee Siong
                 Ng",
  title =        "Private Graph Data Release: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "226:1--226:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3569085",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3569085",
  abstract =     "The application of graph analytics to various domains
                 has yielded tremendous societal and economical benefits
                 in recent years. However, the increasingly \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "226",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Picek:2023:SDL,
  author =       "Stjepan Picek and Guilherme Perin and Luca Mariot and
                 Lichao Wu and Lejla Batina",
  title =        "{SoK}: Deep Learning-based Physical Side-channel
                 Analysis",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "227:1--227:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3569577",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3569577",
  abstract =     "Side-channel attacks represent a realistic and serious
                 threat to the security of embedded devices for already
                 almost three decades. A variety of attacks and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "227",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Seifert:2023:HCA,
  author =       "Michael Seifert and Stephan Kuehnel and Stefan
                 Sackmann",
  title =        "Hybrid Clouds Arising from Software as a Service
                 Adoption: Challenges, Solutions, and Future Research
                 Directions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "228:1--228:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3570156",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3570156",
  abstract =     "Information technology (IT) departments are
                 increasingly challenged to replace legacy applications
                 with novel public cloud software as a service (SaaS) to
                 innovate the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "228",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ranathunga:2023:NMT,
  author =       "Surangika Ranathunga and En-Shiun Annie Lee and
                 Marjana Prifti Skenduli and Ravi Shekhar and Mehreen
                 Alam and Rishemjit Kaur",
  title =        "Neural Machine Translation for Low-resource Languages:
                 a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "229:1--229:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3567592",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3567592",
  abstract =     "Neural Machine Translation (NMT) has seen tremendous
                 growth in the last ten years since the early 2000s and
                 has already entered a mature phase. While \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "229",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Huang:2023:SRA,
  author =       "Bo Huang and Mengchu Zhou and Xiaoyu Sean Lu and
                 Abdullah Abusorrah",
  title =        "Scheduling of Resource Allocation Systems with Timed
                 {Petri} Nets: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "230:1--230:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3570326",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3570326",
  abstract =     "Resource allocation systems (RASs) belong to a kind of
                 discrete event system commonly seen in the industry. In
                 such systems, available resources are allocated to
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "230",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2023:CDW,
  author =       "Chen Chen and Gang Zhou and Youfang Lin",
  title =        "Cross-Domain {WiFi} Sensing with Channel State
                 Information: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "231:1--231:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3570325",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3570325",
  abstract =     "The past years have witnessed the rapid
                 conceptualization and development of wireless sensing
                 based on Channel State Information (CSI) with commodity
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "231",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2023:SSR,
  author =       "Ziqiang Li and Muhammad Usman and Rentuo Tao and
                 Pengfei Xia and Chaoyue Wang and Huanhuan Chen and Bin
                 Li",
  title =        "A Systematic Survey of Regularization and
                 Normalization in {GANs}",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "232:1--232:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3569928",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3569928",
  abstract =     "Generative Adversarial Networks (GANs) have been
                 widely applied in different scenarios thanks to the
                 development of deep neural networks. The original GAN
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "232",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mishra:2023:TLS,
  author =       "Rahul Mishra and Hari Gupta",
  title =        "Transforming Large-Size to Lightweight Deep Neural
                 Networks for {IoT} Applications",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "233:1--233:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3570955",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3570955",
  abstract =     "Deep Neural Networks (DNNs) have gained unprecedented
                 popularity due to their high-order performance and
                 automated feature extraction capability. This has
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "233",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jones:2023:PPU,
  author =       "Michael Jones and Soufiene Djahel and Kristopher
                 Welsh",
  title =        "Path-Planning for Unmanned Aerial Vehicles with
                 Environment Complexity Considerations: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "234:1--234:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3570723",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3570723",
  abstract =     "Unmanned aerial vehicles (UAVs) have the potential to
                 make a significant impact in a range of scenarios where
                 it is too risky or too costly to rely on human labour.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "234",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Shen:2023:FFR,
  author =       "Li-Hsiang Shen and Kai-Ten Feng and Lajos Hanzo",
  title =        "Five Facets of {6G}: Research Challenges and
                 Opportunities",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "235:1--235:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3571072",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3571072",
  abstract =     "While the fifth-generation systems are being rolled
                 out across the globe, researchers have turned their
                 attention to the exploration of radical next-generation
                 solutions. \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "235",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Legaard:2023:CNN,
  author =       "Christian Legaard and Thomas Schranz and Gerald
                 Schweiger and J{\'a}n Drgo{\v{n}}a and Basak Falay and
                 Cl{\'a}udio Gomes and Alexandros Iosifidis and Mahdi
                 Abkar and Peter Larsen",
  title =        "Constructing Neural Network Based Models for
                 Simulating Dynamical Systems",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "236:1--236:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3567591",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3567591",
  abstract =     "Dynamical systems see widespread use in natural
                 sciences like physics, biology, and chemistry, as well
                 as engineering disciplines such as circuit analysis,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "236",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rajapaksha:2023:ABI,
  author =       "Sampath Rajapaksha and Harsha Kalutarage and M. Omar
                 Al-Kadri and Andrei Petrovski and Garikayi Madzudzo and
                 Madeline Cheah",
  title =        "{AI-Based} Intrusion Detection Systems for In-Vehicle
                 Networks: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "237:1--237:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3570954",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3570954",
  abstract =     "The Controller Area Network (CAN) is the most widely
                 used in-vehicle communication protocol, which still
                 lacks the implementation of suitable \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "237",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xu:2023:SDE,
  author =       "Jiahua Xu and Krzysztof Paruch and Simon Cousaert and
                 Yebo Feng",
  title =        "{SoK}: Decentralized Exchanges {(DEX)} with Automated
                 Market Maker {(AMM)} Protocols",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "238:1--238:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3570639",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3570639",
  abstract =     "As an integral part of the decentralized finance
                 (DeFi) ecosystem, decentralized exchanges (DEXs) with
                 automated market maker (AMM) protocols have \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "238",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hijma:2023:OTG,
  author =       "Pieter Hijma and Stijn Heldens and Alessio Sclocco and
                 Ben van Werkhoven and Henri E. Bal",
  title =        "Optimization Techniques for {GPU} Programming",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "239:1--239:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3570638",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3570638",
  abstract =     "In the past decade, Graphics Processing Units have
                 played an important role in the field of
                 high-performance computing and they still advance new
                 fields such as IoT, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "239",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhu:2023:BEF,
  author =       "Juncen Zhu and Jiannong Cao and Divya Saxena and Shan
                 Jiang and Houda Ferradi",
  title =        "Blockchain-empowered Federated Learning: Challenges,
                 Solutions, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "11",
  pages =        "240:1--240:??",
  month =        nov,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3570953",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Mar 23 11:17:18 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3570953",
  abstract =     "Federated learning is a privacy-preserving machine
                 learning technique that trains models across multiple
                 devices holding local data samples without exchanging
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "240",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rahman:2023:WAD,
  author =       "Md Rayhanur Rahman and Rezvan Mahdavi Hezaveh and
                 Laurie Williams",
  title =        "What Are the Attackers Doing Now? {Automating}
                 Cyberthreat Intelligence Extraction from Text on Pace
                 with the Changing Threat Landscape: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "241:1--241:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3571726",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3571726",
  abstract =     "Cybersecurity researchers have contributed to the
                 automated extraction of CTI from textual sources, such
                 as threat reports and online articles describing
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "241",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jeyaraj:2023:RMC,
  author =       "Rathinaraja Jeyaraj and Anandkumar Balasubramaniam and
                 Ajay Kumara M. A. and Nadra Guizani and Anand Paul",
  title =        "Resource Management in Cloud and Cloud-influenced
                 Technologies for {Internet of Things} Applications",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "242:1--242:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3571729",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3571729",
  abstract =     "The trend of adopting Internet of Things (IoT) in
                 healthcare, smart cities, Industry 4.0, and so on is
                 increasing by means of cloud computing, which provides
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "242",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rathi:2023:ENC,
  author =       "Nitin Rathi and Indranil Chakraborty and Adarsh Kosta
                 and Abhronil Sengupta and Aayush Ankit and
                 Priyadarshini Panda and Kaushik Roy",
  title =        "Exploring Neuromorphic Computing Based on Spiking
                 Neural Networks: Algorithms to Hardware",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "243:1--243:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3571155",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3571155",
  abstract =     "Neuromorphic Computing, a concept pioneered in the
                 late 1980s, is receiving a lot of attention lately due
                 to its promise of reducing the computational \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "243",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gao:2023:SSG,
  author =       "Jianhua Gao and Weixing Ji and Fangli Chang and Shiyu
                 Han and Bingxin Wei and Zeming Liu and Yizhuo Wang",
  title =        "A Systematic Survey of General Sparse Matrix--Matrix
                 Multiplication",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "244:1--244:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3571157",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3571157",
  abstract =     "General Sparse Matrix-Matrix Multiplication (SpGEMM)
                 has attracted much attention from researchers in graph
                 analyzing, scientific computing, and deep earning. Many
                 optimization techniques have been developed for
                 different applications and computing architectures over
                 the past decades. The objective of this article is to
                 provide a structured and comprehensive overview of the
                 researches on SpGEMM. Existing researches have been
                 grouped into different categories based on target
                 architectures and design choices. Covered topics
                 include typical applications, compression formats,
                 general formulations, key problems and techniques,
                 architecture-oriented optimizations, and programming
                 models. The rationales of different algorithms are
                 analyzed and summarized. This survey sufficiently
                 reveals the latest progress of SpGEMM research to 2021.
                 Moreover, a thorough performance comparison of existing
                 implementations is presented. Based on our findings, we
                 highlight future research directions, which encourage
                 better design and implementations in later studies.",
  acknowledgement = ack-nhfb,
  articleno =    "244",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2023:SPO,
  author =       "Yun Zhang and Linwei Zhu and Gangyi Jiang and Sam
                 Kwong and C.-C. Jay Kuo",
  title =        "A Survey on Perceptually Optimized Video Coding",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "245:1--245:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3571727",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3571727",
  abstract =     "To provide users with more realistic visual
                 experiences, videos are developing in the trends of
                 Ultra High Definition (UHD), High Frame Rate (HFR),
                 High Dynamic \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "245",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Dey:2023:PMC,
  author =       "Jayashree Dey and Ratna Dutta",
  title =        "Progress in Multivariate Cryptography: Systematic
                 Review, Challenges, and Research Directions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "246:1--246:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3571071",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3571071",
  abstract =     "Multivariate Public Key Cryptosystem (MPKC) seem to be
                 promising toward future digital security even in the
                 presence of quantum adversaries. MPKCs derive their
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "246",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Heidari:2023:MLA,
  author =       "Arash Heidari and Nima Jafari Navimipour and Mehmet
                 Unal and Guodao Zhang",
  title =        "Machine Learning Applications in {Internet-of-Drones}:
                 Systematic Review, Recent Deployments, and Open
                 Issues",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "247:1--247:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3571728",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3571728",
  abstract =     "Deep Learning (DL) and Machine Learning (ML) are
                 effectively utilized in various complicated challenges
                 in healthcare, industry, and academia. The \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "247",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ji:2023:SHN,
  author =       "Ziwei Ji and Nayeon Lee and Rita Frieske and Tiezheng
                 Yu and Dan Su and Yan Xu and Etsuko Ishii and Ye Jin
                 Bang and Andrea Madotto and Pascale Fung",
  title =        "Survey of Hallucination in Natural Language
                 Generation",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "248:1--248:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3571730",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3571730",
  abstract =     "Natural Language Generation (NLG) has improved
                 exponentially in recent years thanks to the development
                 of sequence-to-sequence deep learning \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "248",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Martinez:2023:CRS,
  author =       "Antonio L{\'o}pez Mart{\'{\i}}nez and Manuel Gil
                 P{\'e}rez and Antonio Ruiz-Mart{\'{\i}}nez",
  title =        "A Comprehensive Review of the State-of-the-Art on
                 Security and Privacy Issues in Healthcare",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "249:1--249:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3571156",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3571156",
  abstract =     "Currently, healthcare is critical environment in our
                 society, which attracts attention to malicious
                 activities and has caused an important number of
                 damaging \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "249",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wu:2023:SDS,
  author =       "Caesar Wu and Rui Zhang and Ramamohanarao Kotagiri and
                 Pascal Bouvry",
  title =        "Strategic Decisions: Survey, Taxonomy, and Future
                 Directions from Artificial Intelligence Perspective",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "250:1--250:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3571807",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3571807",
  abstract =     "Strategic Decision-Making is always challenging
                 because it is inherently uncertain, ambiguous, risky,
                 and complex. By contrast to tactical and operational
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "250",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Buser:2023:SES,
  author =       "Maxime Buser and Rafael Dowsley and Muhammed Esgin and
                 Cl{\'e}mentine Gritti and Shabnam Kasra Kermanshahi and
                 Veronika Kuchta and Jason Legrow and Joseph Liu and
                 Rapha{\"e}l Phan and Amin Sakzad and Ron Steinfeld and
                 Jiangshan Yu",
  title =        "A Survey on Exotic Signatures for Post-quantum
                 Blockchain: Challenges and Research Directions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "251:1--251:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3572771",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3572771",
  abstract =     "Blockchain technology provides efficient and secure
                 solutions to various online activities by utilizing a
                 wide range of cryptographic tools. In this article, we
                 survey the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "251",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Damsgaard:2023:AOE,
  author =       "Hans Jakob Damsgaard and Aleksandr Ometov and Jari
                 Nurmi",
  title =        "Approximation Opportunities in Edge Computing
                 Hardware: a Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "252:1--252:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3572772",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3572772",
  abstract =     "With the increasing popularity of the Internet of
                 Things and massive Machine Type Communication
                 technologies, the number of connected devices is
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "252",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Catalyurek:2023:MRA,
  author =       "{\"U}mit {\c{C}}ataly{\"u}rek and Karen Devine and
                 Marcelo Faraj and Lars Gottesb{\"u}ren and Tobias Heuer
                 and Henning Meyerhenke and Peter Sanders and Sebastian
                 Schlag and Christian Schulz and Daniel Seemaier and
                 Dorothea Wagner",
  title =        "More Recent Advances in (Hyper){Graph} Partitioning",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "253:1--253:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3571808",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3571808",
  abstract =     "In recent years, significant advances have been made
                 in the design and evaluation of balanced (hyper)graph
                 partitioning algorithms. We survey trends of \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "253",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lin:2023:PIV,
  author =       "Weiwei Lin and Chennian Xiong and Wentai Wu and Fang
                 Shi and Keqin Li and Minxian Xu",
  title =        "Performance Interference of Virtual Machines: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "254:1--254:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3573009",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3573009",
  abstract =     "The rapid development of cloud computing with
                 virtualization technology has benefited both academia
                 and industry. For any cloud data center at scale, one
                 of the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "254",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Smith-Miles:2023:ISA,
  author =       "Kate Smith-Miles and Mario Andr{\'e}s Mu{\~n}oz",
  title =        "Instance Space Analysis for Algorithm Testing:
                 Methodology and Software Tools",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "255:1--255:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3572895",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3572895",
  abstract =     "Instance Space Analysis (ISA) is a recently developed
                 methodology to (a) support objective testing of
                 algorithms and (b) assess the diversity of test
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "255",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kotti:2023:MLS,
  author =       "Zoe Kotti and Rafaila Galanopoulou and Diomidis
                 Spinellis",
  title =        "Machine Learning for Software Engineering: a Tertiary
                 Study",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "256:1--256:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3572905",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3572905",
  abstract =     "Machine learning (ML) techniques increase the
                 effectiveness of software engineering (SE) lifecycle
                 activities. We systematically collected,
                 quality-assessed, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "256",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sha:2023:DPG,
  author =       "Tong Sha and Wei Zhang and Tong Shen and Zhoujun Li
                 and Tao Mei",
  title =        "Deep Person Generation: a Survey from the Perspective
                 of Face, Pose, and Cloth Synthesis",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "257:1--257:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3575656",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3575656",
  abstract =     "Deep person generation has attracted extensive
                 research attention due to its wide applications in
                 virtual agents, video conferencing, online shopping,
                 and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "257",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xiang:2023:SID,
  author =       "Wei Xiang and Bang Wang",
  title =        "A Survey of Implicit Discourse Relation Recognition",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "258:1--258:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3574134",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3574134",
  abstract =     "A discourse containing one or more sentences describes
                 daily issues and events for people to communicate their
                 thoughts and opinions. As sentences are \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "258",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Menghani:2023:EDL,
  author =       "Gaurav Menghani",
  title =        "Efficient Deep Learning: a Survey on Making Deep
                 Learning Models Smaller, Faster, and Better",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "259:1--259:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3578938",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3578938",
  abstract =     "Deep learning has revolutionized the fields of
                 computer vision, natural language understanding, speech
                 recognition, information retrieval, and more.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "259",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hertel:2023:DLT,
  author =       "Robert Hertel and Rachid Benlamri",
  title =        "Deep Learning Techniques for {COVID-19} Diagnosis and
                 Prognosis Based on Radiological Imaging",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "260:1--260:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3576898",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3576898",
  abstract =     "This literature review summarizes the current deep
                 learning methods developed by the medical imaging AI
                 research community that have been focused on \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "260",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2023:SDB,
  author =       "Qin Wang and Jiangshan Yu and Shiping Chen and Yang
                 Xiang",
  title =        "{SoK}: {DAG}-based Blockchain Systems",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "261:1--261:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3576899",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3576899",
  abstract =     "Limitations on high latency and low scalability of
                 classical blockchain systems retard their adoptions and
                 applications. Reconstructed blockchain systems
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "261",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zolfaghari:2023:CPD,
  author =       "Behrouz Zolfaghari and Leila Mirsadeghi and Khodakhast
                 Bibak and Kaveh Kavousi",
  title =        "Cancer Prognosis and Diagnosis Methods Based on
                 Ensemble Learning",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "12",
  pages =        "262:1--262:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3580218",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Mar 29 06:37:13 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3580218",
  abstract =     "Ensemble methods try to improve performance via
                 integrating different kinds of input data, features, or
                 learning algorithms. In addition to other \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "262",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2023:WPM,
  author =       "Xiaojie Wang and Jiameng Li and Zhaolong Ning and
                 Qingyang Song and Lei Guo and Song Guo and Mohammad S.
                 Obaidat",
  title =        "Wireless Powered Mobile Edge Computing Networks: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "263:1--263:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3579992",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3579992",
  abstract =     "Wireless Powered Mobile Edge Computing (WPMEC) is an
                 integration of Mobile Edge Computing (MEC) and Wireless
                 Power Transfer (WPT) technologies, to \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "263",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Garg:2023:HBT,
  author =       "Tanmay Garg and Sarah Masud and Tharun Suresh and
                 Tanmoy Chakraborty",
  title =        "Handling Bias in Toxic Speech Detection: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "264:1--264:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3580494",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3580494",
  abstract =     "Detecting online toxicity has always been a challenge
                 due to its inherent subjectivity. Factors such as the
                 context, geography, socio-political climate, and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "264",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cunha:2023:CSI,
  author =       "Washington Cunha and Felipe Viegas and Celso
                 Fran{\c{c}}a and Thierson Rosa and Leonardo Rocha and
                 Marcos Andr{\'e} Gon{\c{c}}alves",
  title =        "A Comparative Survey of Instance Selection Methods
                 applied to Non-Neural and Transformer-Based Text
                 Classification",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "265:1--265:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3582000",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3582000",
  abstract =     "Progress in natural language processing has been
                 dictated by the rule of more: more data, more computing
                 power, more complexity, best exemplified by deep
                 learning \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "265",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2023:COC,
  author =       "Mingyu Liu and Li Pan and Shijun Liu",
  title =        "Cost Optimization for Cloud Storage from User
                 Perspectives: Recent Advances, Taxonomy, and Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "266:1--266:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3582883",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3582883",
  abstract =     "With the development and maturity of cloud storage, it
                 has attracted a large number of users. Although cloud
                 users do not need to concern themselves with the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "266",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Dalzochio:2023:PMM,
  author =       "Jovani Dalzochio and Rafael Kunst and Jorge Luis
                 Vict{\'o}ria Barbosa and Pedro Clarindo da Silva Neto
                 and Edison Pignaton and Carla Schwengber ten Caten and
                 Alex de Lima Teodoro da Penha",
  title =        "Predictive Maintenance in the Military Domain: a
                 Systematic Review of the Literature",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "267:1--267:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3586100",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3586100",
  abstract =     "Military troops rely on maintenance management
                 projects and operations to preserve the materials'
                 ordinary conditions or restore them to combat or
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "267",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gonzalez-Sabbagh:2023:SUC,
  author =       "Salma P. Gonz{\'a}lez-Sabbagh and Antonio
                 Robles-Kelly",
  title =        "A Survey on Underwater Computer Vision",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "268:1--268:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3578516",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3578516",
  abstract =     "Underwater computer vision has attracted increasing
                 attention in the research community due to the recent
                 advances in underwater platforms such as of \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "268",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{deCarnavalet:2023:SAT,
  author =       "Xavier de Carn{\'e} de Carnavalet and Paul C. van
                 Oorschot",
  title =        "A Survey and Analysis of {TLS} Interception Mechanisms
                 and Motivations: Exploring how end-to-end {TLS} is made
                 ``end-to-me'' for web traffic",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "269:1--269:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3580522",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3580522",
  abstract =     "TLS is an end-to-end protocol designed to provide
                 confidentiality and integrity guarantees that improve
                 end-user security and privacy. While TLS helps
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "269",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Das:2023:MSA,
  author =       "Ringki Das and Thoudam Doren Singh",
  title =        "Multimodal Sentiment Analysis: a Survey of Methods,
                 Trends, and Challenges",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "270:1--270:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3586075",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3586075",
  abstract =     "Sentiment analysis has come long way since it was
                 introduced as a natural language processing task nearly
                 20 years ago. Sentiment analysis aims to extract
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "270",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Song:2023:CSF,
  author =       "Yisheng Song and Ting Wang and Puyu Cai and Subrota K.
                 Mondal and Jyoti Prakash Sahoo",
  title =        "A Comprehensive Survey of Few-shot Learning:
                 Evolution, Applications, Challenges, and
                 Opportunities",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "271:1--271:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3582688",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3582688",
  abstract =     "Few-shot learning (FSL) has emerged as an effective
                 learning method and shows great potential. Despite the
                 recent creative works in tackling FSL tasks, learning
                 valid \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "271",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gammulle:2023:CHA,
  author =       "Harshala Gammulle and David Ahmedt-Aristizabal and
                 Simon Denman and Lachlan Tychsen-Smith and Lars
                 Petersson and Clinton Fookes",
  title =        "Continuous Human Action Recognition for Human-machine
                 Interaction: a Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "272:1--272:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3587931",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3587931",
  abstract =     "With advances in data-driven machine learning
                 research, a wide variety of prediction models have been
                 proposed to capture spatio-temporal features \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "272",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Abbas:2023:SAE,
  author =       "Haider Abbas and Naina Emmanuel and Muhammad Faisal
                 Amjad and Tahreem Yaqoob and Mohammed Atiquzzaman and
                 Zafar Iqbal and Narmeen Shafqat and Waleed {Bin Shahid}
                 and Ali Tanveer and Umer Ashfaq",
  title =        "Security Assessment and Evaluation of {VPNs}: a
                 Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "273:1--273:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3579162",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3579162",
  abstract =     "The use of Virtual Private Networks (VPNs) has
                 witnessed an outstanding rise as they aim to provide
                 confidentiality and anonymity to communication. Despite
                 this \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "273",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Greca:2023:SPA,
  author =       "Renan Greca and Breno Miranda and Antonia Bertolino",
  title =        "State of Practical Applicability of Regression Testing
                 Research: a Live Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "274:1--274:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3579851",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3579851",
  abstract =     "Context: Software regression testing refers to
                 rerunning test cases after the system under test is
                 modified, ascertaining that the changes have not
                 (re-)introduced \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "274",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Casadei:2023:MCS,
  author =       "Roberto Casadei",
  title =        "Macroprogramming: Concepts, State of the Art, and
                 Opportunities of Macroscopic Behaviour Modelling",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "275:1--275:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3579353",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3579353",
  abstract =     "Macroprogramming refers to the theory and practice of
                 expressing the macro(scopic) behaviour of a collective
                 system using a single program. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "275",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lee:2023:REC,
  author =       "JunKyu Lee and Lev Mukhanov and Amir Sabbagh
                 Molahosseini and Umar Minhas and Yang Hua and Jesus
                 Martinez del Rincon and Kiril Dichev and Cheol-Ho Hong
                 and Hans Vandierendonck",
  title =        "Resource-Efficient Convolutional Networks: a Survey on
                 Model-, Arithmetic-, and Implementation-Level
                 Techniques",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "276:1--276:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3587095",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3587095",
  abstract =     "Convolutional neural networks (CNNs) are used in our
                 daily life, including self-driving cars, virtual
                 assistants, social network services, healthcare
                 services, and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "276",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Andre:2023:FUS,
  author =       "{\'E}tienne Andr{\'e} and Shuang Liu and Yang Liu and
                 Christine Choppy and Jun Sun and Jin Song Dong",
  title =        "Formalizing {UML} State Machines for Automated
                 Verification --- a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "277:1--277:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3579821",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3579821",
  abstract =     "The Unified Modeling Language (UML) is a standard for
                 modeling dynamic systems. UML behavioral state machines
                 are used for modeling the dynamic behavior of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "277",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xu:2023:SBC,
  author =       "Jie Xu and Cong Wang and Xiaohua Jia",
  title =        "A Survey of Blockchain Consensus Protocols",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "278:1--278:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3579845",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3579845",
  abstract =     "Blockchain consensus protocols have been a focus of
                 attention since the advent of Bitcoin. Although classic
                 distributed consensus algorithms made \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "278",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gui:2023:CST,
  author =       "Jie Gui and Xiaofeng Cong and Yuan Cao and Wenqi Ren
                 and Jun Zhang and Jing Zhang and Jiuxin Cao and Dacheng
                 Tao",
  title =        "A Comprehensive Survey and Taxonomy on Single Image
                 Dehazing Based on Deep Learning",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "279:1--279:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3576918",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3576918",
  abstract =     "With the development of convolutional neural networks,
                 hundreds of deep learning-based dehazing methods have
                 been proposed. In this article, we \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "279",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Veiga:2023:RAS,
  author =       "Tiago Veiga and Jennifer Renoux",
  title =        "From Reactive to Active Sensing: a Survey on
                 Information Gathering in Decision-theoretic Planning",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "280:1--280:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3583068",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3583068",
  abstract =     "In traditional decision-theoretic planning,
                 information gathering is a means to a goal. The agent
                 receives information about its environment (state or
                 observation) \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "280",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2023:ECS,
  author =       "Tian Wang and Yuzhu Liang and Xuewei Shen and Xi Zheng
                 and Adnan Mahmood and Quan Z. Sheng",
  title =        "Edge Computing and Sensor-Cloud: Overview, Solutions,
                 and Directions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "281:1--281:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3582270",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3582270",
  abstract =     "Sensor-cloud originates from extensive recent
                 applications of wireless sensor networks and cloud
                 computing. To draw a roadmap of the current research
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "281",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rajapakse:2023:IEE,
  author =       "Visal Rajapakse and Ishan Karunanayake and Nadeem
                 Ahmed",
  title =        "Intelligence at the Extreme Edge: a Survey on
                 Reformable {TinyML}",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "282:1--282:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3583683",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3583683",
  abstract =     "Machine Learning (TinyML) is an upsurging research
                 field that proposes to democratize the use of Machine
                 Learning and Deep Learning on highly \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "282",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kosch:2023:SMC,
  author =       "Thomas Kosch and Jakob Karolus and Johannes Zagermann
                 and Harald Reiterer and Albrecht Schmidt and Pawe{\l}
                 W. Wo{\'z}niak",
  title =        "A Survey on Measuring Cognitive Workload in
                 Human-Computer Interaction",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "283:1--283:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3582272",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3582272",
  abstract =     "The ever-increasing number of computing devices around
                 us results in more and more systems competing for our
                 attention, making cognitive workload a crucial factor
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "283",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Starzynska-Grzes:2023:CVB,
  author =       "Ma{\l}gorzata B. Starzy{\'n}ska-Grze{\'s} and Robin
                 Roussel and Sam Jacoby and Ali Asadipour",
  title =        "Computer Vision-based Analysis of Buildings and Built
                 Environments: a Systematic Review of Current
                 Approaches",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "284:1--284:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3578552",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3578552",
  abstract =     "Analysing 88 sources published from 2011 to 2021, this
                 article presents a first systematic review of the
                 computer vision-based analysis of buildings and the
                 built \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "284",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2023:AEP,
  author =       "Chang Liu and Han Yu",
  title =        "{AI}-Empowered Persuasive Video Generation: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "285:1--285:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3588764",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3588764",
  abstract =     "Promotional videos are rapidly becoming a popular
                 medium for persuading people to change their behaviours
                 in many settings (e.g., online shopping, social
                 \ldots{})",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "285",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hasan:2023:PLP,
  author =       "Md Rezwan Hasan and Richard Guest and Farzin Deravi",
  title =        "Presentation-level Privacy Protection Techniques for
                 Automated Face Recognition --- a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "286:1--286:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3583135",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3583135",
  abstract =     "The use of Biometric Facial Recognition (FR) systems
                 have become increasingly widespread, especially since
                 the advent of deep neural network-based \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "286",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2023:RAB,
  author =       "Xilu Wang and Yaochu Jin and Sebastian Schmitt and
                 Markus Olhofer",
  title =        "Recent Advances in {Bayesian} Optimization",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "287:1--287:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3582078",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3582078",
  abstract =     "Bayesian optimization has emerged at the forefront of
                 expensive black-box optimization due to its data
                 efficiency. Recent years have witnessed a \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "287",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Schiappa:2023:SSL,
  author =       "Madeline C. Schiappa and Yogesh S. Rawat and Mubarak
                 Shah",
  title =        "Self-Supervised Learning for Videos: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "288:1--288:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3577925",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3577925",
  abstract =     "The remarkable success of deep learning in various
                 domains relies on the availability of large-scale
                 annotated datasets. However, obtaining annotations is
                 expensive \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "288",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Guo:2023:RTT,
  author =       "Huihui Guo and Fan Wu and Yunchuan Qin and Ruihui Li
                 and Keqin Li and Kenli Li",
  title =        "Recent Trends in Task and Motion Planning for
                 Robotics: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "289:1--289:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3583136",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3583136",
  abstract =     "Autonomous robots are increasingly served in
                 real-world unstructured human environments with complex
                 long-horizon tasks, such as restaurant serving
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "289",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2023:EBI,
  author =       "Gang Wang and Qin Wang and Shiping Chen",
  title =        "Exploring Blockchains Interoperability: a Systematic
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "290:1--290:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3582882",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3582882",
  abstract =     "The next-generation blockchain ecosystem is expected
                 to integrate both homogeneous and heterogeneous
                 distributed ledgers. These systems require operations
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "290",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2023:RMM,
  author =       "Xiaojie Zhang and Saptarshi Debroy",
  title =        "Resource Management in Mobile Edge Computing: a
                 Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "291:1--291:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3589639",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3589639",
  abstract =     "With the evolution of 5G and Internet of Things
                 technologies, Mobile Edge Computing (MEC) has emerged
                 as a major computing paradigm. Compared to cloud
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "291",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sharma:2023:SMI,
  author =       "Yogesh Sharma and Deval Bhamare and Nishanth Sastry
                 and Bahman Javadi and Rajkumar Buyya",
  title =        "{SLA} Management in Intent-Driven Service Management
                 Systems: a Taxonomy and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "13s",
  pages =        "292:1--292:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3589339",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:56:59 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3589339",
  abstract =     "Traditional, slow and error-prone human-driven methods
                 to configure and manage Internet service requests are
                 proving unsatisfactory. This is due to an \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "292",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Norambuena:2023:SEB,
  author =       "Brian Felipe Keith Norambuena and Tanushree Mitra and
                 Chris North",
  title =        "A Survey on Event-Based News Narrative Extraction",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "300:1--300:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3584741",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3584741",
  abstract =     "Narratives are fundamental to our understanding of the
                 world, providing us with a natural structure for
                 knowledge representation over time. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "300",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhong:2023:GDM,
  author =       "Zhiwei Zhong and Xianming Liu and Junjun Jiang and
                 Debin Zhao and Xiangyang Ji",
  title =        "Guided Depth Map Super-Resolution: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "301:1--301:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3584860",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3584860",
  abstract =     "Guided depth map super-resolution (GDSR), which aims
                 to reconstruct a high-resolution depth map from a
                 low-resolution observation with the help of a
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "301",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kumar:2023:DFC,
  author =       "Vijay Kumar and Kolin Paul",
  title =        "Device Fingerprinting for Cyber-Physical Systems: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "302:1--302:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3584944",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3584944",
  abstract =     "The continued growth of the cyber-physical system
                 (CPS) and Internet of Things technologies raises device
                 security and monitoring concerns. For device \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "302",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chung:2023:IDE,
  author =       "Mu-Huan Chung and Yuhong Yang and Lu Wang and Greg
                 Cento and Khilan Jerath and Abhay Raman and David Lie
                 and Mark H. Chignell",
  title =        "Implementing Data Exfiltration Defense in Situ: a
                 Survey of Countermeasures and Human Involvement",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "303:1--303:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3582077",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3582077",
  abstract =     "In this article we consider the problem of defending
                 against increasing data exfiltration threats in the
                 domain of cybersecurity. We review existing \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "303",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fournier:2023:PSF,
  author =       "Quentin Fournier and Ga{\'e}tan Marceau Caron and
                 Daniel Aloise",
  title =        "A Practical Survey on Faster and Lighter
                 Transformers",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "304:1--304:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3586074",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3586074",
  abstract =     "Recurrent neural networks are effective models to
                 process sequences. However, they are unable to learn
                 long-term dependencies because of their inherent
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "304",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Olson:2023:DRI,
  author =       "Karl Olson and Jack Wampler and Eric Keller",
  title =        "Doomed to Repeat with {IPv6}? {Characterization} of
                 {NAT}-centric Security in {SOHO} Routers",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "305:1--305:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3586007",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3586007",
  abstract =     "With the transition to IPv6, addressing constraints
                 that necessitated a common security architecture under
                 network address translation (NAT) are no longer
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "305",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Reghenzani:2023:SFT,
  author =       "Federico Reghenzani and Zhishan Guo and William
                 Fornaciari",
  title =        "Software Fault Tolerance in Real-Time Systems:
                 Identifying the Future Research Questions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "306:1--306:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3589950",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3589950",
  abstract =     "Tolerating hardware faults in modern architectures is
                 becoming a prominent problem due to the miniaturization
                 of the hardware components, their \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "306",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ding:2023:SAE,
  author =       "Jiepin Ding and Mingsong Chen and Ting Wang and
                 Junlong Zhou and Xin Fu and Keqin Li",
  title =        "A Survey of {AI}-enabled Dynamic Manufacturing
                 Scheduling: From Directed Heuristics to Autonomous
                 Learning",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "307:1--307:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3590163",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3590163",
  abstract =     "As one of the most complex parts in manufacturing
                 systems, scheduling plays an important role in the
                 efficient allocation of resources to meet individual
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "307",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ihle:2023:IMP,
  author =       "Cornelius Ihle and Dennis Trautwein and Moritz
                 Schubotz and Norman Meuschke and Bela Gipp",
  title =        "Incentive Mechanisms in Peer-to-Peer Networks --- a
                 Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "308:1--308:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3578581",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3578581",
  abstract =     "Centralized networks inevitably exhibit single points
                 of failure that malicious actors regularly target.
                 Decentralized networks are more resilient if numerous
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "308",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Carvalho:2023:SPP,
  author =       "T{\^a}nia Carvalho and Nuno Moniz and Pedro Faria and
                 Lu{\'{\i}}s Antunes",
  title =        "Survey on Privacy-Preserving Techniques for Microdata
                 Publication",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "309:1--309:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3588765",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3588765",
  abstract =     "The exponential growth of collected, processed, and
                 shared microdata has given rise to concerns about
                 individuals' privacy. As a result, laws and regulations
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "309",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fulcini:2023:RTM,
  author =       "Tommaso Fulcini and Riccardo Coppola and Luca Ardito
                 and Marco Torchiano",
  title =        "A Review on Tools, Mechanics, Benefits, and Challenges
                 of Gamified Software Testing",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "310:1--310:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3582273",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3582273",
  abstract =     "Gamification is an established practice in Software
                 Engineering to increase effectiveness and engagement in
                 many practices. This manuscript \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "310",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kalakanti:2023:CCA,
  author =       "Arun Kumar Kalakanti and Shrisha Rao",
  title =        "Computational Challenges and Approaches for Electric
                 Vehicles",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "311:1--311:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3582076",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3582076",
  abstract =     "Researchers worldwide have become increasingly
                 interested in developing computational approaches to
                 handle challenges facing electric vehicles \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "311",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Pittaras:2023:CBK,
  author =       "Nikiforos Pittaras and George Giannakopoulos and
                 Panagiotis Stamatopoulos and Vangelis Karkaletsis",
  title =        "Content-based and Knowledge-enriched Representations
                 for Classification Across Modalities: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "312:1--312:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3583682",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3583682",
  abstract =     "This survey documents representation approaches for
                 classification across different modalities, from purely
                 content-based methods to techniques utilizing
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "312",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Breit:2023:CML,
  author =       "Anna Breit and Laura Waltersdorfer and Fajar J.
                 Ekaputra and Marta Sabou and Andreas Ekelhart and
                 Andreea Iana and Heiko Paulheim and Jan Portisch and
                 Artem Revenko and Annette {Ten Teije} and Frank {Van
                 Harmelen}",
  title =        "Combining Machine Learning and Semantic {Web}: a
                 Systematic Mapping Study",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "313:1--313:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3586163",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3586163",
  abstract =     "In line with the general trend in artificial
                 intelligence research to create intelligent systems
                 that combine learning and symbolic components, a new
                 sub-area has \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "313",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Al-Meer:2023:PUF,
  author =       "Abdulaziz Al-Meer and Saif Al-Kuwari",
  title =        "Physical Unclonable Functions {(PUF)} for {IoT}
                 Devices",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "314:1--314:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3591464",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3591464",
  abstract =     "Physical Unclonable Function (PUF) has recently
                 attracted interest from both industry and academia as a
                 potential alternative approach to secure \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "314",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Saini:2023:STR,
  author =       "Shalini Saini and Nitesh Saxena",
  title =        "A Survey of Threats to Research Literature-dependent
                 Medical {AI} Solutions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "315:1--315:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3592597",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3592597",
  abstract =     "Medical Artificial Intelligence (MedAI) harnesses the
                 power of medical research through AI algorithms and
                 vast data to address healthcare challenges. The
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "315",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hammi:2023:STC,
  author =       "Badis Hammi and Sherali Zeadally and Jamel Nebhen",
  title =        "Security Threats, Countermeasures, and Challenges of
                 Digital Supply Chains",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "316:1--316:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3588999",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3588999",
  abstract =     "The rapid growth of Information Communication
                 Technologies (ICT) has impacted many fields. In this
                 context, the supply chain has also quickly \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "316",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Storey:2023:CMT,
  author =       "Veda C. Storey and Roman Lukyanenko and Arturo
                 Castellanos",
  title =        "Conceptual Modeling: Topics, Themes, and Technology
                 Trends",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "317:1--317:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3589338",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3589338",
  abstract =     "Conceptual modeling is an important part of
                 information systems development and use that involves
                 identifying and representing relevant aspects of
                 reality. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "317",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Dhelim:2023:DMD,
  author =       "Sahraoui Dhelim and Liming Chen and Sajal K. Das and
                 Huansheng Ning and Chris Nugent and Gerard Leavey and
                 Dirk Pesch and Eleanor Bantry-White and Devin Burns",
  title =        "Detecting Mental Distresses Using Social Behavior
                 Analysis in the Context of {COVID-19}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "318:1--318:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3589784",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3589784",
  abstract =     "Online social media provides a channel for monitoring
                 people's social behaviors from which to infer and
                 detect their mental distresses. During the COVID-19
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "318",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Govers:2023:RHD,
  author =       "Jarod Govers and Philip Feldman and Aaron Dant and
                 Panos Patros",
  title =        "Down the Rabbit Hole: Detecting Online Extremism,
                 Radicalisation, and Politicised Hate Speech",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "319:1--319:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3583067",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3583067",
  abstract =     "Social media is a modern person's digital voice to
                 project and engage with new ideas and mobilise
                 communities-a power shared with extremists. Given the
                 societal \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "319",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Nurgalieva:2023:NRF,
  author =       "Leysan Nurgalieva and Alisa Frik and Gavin Doherty",
  title =        "A Narrative Review of Factors Affecting the
                 Implementation of Privacy and Security Practices in
                 Software Development",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "320:1--320:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3589951",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3589951",
  abstract =     "Privacy and security are complex topics, raising a
                 variety of considerations and requirements that can be
                 challenging to implement in software \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "320",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Pallewatta:2023:PMB,
  author =       "Samodha Pallewatta and Vassilis Kostakos and Rajkumar
                 Buyya",
  title =        "Placement of Microservices-based {IoT} Applications in
                 Fog Computing: a Taxonomy and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "321:1--321:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3592598",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3592598",
  abstract =     "The Fog computing paradigm utilises distributed,
                 heterogeneous and resource-constrained devices at the
                 edge of the network for efficient deployment \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "321",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Will:2023:ISG,
  author =       "Newton C. Will and Carlos A. Maziero",
  title =        "{Intel Software Guard Extensions} Applications: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "322:1--322:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3593021",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3593021",
  abstract =     "Data confidentiality is a central concern in modern
                 computer systems and services, as sensitive data from
                 users and companies are being increasingly delegated to
                 such systems. Several hardware-based mechanisms have
                 been recently proposed to enforce security guarantees
                 of sensitive information. Hardware-based isolated
                 execution environments are a class of such mechanisms,
                 in which the operating system and other low-level
                 components are removed from the trusted computing base.
                 One of such mechanisms is the Intel Software Guard
                 Extensions (Intel SGX), which creates the concept of
                 enclave to encapsulate sensitive components of
                 applications and their data. Despite being largely
                 applied in several computing areas, SGX has limitations
                 and performance issues that must be addressed for the
                 development of secure solutions. This text brings a
                 categorized literature review of the ongoing research
                 on the Intel SGX architecture, discussing its
                 applications and providing a classification of the
                 solutions that take advantage of SGX mechanisms. We
                 analyze and categorize 293 papers that rely on SGX to
                 provide integrity, confidentiality, and privacy to
                 users and data, regarding different contexts and goals.
                 We also discuss research challenges and provide future
                 directions in the field of enclaved execution,
                 particularly when using SGX.",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "322",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Pan:2023:DPS,
  author =       "Bofeng Pan and Natalia Stakhanova and Suprio Ray",
  title =        "Data Provenance in Security and Privacy",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "323:1--323:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3593294",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3593294",
  abstract =     "Provenance information corresponds to essential
                 metadata that describes the entities, users, and
                 processes involved in the history and evolution of a
                 data \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "323",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Oliynyk:2023:KWY,
  author =       "Daryna Oliynyk and Rudolf Mayer and Andreas Rauber",
  title =        "{I} Know What You Trained Last Summer: a Survey on
                 Stealing Machine Learning Models and Defences",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "324:1--324:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3595292",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3595292",
  abstract =     "Machine-Learning-as-a-Service (MLaaS) has become a
                 widespread paradigm, making even the most complex
                 Machine Learning models available for clients via,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "324",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zoni:2023:SRT,
  author =       "Davide Zoni and Andrea Galimberti and William
                 Fornaciari",
  title =        "A Survey on Run-time Power Monitors at the Edge",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "325:1--325:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3593044",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3593044",
  abstract =     "Effectively managing energy and power consumption is
                 crucial to the success of the design of any computing
                 system, helping mitigate the efficiency obstacles
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "325",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ivanov:2023:STM,
  author =       "Nikolay Ivanov and Chenning Li and Qiben Yan and
                 Zhiyuan Sun and Zhichao Cao and Xiapu Luo",
  title =        "Security Threat Mitigation for Smart Contracts: a
                 Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "326:1--326:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3593293",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3593293",
  abstract =     "The blockchain technology, initially created for
                 cryptocurrency, has been re-purposed for recording
                 state transitions of smart contracts-decentralized
                 applications that \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "326",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Goknil:2023:SRD,
  author =       "Arda Goknil and Phu Nguyen and Sagar Sen and Dimitra
                 Politaki and Harris Niavis and Karl John Pedersen and
                 Abdillah Suyuthi and Abhilash Anand and Amina
                 Ziegenbein",
  title =        "A Systematic Review of Data Quality in {CPS} and {IoT}
                 for {Industry 4.0}",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "327:1--327:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3593043",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3593043",
  abstract =     "The Internet of Things (IoT) and Cyber-Physical
                 Systems (CPS) are the backbones of Industry 4.0, where
                 data quality is crucial for decision support. Data
                 quality in \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "327",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Han:2023:IAE,
  author =       "Sicong Han and Chenhao Lin and Chao Shen and Qian Wang
                 and Xiaohong Guan",
  title =        "Interpreting Adversarial Examples in Deep Learning: a
                 Review",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "328:1--328:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3594869",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3594869",
  abstract =     "Deep learning technology is increasingly being applied
                 in safety-critical scenarios but has recently been
                 found to be susceptible to imperceptible adversarial
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "328",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2023:SOW,
  author =       "Xiao Zhang and Griffin Klevering and Xinyu Lei and
                 Yiwen Hu and Li Xiao and Guan-Hua Tu",
  title =        "The Security in Optical Wireless Communication: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "55",
  number =       "14s",
  pages =        "329:1--329:??",
  month =        dec,
  year =         "2023",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3594718",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 19 06:57:00 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3594718",
  abstract =     "With the demand for economical and high-speed wireless
                 services, Optical Wireless Communication (OWC) has
                 attracted increasing attention in both \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "Comp. Surv.",
  articleno =    "329",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Klaiber:2024:DLV,
  author =       "Janice Klaiber and Clemens {Van Dinther}",
  title =        "Deep Learning for Variable Renewable Energy: a
                 Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "1:1--1:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3586006",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3586006",
  abstract =     "In recent years, both fields, AI and VRE, have
                 received increasing attention in scientific research.
                 Thus, this article's purpose is to investigate the
                 potential of \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "1",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Coullon:2024:CBD,
  author =       "H{\'e}l{\'e}ne Coullon and Ludovic Henrio and
                 Fr{\'e}d{\'e}ric Loulergue and Simon Robillard",
  title =        "Component-based Distributed Software Reconfiguration:
                 a Verification-oriented Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "2:1--2:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3595376",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3595376",
  abstract =     "Distributed software built from components has become
                 a mainstay of service-oriented applications, which
                 frequently undergo reconfigurations to adapt to
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "2",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Amanullah:2024:TAM,
  author =       "Mohamed Ahzam Amanullah and Seng W. Loke and Mohan
                 Baruwal Chhetri and Robin Doss",
  title =        "A Taxonomy and Analysis of Misbehaviour Detection in
                 Cooperative Intelligent Transport Systems: a Systematic
                 Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "3:1--3:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3596598",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3596598",
  abstract =     "Cooperative Intelligent Transport Systems (C-ITS) is
                 one of the proposed solutions to improve the safety and
                 efficiency of road transport. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "3",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Houy:2024:SAC,
  author =       "Sabine Houy and Philipp Schmid and Alexandre Bartel",
  title =        "Security Aspects of Cryptocurrency Wallets --- a
                 Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "4:1--4:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3596906",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3596906",
  abstract =     "Cryptocurrencies are gaining prominence among
                 individuals and companies alike, resulting in the
                 growing adoption of so-called cryptocurrency wallet
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "4",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Roy:2024:RQF,
  author =       "Prasenjeet Roy and Suman Kundu",
  title =        "Review on Query-focused Multi-document Summarization
                 {(QMDS)} with Comparative Analysis",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "5:1--5:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3597299",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3597299",
  abstract =     "The problem of query-focused multi-document
                 summarization (QMDS) is to generate a summary from
                 multiple source documents on identical/similar
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "5",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Vatter:2024:EDS,
  author =       "Jana Vatter and Ruben Mayer and Hans-Arno Jacobsen",
  title =        "The Evolution of Distributed Systems for Graph Neural
                 Networks and Their Origin in Graph Processing and Deep
                 Learning: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "6:1--6:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3597428",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3597428",
  abstract =     "Graph neural networks (GNNs) are an emerging research
                 field. This specialized deep neural network
                 architecture is capable of processing graph structured
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ji:2024:SDL,
  author =       "Shulei Ji and Xinyu Yang and Jing Luo",
  title =        "A Survey on Deep Learning for Symbolic Music
                 Generation: Representations, Algorithms, Evaluations,
                 and Challenges",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "7:1--7:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3597493",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3597493",
  abstract =     "Significant progress has been made in symbolic music
                 generation with the help of deep learning techniques.
                 However, the tasks covered by symbolic music \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "7",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Brcic:2024:IRA,
  author =       "Mario Brcic and Roman V. Yampolskiy",
  title =        "Impossibility Results in {AI}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "8:1--8:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3603371",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3603371",
  abstract =     "An impossibility theorem demonstrates that a
                 particular problem or set of problems cannot be solved
                 as described in the claim. Such theorems put limits on
                 what \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "8",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xu:2024:MUS,
  author =       "Heng Xu and Tianqing Zhu and Lefeng Zhang and Wanlei
                 Zhou and Philip S. Yu",
  title =        "Machine Unlearning: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "9:1--9:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3603620",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3603620",
  abstract =     "Machine learning has attracted widespread attention
                 and evolved into an enabling technology for a wide
                 range of highly successful applications, such as
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "9",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zolfaghari:2024:SBL,
  author =       "Samaneh Zolfaghari and Sumaiya Suravee and Daniele
                 Riboni and Kristina Yordanova",
  title =        "Sensor-Based Locomotion Data Mining for Supporting the
                 Diagnosis of Neurodegenerative Disorders: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "10:1--10:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3603495",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3603495",
  abstract =     "Locomotion characteristics and movement patterns are
                 reliable indicators of neurodegenerative diseases
                 (NDDs). This survey provides a systematic \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "10",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zheng:2024:DLB,
  author =       "Ce Zheng and Wenhan Wu and Chen Chen and Taojiannan
                 Yang and Sijie Zhu and Ju Shen and Nasser Kehtarnavaz
                 and Mubarak Shah",
  title =        "Deep Learning-based Human Pose Estimation: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "11:1--11:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3603618",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3603618",
  abstract =     "Human pose estimation aims to locate the human body
                 parts and build human body representation (e.g., body
                 skeleton) from input data such as images and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "11",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hossain:2024:NLB,
  author =       "Bayzid Ashik Hossain and Md. Saddam Hossain Mukta and
                 Md Adnanul Islam and Akib Zaman and Rolf Schwitter",
  title =        "Natural Language-Based Conceptual Modelling
                 Frameworks: State of the Art and Future Opportunities",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "12:1--12:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3596597",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3596597",
  abstract =     "Identifying requirements for an information system is
                 an important task and conceptual modelling is the first
                 step in this process. Conceptual modelling plays a
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ning:2024:MEC,
  author =       "Zhaolong Ning and Hao Hu and Xiaojie Wang and Lei Guo
                 and Song Guo and Guoyin Wang and Xinbo Gao",
  title =        "Mobile Edge Computing and Machine Learning in the
                 {Internet of Unmanned Aerial Vehicles}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "13:1--13:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3604933",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3604933",
  abstract =     "Unmanned Aerial Vehicles (UAVs) play an important role
                 in the Internet of Things and form the paradigm of the
                 Internet of UAVs, due to their characteristics of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lien:2024:COB,
  author =       "Chi-Wei Lien and Sudip Vhaduri",
  title =        "Challenges and Opportunities of Biometric User
                 Authentication in the Age of {IoT}: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "14:1--14:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3603705",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3603705",
  abstract =     "While the Internet of Things (IoT) devices, such as
                 smartwatches, provide a range of services from managing
                 financial transactions to monitoring smart \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "14",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2024:SQC,
  author =       "Yaochen Liu and Qiuchi Li and Benyou Wang and Yazhou
                 Zhang and Dawei Song",
  title =        "A Survey of Quantum-cognitively Inspired Sentiment
                 Analysis Models",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "15:1--15:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3604550",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3604550",
  abstract =     "Quantum theory, originally proposed as a physical
                 theory to describe the motions of microscopic
                 particles, has been applied to various non-physics
                 domains \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "15",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Margara:2024:MSD,
  author =       "Alessandro Margara and Gianpaolo Cugola and Nicol{\`o}
                 Felicioni and Stefano Cilloni",
  title =        "A Model and Survey of Distributed Data-Intensive
                 Systems",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "16:1--16:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3604801",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3604801",
  abstract =     "Data is a precious resource in today's society, and it
                 is generated at an unprecedented and constantly growing
                 pace. The need to store, analyze, and make data
                 promptly \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "16",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zabihi:2024:RLM,
  author =       "Zeinab Zabihi and Amir Masoud Eftekhari Moghadam and
                 Mohammad Hossein Rezvani",
  title =        "Reinforcement Learning Methods for Computation
                 Offloading: a Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "17:1--17:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3603703",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3603703",
  abstract =     "Today, cloud computation offloading may not be an
                 appropriate solution for delay-sensitive applications
                 due to the long distance between end-devices and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "17",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Parizotto:2024:OML,
  author =       "Ricardo Parizotto and Bruno Loureiro Coelho and Diego
                 Cardoso Nunes and Israat Haque and Alberto
                 Schaeffer-Filho",
  title =        "Offloading Machine Learning to Programmable Data
                 Planes: a Systematic Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "18:1--18:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3605153",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3605153",
  abstract =     "The demand for machine learning (ML) has increased
                 significantly in recent decades, enabling several
                 applications, such as speech recognition, computer
                 vision, and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fu:2024:DLM,
  author =       "Zhe Fu and Xi Niu and Mary Lou Maher",
  title =        "Deep Learning Models for Serendipity Recommendations:
                 a Survey and New Perspectives",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "19:1--19:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3605145",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3605145",
  abstract =     "Serendipitous recommendations have emerged as a
                 compelling approach to deliver users with unexpected
                 yet valuable information, contributing to \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xu:2024:SDO,
  author =       "Rui Xu and Sheng Ma and Yang Guo and Dongsheng Li",
  title =        "A Survey of Design and Optimization for Systolic
                 Array-based {DNN} Accelerators",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "20:1--20:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3604802",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3604802",
  abstract =     "In recent years, it has been witnessed that the
                 systolic array is a successful architecture for DNN
                 hardware accelerators. However, the design of systolic
                 arrays also \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xiao:2024:SAP,
  author =       "Guoqing Xiao and Chuanghui Yin and Tao Zhou and Xueqi
                 Li and Yuedan Chen and Kenli Li",
  title =        "A Survey of Accelerating Parallel Sparse Linear
                 Algebra",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "21:1--21:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3604606",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3604606",
  abstract =     "Sparse linear algebra includes the fundamental and
                 important operations in various large-scale scientific
                 computing and real-world applications. There \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "21",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Donoso:2024:SSP,
  author =       "Diego Donoso and Jose M. Saavedra",
  title =        "Survey on Sketch-to-photo Translation",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "22:1--22:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3606694",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3606694",
  abstract =     "Sketch-based understanding is involved in human
                 communication and cognitive development, making it
                 essential in visual perception. A specific task in this
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "22",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Shen:2024:SNG,
  author =       "Zhishu Shen and Jiong Jin and Cheng Tan and Atsushi
                 Tagami and Shangguang Wang and Qing Li and Qiushi Zheng
                 and Jingling Yuan",
  title =        "A Survey of Next-generation Computing Technologies in
                 Space-air-ground Integrated Networks",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "23:1--23:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3606018",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3606018",
  abstract =     "Space-air-ground integrated networks (SAGINs) are key
                 elements for facilitating high-speed seamless
                 connectivity to the devices/users in \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "23",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Antelmi:2024:SHR,
  author =       "Alessia Antelmi and Gennaro Cordasco and Mirko Polato
                 and Vittorio Scarano and Carmine Spagnuolo and Dingqi
                 Yang",
  title =        "A Survey on Hypergraph Representation Learning",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "24:1--24:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3605776",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3605776",
  abstract =     "Hypergraphs have attracted increasing attention in
                 recent years thanks to their flexibility in naturally
                 modeling a broad range of systems where \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kim:2024:BCS,
  author =       "Kisub Kim and Sankalp Ghatpande and Dongsun Kim and
                 Xin Zhou and Kui Liu and Tegawend{\'e} F. Bissyand{\'e}
                 and Jacques Klein and Yves {Le Traon}",
  title =        "{Big Code} Search: a Bibliography",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "1",
  pages =        "25:1--25:??",
  month =        jan,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3604905",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Sep 26 11:09:40 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3604905",
  abstract =     "Code search is an essential task in software
                 development. Developers often search the internet and
                 other code databases for necessary source code snippets
                 to \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Badshah:2024:TSE,
  author =       "Afzal Badshah and Anwar Ghani and Ali Daud and Ateeqa
                 Jalal and Muhammad Bilal and Jon Crowcroft",
  title =        "Towards Smart Education through {Internet of Things}:
                 a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "26:1--26:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3610401",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3610401",
  abstract =     "IoT is a fundamental enabling technology for creating
                 smart spaces, which can assist the effective
                 face-to-face and online education systems. The
                 transition to smart \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "26",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ehrmann:2024:NER,
  author =       "Maud Ehrmann and Ahmed Hamdi and Elvys Linhares Pontes
                 and Matteo Romanello and Antoine Doucet",
  title =        "Named Entity Recognition and Classification in
                 Historical Documents: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "27:1--27:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3604931",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3604931",
  abstract =     "After decades of massive digitisation, an
                 unprecedented number of historical documents are
                 available in digital format, along with their
                 machine-readable \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Brohet:2024:STM,
  author =       "Marco Brohet and Francesco Regazzoni",
  title =        "A Survey on Thwarting Memory Corruption in {RISC-V}",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "28:1--28:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3604906",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/risc-v.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3604906",
  abstract =     "With embedded devices becoming more pervasive and
                 entrenched in society, it is paramount to keep these
                 systems secure. A threat plaguing these systems
                 consists of software vulnerabilities that cause memory
                 corruption, potentially allowing an attacker to breach
                 the device. Software-based countermeasures exist, but
                 suffer from high overhead. In this survey, we
                 investigate whether this could be mitigated using
                 dedicated hardware. Driven by the advancements of open
                 hardware, we focus on implementations for RISC-V, a
                 novel and open architecture tailored for customization.
                 We distinguish between methods validating memory
                 accesses beforehand, obfuscating information necessary
                 for an attack, and detecting memory values corrupted
                 earlier. We compare on qualitative metrics, such as the
                 security coverage and level of transparency, and
                 performance in both software and hardware. Although
                 current implementations do not easily allow for a fair
                 comparison as their evaluation methodologies vary
                 widely, we show that current implementations are
                 suitable to minimize the runtime overhead with a
                 relatively small area overhead. Nevertheless, we
                 identified that further research is still required to
                 mitigate more fine-grained attacks such as intra-object
                 overflows, to integrate into more sophisticated
                 protected execution environments towards resilient
                 systems that are automatically recoverable, and to move
                 towards more harmonized evaluation.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Alaei:2024:DIQ,
  author =       "Alireza Alaei and Vinh Bui and David Doermann and
                 Umapada Pal",
  title =        "Document Image Quality Assessment: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "29:1--29:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3606692",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3606692",
  abstract =     "The rapid emergence of new portable capturing
                 technologies has significantly increased the number and
                 diversity of document images acquired for \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Min:2024:RAN,
  author =       "Bonan Min and Hayley Ross and Elior Sulem and Amir
                 Pouran {Ben Veyseh} and Thien Huu Nguyen and Oscar
                 Sainz and Eneko Agirre and Ilana Heintz and Dan Roth",
  title =        "Recent Advances in Natural Language Processing via
                 Large Pre-trained Language Models: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "30:1--30:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3605943",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3605943",
  abstract =     "Large, pre-trained language models (PLMs) such as BERT
                 and GPT have drastically changed the Natural Language
                 Processing (NLP) field. For numerous NLP \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "30",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Besta:2024:DGD,
  author =       "Maciej Besta and Robert Gerstenberger and Emanuel
                 Peter and Marc Fischer and Micha{\l} Podstawski and
                 Claude Barthels and Gustavo Alonso and Torsten
                 Hoefler",
  title =        "Demystifying Graph Databases: Analysis and Taxonomy of
                 Data Organization, System Designs, and Graph Queries",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "31:1--31:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3604932",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3604932",
  abstract =     "Numerous irregular graph datasets, for example social
                 networks or web graphs, may contain even trillions of
                 edges. Often, their structure changes over time and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "31",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Pennekamp:2024:ISI,
  author =       "Jan Pennekamp and Roman Matzutt and Christopher
                 Klinkm{\"u}ller and Lennart Bader and Martin Serror and
                 Eric Wagner and Sidra Malik and Maria Spi{\ss} and
                 Jessica Rahn and Tan G{\"u}rpinar and Eduard Vlad and
                 Sander J. J. Leemans and Salil S. Kanhere and Volker
                 Stich and Klaus Wehrle",
  title =        "An Interdisciplinary Survey on Information Flows in
                 Supply Chains",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "32:1--32:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3606693",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3606693",
  abstract =     "Supply chains form the backbone of modern economies
                 and therefore require reliable information flows. In
                 practice, however, supply chains face severe technical
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "32",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fujihashi:2024:SDS,
  author =       "Takuya Fujihashi and Toshiaki Koike-Akino and Takashi
                 Watanabe",
  title =        "Soft Delivery: Survey on a New Paradigm for Wireless
                 and Mobile Multimedia Streaming",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "33:1--33:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3607139",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3607139",
  abstract =     "The increasing demand for video streaming services is
                 the key driver of modern wireless and mobile
                 communications. Although many studies have designed
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "33",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lei:2024:EER,
  author =       "Yaxiong Lei and Shijing He and Mohamed Khamis and Juan
                 Ye",
  title =        "An End-to-End Review of Gaze Estimation and its
                 Interactive Applications on Handheld Mobile Devices",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "34:1--34:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3606947",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3606947",
  abstract =     "In recent years, we have witnessed an increasing
                 number of interactive systems on handheld mobile
                 devices which utilise gaze as a single or complementary
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "34",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Destras:2024:SAF,
  author =       "Oceane Destras and S{\'e}bastien {Le Beux} and Felipe
                 {Gohring De Magalh{\~a}es} and Gabriela Nicolescu",
  title =        "Survey on Activation Functions for Optical Neural
                 Networks",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "35:1--35:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3607533",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3607533",
  abstract =     "Integrated photonics arises as a fast and
                 energy-efficient technology for the implementation of
                 artificial neural networks (ANNs). Indeed, with the
                 growing \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "35",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Deldar:2024:DLZ,
  author =       "Fatemeh Deldar and Mahdi Abadi",
  title =        "Deep Learning for Zero-day Malware Detection and
                 Classification: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "36:1--36:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3605775",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3605775",
  abstract =     "Zero-day malware is malware that has never been seen
                 before or is so new that no anti-malware software can
                 catch it. This novelty and the lack of existing
                 mitigation \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "36",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mehrpour:2024:STS,
  author =       "Sahar Mehrpour and Thomas D. Latoza",
  title =        "A Survey of Tool Support for Working with Design
                 Decisions in Code",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "37:1--37:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3607868",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3607868",
  abstract =     "Whenever developers choose among alternative technical
                 approaches, they make a design decision. Collectively,
                 design decisions shape how software \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "37",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Roy:2024:TUP,
  author =       "Satyaki Roy and Nirnay Ghosh and Nitish Uplavikar and
                 Preetam Ghosh",
  title =        "Towards a Unified Pandemic Management Architecture:
                 Survey, Challenges, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "38:1--38:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3609324",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3609324",
  abstract =     "The pandemic caused by Severe Acute Respiratory
                 Syndrome Coronavirus 2 (SARS-CoV-2) has impacted the
                 economy, health, and society. Emerging strains are
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "38",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2024:PFF,
  author =       "Huiqiang Chen and Tianqing Zhu and Tao Zhang and
                 Wanlei Zhou and Philip S. Yu",
  title =        "Privacy and Fairness in Federated Learning: On the
                 Perspective of Tradeoff",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "39:1--39:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3606017",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3606017",
  abstract =     "Federated learning (FL) has been a hot topic in recent
                 years. Ever since it was introduced, researchers have
                 endeavored to devise FL systems that protect privacy or
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Amira:2024:SMA,
  author =       "Abdelouahab Amira and Abdelouahid Derhab and Elmouatez
                 Billah Karbab and Omar Nouali",
  title =        "A Survey of Malware Analysis Using Community Detection
                 Algorithms",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "40:1--40:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3610223",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3610223",
  abstract =     "In recent years, we have witnessed an overwhelming and
                 fast proliferation of different types of malware
                 targeting organizations and individuals, \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2024:SED,
  author =       "Nan Li and Lianbo Ma and Guo Yu and Bing Xue and
                 Mengjie Zhang and Yaochu Jin",
  title =        "Survey on Evolutionary Deep Learning: Principles,
                 Algorithms, Applications, and Open Issues",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "41:1--41:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3603704",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3603704",
  abstract =     "Over recent years, there has been a rapid development
                 of deep learning (DL) in both industry and academia
                 fields. However, finding the optimal \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ghasempouri:2024:SAA,
  author =       "Tara Ghasempouri and Jaan Raik and Cezar Reinbrecht
                 and Said Hamdioui and Mottaqiallah Taouil",
  title =        "Survey on Architectural Attacks: a Unified
                 Classification and Attack Model",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "42:1--42:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3604803",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3604803",
  abstract =     "According to the World Economic Forum, cyberattacks
                 are considered as one of the most important sources of
                 risk to companies and institutions worldwide.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "42",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Barrios:2024:SCC,
  author =       "Carlos Barrios and Mohan Kumar",
  title =        "Service Caching and Computation Reuse Strategies at
                 the Edge: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "43:1--43:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3609504",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3609504",
  abstract =     "With the proliferation of connected devices including
                 smartphones, novel network connectivity and management
                 methods are needed to meet user Quality of \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "43",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xu:2024:KGB,
  author =       "Rongxin Xu and Qiujun Lan and Shiva Raj Pokhrel and
                 Gang Li",
  title =        "A Knowledge Graph-Based Survey on Distributed Ledger
                 Technology for {IoT} Verticals",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "44:1--44:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3609503",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3609503",
  abstract =     "The Internet of Things (IoT) and distributed ledger
                 technology (DLT) have significantly changed our daily
                 lives. Due to their distributed operational \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "44",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yamout:2024:BSH,
  author =       "Youssef Yamout and Tashaffi Samin Yeasar and Shahrear
                 Iqbal and Mohammad Zulkernine",
  title =        "Beyond Smart Homes: an In-Depth Analysis of Smart
                 Aging Care System Security",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "45:1--45:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3610225",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3610225",
  abstract =     "The upward trend in the percentage of the population
                 older than 65 has made smart aging more relevant than
                 ever before. Growing old in a traditional \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "45",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bez:2024:APH,
  author =       "Jean Luca Bez and Suren Byna and Shadi Ibrahim",
  title =        "{I/O} Access Patterns in {HPC} Applications: a $
                 360$-Degree Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "46:1--46:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3611007",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3611007",
  abstract =     "The high-performance computing I/O stack has been
                 complex due to multiple software layers, the
                 inter-dependencies among these layers, and the
                 different \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "46",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Buchner:2024:BII,
  author =       "Stefan Buchner and Dirk Riehle",
  title =        "The Business Impact of Inner Source and How to
                 Quantify It",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "47:1--47:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3611648",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3611648",
  abstract =     "Inner source software development is the practice of
                 using open source practices for firm-internal software
                 development. Practitioner reports have shown \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "47",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Amini:2024:WCD,
  author =       "Maryam Amini and Razvan Stanica and Catherine
                 Rosenberg",
  title =        "Where Are the (Cellular) Data?",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "48:1--48:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3610402",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3610402",
  abstract =     "New generations of cellular networks are data
                 oriented, targeting the integration of machine learning
                 and artificial intelligence solutions. Data
                 availability, \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "48",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Debie:2024:SRS,
  author =       "Essam Debie and Kathryn Kasmarik and Matt Garratt",
  title =        "Swarm Robotics: a Survey from a Multi-Tasking
                 Perspective",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "49:1--49:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3611652",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3611652",
  abstract =     "The behaviour of social insects such as bees and ants
                 has influenced the development of swarm robots. To
                 enable robots to cooperate together, swarm robotics
                 employs \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "49",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sun:2024:CSC,
  author =       "Danfeng Sun and Junjie Hu and Huifeng Wu and Jia Wu
                 and Jian Yang and Quan Z. Sheng and Schahram Dustdar",
  title =        "A Comprehensive Survey on Collaborative Data-access
                 Enablers in the {IIoT}",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "50:1--50:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3612918",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3612918",
  abstract =     "The scope of the Industrial Internet of Things (IIoT)
                 has stretched beyond manufacturing to include energy,
                 healthcare, transportation, and all that \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "50",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ameur:2024:SAH,
  author =       "Asma Ameur and Sana Hamdi and Sadok {Ben Yahia}",
  title =        "Sentiment Analysis for Hotel Reviews: a Systematic
                 Literature Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "51:1--51:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3605152",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3605152",
  abstract =     "Sentiment Analysis (SA) helps to automatically and
                 meaningfully discover hotel customers' satisfaction
                 from their shared experiences and feelings on
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "51",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Smith:2024:BRL,
  author =       "Benjamin Smith and Anahita Khojandi and Rama
                 Vasudevan",
  title =        "Bias in Reinforcement Learning: a Review in Healthcare
                 Applications",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "52:1--52:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3609502",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3609502",
  abstract =     "Reinforcement learning (RL) can assist in medical
                 decision making using patient data collected in
                 electronic health record (EHR) systems. RL, a type of
                 machine \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "52",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Schuerkamp:2024:EFC,
  author =       "Ryan Schuerkamp and Philippe J. Giabbanelli",
  title =        "Extensions of Fuzzy Cognitive Maps: a Systematic
                 Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "2",
  pages =        "53:1--53:??",
  month =        feb,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3610771",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Wed Oct 4 09:27:39 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3610771",
  abstract =     "Fuzzy Cognitive Maps (FCMs) are widely used to
                 simulate complex systems. However, they cannot handle
                 nonlinear relationships or time delays/lags, nor can
                 they \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Guo:2024:FRT,
  author =       "Yulan Guo and Hanyun Wang and Longguang Wang and
                 Yinjie Lei and Li Liu and Mohammed Bennamoun",
  title =        "{$3$D} Face Recognition: Two Decades of Progress and
                 Prospects",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "54:1--54:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3615863",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3615863",
  abstract =     "Three-dimensional (3D) face recognition has been
                 extensively investigated in the last two decades due to
                 its wide range of applications in many areas, such as
                 security \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "54",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2024:PTL,
  author =       "Benyou Wang and Qianqian Xie and Jiahuan Pei and
                 Zhihong Chen and Prayag Tiwari and Zhao Li and Jie Fu",
  title =        "Pre-trained Language Models in Biomedical Domain: a
                 Systematic Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "55:1--55:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3611651",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3611651",
  abstract =     "Pre-trained language models (PLMs) have been the de
                 facto paradigm for most natural language processing
                 tasks. This also benefits the biomedical domain:
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "55",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{He:2024:TLM,
  author =       "Tianzhang He and Rajkumar Buyya",
  title =        "A Taxonomy of Live Migration Management in Cloud
                 Computing",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "56:1--56:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3615353",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3615353",
  abstract =     "Cloud Data Centers have become the key infrastructure
                 for providing services. Instance migration across
                 different computing nodes in edge and cloud computing
                 is \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "56",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bringhenti:2024:ANS,
  author =       "Daniele Bringhenti and Guido Marchetto and Riccardo
                 Sisto and Fulvio Valenza",
  title =        "Automation for Network Security Configuration: State
                 of the Art and Research Trends",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "57:1--57:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3616401",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3616401",
  abstract =     "The size and complexity of modern computer networks
                 are progressively increasing, as a consequence of novel
                 architectural paradigms such as \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "57",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Amalfitano:2024:AIA,
  author =       "Domenico Amalfitano and Stefano Faralli and Jean Carlo
                 Rossa Hauck and Santiago Matalonga and Damiano
                 Distante",
  title =        "Artificial Intelligence Applied to Software Testing: a
                 Tertiary Study",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "58:1--58:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3616372",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3616372",
  abstract =     "Context: Artificial intelligence (AI) methods and
                 models have extensively been applied to support
                 different phases of the software development lifecycle,
                 including \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "58",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Queiroz:2024:CBV,
  author =       "Rui Queiroz and Tiago Cruz and J{\'e}r{\^o}me Mendes
                 and Pedro Sousa and Paulo Sim{\~o}es",
  title =        "Container-based Virtualization for Real-time
                 Industrial Systems --- a Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "59:1--59:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3617591",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3617591",
  abstract =     "Industrial Automation and Control systems have matured
                 into a stable infrastructure model that has been kept
                 fundamentally unchanged, using discrete \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "59",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Qiu:2024:DLP,
  author =       "Guoying Qiu and Guoming Tang and Chuandong Li and
                 Lailong Luo and Deke Guo and Yulong Shen",
  title =        "Differentiated Location Privacy Protection in Mobile
                 Communication Services: a Survey from the Semantic
                 Perception Perspective",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "60:1--60:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3617589",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3617589",
  abstract =     "Mobile communication services raise user privacy
                 concerns in sharing the traveling trajectories while
                 facilitating people's daily lives. According to these
                 shared \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "60",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Tan:2024:SDS,
  author =       "Kheng Leong Tan and Chi-Hung Chi and Kwok-Yan Lam",
  title =        "Survey on Digital Sovereignty and Identity: From
                 Digitization to Digitalization",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "61:1--61:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3616400",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3616400",
  abstract =     "Through digital transformation, lots of personal data
                 are captured, but individuals often do not have
                 ownership or control over them. This results in the
                 emerging \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "61",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ghandi:2024:DLA,
  author =       "Taraneh Ghandi and Hamidreza Pourreza and Hamidreza
                 Mahyar",
  title =        "Deep Learning Approaches on Image Captioning: a
                 Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "62:1--62:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3617592",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3617592",
  abstract =     "Image captioning is a research area of immense
                 importance, aiming to generate natural language
                 descriptions for visual content in the form of still
                 images. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "62",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wu:2024:SSK,
  author =       "Haiqin Wu and Boris D{\"u}dder and Liangmin Wang and
                 Zhenfu Cao and Jun Zhou and Xia Feng",
  title =        "Survey on Secure Keyword Search over Outsourced Data:
                 From Cloud to Blockchain-assisted Architecture",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "63:1--63:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3617824",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3617824",
  abstract =     "Secure keyword search is a prevailing search service
                 offered in outsourced environments. However, with the
                 increasingly severe security vulnerabilities of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "63",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2024:SCT,
  author =       "Hanqing Zhang and Haolin Song and Shaoyu Li and Ming
                 Zhou and Dawei Song",
  title =        "A Survey of Controllable Text Generation Using
                 Transformer-based Pre-trained Language Models",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "64:1--64:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3617680",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3617680",
  abstract =     "Controllable Text Generation (CTG) is an emerging area
                 in the field of natural language generation (NLG). It
                 is regarded as crucial for the development of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "64",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Castro:2024:LHP,
  author =       "Oscar Castro and Pierrick Bruneau and
                 Jean-S{\'e}bastien Sottet and Dario Torregrossa",
  title =        "Landscape of High-Performance {Python} to Develop Data
                 Science and Machine Learning Applications",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "65:1--65:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3617588",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3617588",
  abstract =     "Python has become the prime language for application
                 development in the data science and machine learning
                 domains. However, data scientists are not necessarily
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "65",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Meedeniya:2024:SDL,
  author =       "Dulani Meedeniya and Isuru Ariyarathne and Meelan
                 Bandara and Roshinie Jayasundara and Charith Perera",
  title =        "A Survey on Deep Learning Based Forest Environment
                 Sound Classification at the Edge",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "66:1--66:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3618104",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3618104",
  abstract =     "Forest ecosystems are of paramount importance to the
                 sustainable existence of life on earth. Unique natural
                 and artificial phenomena pose severe threats to
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "66",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jia:2024:TAD,
  author =       "Qi Jia and Yizhu Liu and Siyu Ren and Kenny Q. Zhu",
  title =        "Taxonomy of Abstractive Dialogue Summarization:
                 Scenarios, Approaches, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "67:1--67:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3622933",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3622933",
  abstract =     "Abstractive dialogue summarization generates a concise
                 and fluent summary covering the salient information in
                 a dialogue among two or more \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "67",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hamissi:2024:SUA,
  author =       "Asma Hamissi and Amine Dhraief",
  title =        "A Survey on the Unmanned Aircraft System Traffic
                 Management",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "68:1--68:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3617992",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3617992",
  abstract =     "The Unmanned Aircraft System Traffic Management (UTM)
                 system is a set of services offering an automated
                 management of the airspace and thus providing
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "68",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jose-Garcia:2024:MBA,
  author =       "Ad{\'a}n Jos{\'e}-Garc{\'{\i}}a and Julie Jacques and
                 Vincent Sobanski and Clarisse Dhaenens",
  title =        "Metaheuristic Biclustering Algorithms: From
                 State-of-the-art to Future Opportunities",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "69:1--69:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3617590",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3617590",
  abstract =     "Biclustering is an unsupervised machine-learning
                 technique that simultaneously clusters rows and columns
                 in a data matrix. Over the past two decades, the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "69",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gemeinhardt:2024:QCO,
  author =       "Felix Gemeinhardt and Antonio Garmendia and Manuel
                 Wimmer and Benjamin Weder and Frank Leymann",
  title =        "Quantum Combinatorial Optimization in the {NISQ} Era:
                 a Systematic Mapping Study",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "70:1--70:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3620668",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3620668",
  abstract =     "The application of quantum computing to combinatorial
                 optimization problems is attracting increasing research
                 interest, resulting in diverse approaches \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "70",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mallissery:2024:DFM,
  author =       "Sanoop Mallissery and Yu-Sung Wu",
  title =        "Demystify the Fuzzing Methods: a Comprehensive
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "71:1--71:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3623375",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3623375",
  abstract =     "Massive software applications possess complex data
                 structures or parse complex data structures; in such
                 cases, vulnerabilities in the software become
                 inevitable. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "71",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Arora:2024:DHC,
  author =       "Arnav Arora and Preslav Nakov and Momchil Hardalov and
                 Sheikh Muhammad Sarwar and Vibha Nayak and Yoan Dinkov
                 and Dimitrina Zlatkova and Kyle Dent and Ameya
                 Bhatawdekar and Guillaume Bouchard and Isabelle
                 Augenstein",
  title =        "Detecting Harmful Content on Online Platforms: What
                 Platforms Need vs. Where Research Efforts Go",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "72:1--72:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3603399",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3603399",
  abstract =     "The proliferation of harmful content on online
                 platforms is a major societal problem, which comes in
                 many different forms, including hate speech, offensive
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "72",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Christen:2024:RMH,
  author =       "Peter Christen and David J. Hand and Nishadi
                 Kirielle",
  title =        "A Review of the {$F$}-Measure: Its History,
                 Properties, Criticism, and Alternatives",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "73:1--73:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3606367",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3606367",
  abstract =     "Methods to classify objects into two or more classes
                 are at the core of various disciplines. When a set of
                 objects with their true classes is available, a
                 supervised classifier \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "73",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fiolhais:2024:TEA,
  author =       "Lu{\'\i}s Fiolhais and Leonel Sousa",
  title =        "Transient-Execution Attacks: a Computer Architect
                 Perspective",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "74:1--74:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3603619",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3603619",
  abstract =     "Computer architects employ a series of performance
                 optimizations at the micro-architecture level. These
                 optimizations are meant to be invisible to the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "74",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Scotti:2024:PSM,
  author =       "Vincenzo Scotti and Licia Sbattella and Roberto
                 Tedesco",
  title =        "A Primer on {Seq2Seq} Models for Generative Chatbots",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "75:1--75:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3604281",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3604281",
  abstract =     "The recent spread of Deep Learning-based solutions for
                 Artificial Intelligence and the development of Large
                 Language Models has pushed forwards significantly the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "75",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Unsal:2024:ITA,
  author =       "Ayse {\"U}nsal and Melek {\"O}nen",
  title =        "Information-Theoretic Approaches to Differential
                 Privacy",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "76:1--76:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3604904",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3604904",
  abstract =     "This tutorial studies relations between differential
                 privacy and various information-theoretic measures by
                 using several selective articles. In particular, we
                 present \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "76",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{LaCava:2024:FRR,
  author =       "Simone Maurizio {La Cava} and Giulia Orr{\`u} and
                 Martin Drahansky and Gian Luca Marcialis and Fabio
                 Roli",
  title =        "{$3$D} Face Reconstruction: The Road to Forensics",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "77:1--77:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3625288",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3625288",
  abstract =     "3D face reconstruction algorithms from images and
                 videos are applied to many fields, from plastic surgery
                 to the entertainment sector, thanks to \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "77",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xia:2024:SUE,
  author =       "Xiaoyu Xia and Sheik Mohammad Mostakim Fattah and
                 Muhammad Ali Babar",
  title =        "A Survey on {UAV}-Enabled Edge Computing: Resource
                 Management Perspective",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "78:1--78:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626566",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626566",
  abstract =     "Edge computing facilitates low-latency services at the
                 network's edge by distributing computation,
                 communication, and storage resources within the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "78",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ye:2024:HFL,
  author =       "Mang Ye and Xiuwen Fang and Bo Du and Pong C. Yuen and
                 Dacheng Tao",
  title =        "Heterogeneous Federated Learning: State-of-the-art and
                 Research Challenges",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "79:1--79:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3625558",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3625558",
  abstract =     "Federated learning (FL) has drawn increasing attention
                 owing to its potential use in large-scale industrial
                 applications. Existing FL works mainly focus on model
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "79",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xie:2024:CMN,
  author =       "Guoyang Xie and Yawen Huang and Jinbao Wang and Jiayi
                 Lyu and Feng Zheng and Yefeng Zheng and Yaochu Jin",
  title =        "Cross-modality Neuroimage Synthesis: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "3",
  pages =        "80:1--80:??",
  month =        mar,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3625227",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Nov 3 15:05:35 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3625227",
  abstract =     "Multi-modality imaging improves disease diagnosis and
                 reveals distinct deviations in tissues with anatomical
                 properties. The existence of completely aligned
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "80",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Davis:2024:BAC,
  author =       "Ernest Davis",
  title =        "Benchmarks for Automated Commonsense Reasoning: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "81:1--81:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3615355",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3615355",
  abstract =     "More than one hundred benchmarks have been developed
                 to test the commonsense knowledge and commonsense
                 reasoning abilities of artificial intelligence
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "81",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hoffmann:2024:TID,
  author =       "Marcel Andr{\'e} Hoffmann and Rainer Lasch",
  title =        "Tackling Industrial Downtimes with Artificial
                 Intelligence in Data-Driven Maintenance",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "82:1--82:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3623378",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3623378",
  abstract =     "The application of Artificial Intelligence (AI)
                 approaches in industrial maintenance for fault
                 detection and prediction has gained much attention from
                 scholars and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "82",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Auda:2024:SSC,
  author =       "Jonas Auda and Uwe Gruenefeld and Sarah Faltaous and
                 Sven Mayer and Stefan Schneegass",
  title =        "A Scoping Survey on Cross-reality Systems",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "83:1--83:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3616536",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3616536",
  abstract =     "Immersive technologies such as Virtual Reality (VR)
                 and Augmented Reality (AR) empower users to experience
                 digital realities. Known as distinct technology
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "83",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Diaz-de-Arcaya:2024:JSC,
  author =       "Josu Diaz-de-Arcaya and Ana I. Torre-Bastida and Gorka
                 Z{\'a}rate and Ra{\'u}l Mi{\~n}{\'o}n and Aitor
                 Almeida",
  title =        "A Joint Study of the Challenges, Opportunities, and
                 Roadmap of {MLOps} and {AIOps}: a Systematic Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "84:1--84:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3625289",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3625289",
  abstract =     "Data science projects represent a greater challenge
                 than software engineering for organizations pursuing
                 their adoption. The diverse stakeholders involved
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "84",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Patricio:2024:EDL,
  author =       "Cristiano Patr{\'\i}cio and Jo{\~a}o C. Neves and
                 Lu{\'\i}s F. Teixeira",
  title =        "Explainable Deep Learning Methods in Medical Image
                 Classification: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "85:1--85:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3625287",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3625287",
  abstract =     "The remarkable success of deep learning has prompted
                 interest in its application to medical imaging
                 diagnosis. Even though state-of-the-art deep learning
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "85",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Sambo:2024:WUS,
  author =       "Damien Wohwe Sambo and Anna F{\"o}rster",
  title =        "Wireless Underground Sensor Networks: a Comprehensive
                 Survey and Tutorial",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "86:1--86:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3625388",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3625388",
  abstract =     "The Internet of Things has developed greatly over the
                 past decade to cater to many diverse applications
                 across almost all fields of life. Many of these
                 applications \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "86",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Deldjoo:2024:RMF,
  author =       "Yashar Deldjoo and Fatemeh Nazary and Arnau Ramisa and
                 Julian McAuley and Giovanni Pellegrini and Alejandro
                 Bellogin and Tommaso {Di Noia}",
  title =        "A Review of Modern Fashion Recommender Systems",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "87:1--87:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3624733",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3624733",
  abstract =     "The textile and apparel industries have grown
                 tremendously over the past few years. Customers no
                 longer have to visit many stores, stand in long queues,
                 or try \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "87",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ibrohim:2024:SAN,
  author =       "Muhammad Okky Ibrohim and Cristina Bosco and Valerio
                 Basile",
  title =        "Sentiment Analysis for the Natural Environment: a
                 Systematic Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "88:1--88:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3604605",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3604605",
  abstract =     "In this systematic review, Kitchenham's framework is
                 used to explore what tasks, techniques, and benchmarks
                 for Sentiment Analysis have been developed for
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "88",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Qin:2024:TLP,
  author =       "Meng Qin and Dit-Yan Yeung",
  title =        "Temporal Link Prediction: a Unified Framework,
                 Taxonomy, and Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "89:1--89:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3625820",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3625820",
  abstract =     "Dynamic graphs serve as a generic abstraction and
                 description of the evolutionary behaviors of various
                 complex systems (e.g., social networks and \ldots{}).",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "89",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xia:2024:SDG,
  author =       "Weihao Xia and Jing-Hao Xue",
  title =        "A Survey on Deep Generative {$3$D}-aware Image
                 Synthesis",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "90:1--90:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626193",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626193",
  abstract =     "Recent years have seen remarkable progress in deep
                 learning powered visual content creation. This includes
                 deep generative 3D-aware image synthesis, which
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "90",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2024:GAN,
  author =       "Chenhan Zhang and Shui Yu and Zhiyi Tian and James J.
                 Q. Yu",
  title =        "Generative Adversarial Networks: a Survey on Attack
                 and Defense Perspective",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "91:1--91:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3615336",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3615336",
  abstract =     "Generative Adversarial Networks (GANs) are a
                 remarkable creation with regard to deep generative
                 models. Thanks to their ability to learn from complex
                 data \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "91",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hu:2024:DMI,
  author =       "Li Hu and Anli Yan and Hongyang Yan and Jin Li and
                 Teng Huang and Yingying Zhang and Changyu Dong and
                 Chunsheng Yang",
  title =        "Defenses to Membership Inference Attacks: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "92:1--92:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3620667",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3620667",
  abstract =     "Machine learning (ML) has gained widespread adoption
                 in a variety of fields, including computer vision and
                 natural language processing. However, ML \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "92",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kapp:2024:GMS,
  author =       "Alexandra Kapp and Julia Hansmeyer and Helena
                 Mihaljevi{\'c}",
  title =        "Generative Models for Synthetic Urban Mobility Data: a
                 Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "93:1--93:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3610224",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3610224",
  abstract =     "Although highly valuable for a variety of
                 applications, urban mobility data are rarely made
                 openly available, as it contains sensitive personal
                 information. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "93",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhong:2024:CSA,
  author =       "Lingfeng Zhong and Jia Wu and Qian Li and Hao Peng and
                 Xindong Wu",
  title =        "A Comprehensive Survey on Automatic Knowledge Graph
                 Construction",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "94:1--94:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3618295",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3618295",
  abstract =     "Automatic knowledge graph construction aims at
                 manufacturing structured human knowledge. To this end,
                 much effort has historically been spent extracting
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "94",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Moas:2024:AQA,
  author =       "Pedro Miguel Mo{\'a}s and Carla Teixeira Lopes",
  title =        "Automatic Quality Assessment of {Wikipedia} Articles
                 --- a Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "95:1--95:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3625286",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3625286",
  abstract =     "Wikipedia is the world's largest online encyclopedia,
                 but maintaining article quality through collaboration
                 is challenging. Wikipedia designed a quality scale,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "95",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Habler:2024:AAS,
  author =       "Edan Habler and Ron Bitton and Asaf Shabtai",
  title =        "Assessing Aircraft Security: a Comprehensive Survey
                 and Methodology for Evaluation",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "96:1--96:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3610772",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3610772",
  abstract =     "The sophistication and complexity of cyber attacks and
                 the variety of targeted platforms have grown in recent
                 years. Adversaries are targeting a wide range of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "96",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Marvasti-Zadeh:2024:EDB,
  author =       "S. Mojtaba Marvasti-Zadeh and Devin Goodsman and
                 Nilanjan Ray and Nadir Erbilgin",
  title =        "Early Detection of Bark Beetle Attack Using Remote
                 Sensing and Machine Learning: a Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "97:1--97:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3625387",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3625387",
  abstract =     "Bark beetle outbreaks can have serious consequences on
                 forest ecosystem processes, biodiversity, forest
                 structure and function, and economies. Thus, accurate
                 and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "97",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{DosAnjos:2024:SCL,
  author =       "Julio C. S. {Dos Anjos} and Kassiano J. Matteussi and
                 Fernanda C. Orlandi and Jorge L. V. Barbosa and Jorge
                 {S{\'a} Silva} and Luiz F. Bittencourt and Cl{\'a}udio
                 F. R. Geyer",
  title =        "A Survey on Collaborative Learning for Intelligent
                 Autonomous Systems",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "98:1--98:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3625544",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3625544",
  abstract =     "This survey examines approaches to promote
                 Collaborative Learning in distributed systems for
                 emergent Intelligent Autonomous Systems (IAS). The
                 study involves \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "98",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Huawei:2024:ESM,
  author =       "Huang Huawei and Zhang Qinnan and Li Taotao and Yang
                 Qinglin and Yin Zhaokang and Wu Junhao and Zehui Xiong
                 and Zhu Jianming and Jiajing Wu and Zibin Zheng",
  title =        "Economic Systems in the Metaverse: Basics, State of
                 the Art, and Challenges",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "99:1--99:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626315",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626315",
  abstract =     "Economic systems play pivotal roles in the metaverse.
                 However, we have not yet found an overview that
                 systematically introduces economic systems for the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "99",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{DeSouzaSantos:2024:DSC,
  author =       "Ronnie {De Souza Santos} and Paul Ralph and Arham
                 Arshad and Klaas-Jan Stol",
  title =        "Distributed Scrum: a Case Meta-analysis",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "100:1--100:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626519",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626519",
  abstract =     "Distributed Scrum adapts the Scrum project management
                 framework for geographically distributed software
                 teams. Experimentally evaluating the effectiveness of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "100",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rigaki:2024:SPA,
  author =       "Maria Rigaki and Sebastian Garcia",
  title =        "A Survey of Privacy Attacks in Machine Learning",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "101:1--101:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3624010",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3624010",
  abstract =     "As machine learning becomes more widely used, the need
                 to study its implications in security and privacy
                 becomes more urgent. Although the body of work in
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "101",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Paton:2024:DDE,
  author =       "Norman W. Paton and Jiaoyan Chen and Zhenyu Wu",
  title =        "Dataset Discovery and Exploration: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "102:1--102:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626521",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626521",
  abstract =     "Data scientists are tasked with obtaining insights
                 from data. However, suitable data is often not
                 immediately at hand, and there may be many potentially
                 relevant \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "102",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Su:2024:SSI,
  author =       "Zhipeng Su and Yixiong Zhang and Jianghong Shi and
                 Xiao-Ping Zhang",
  title =        "A Survey of Single Image Rain Removal Based on Deep
                 Learning",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "103:1--103:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3625818",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3625818",
  abstract =     "The rain removal task is to restore a clean image from
                 the contaminated image by separating the background.
                 Since the rise of deep learning in 2016, the task of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "103",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rahman:2024:DCC,
  author =       "Akond Rahman and Dibyendu Brinto Bose and Farhat Lamia
                 Barsha and Rahul Pandita",
  title =        "Defect Categorization in Compilers: a Multi-vocal
                 Literature Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "104:1--104:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626313",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626313",
  abstract =     "Context: Compilers are the fundamental tools for
                 software development. Thus, compiler defects can
                 disrupt development productivity and propagate errors
                 into developer-written software source code.
                 Categorizing defects in compilers can inform
                 practitioners and researchers about the existing
                 defects in compilers and techniques that can be used to
                 identify defects systematically.\par

                 Objective: The goal of this paper is to help
                 researchers understand the nature of defects in
                 compilers by conducting a review of Internet artifacts
                 and peer-reviewed publications that study defect
                 characteristics of compilers.\par

                 Methodology: We conduct a multi-vocal literature review
                 (MLR) with 26 publications and 32 Internet artifacts to
                 characterize compiler defects.\par

                 Results: From our MLR, we identify 13 categories of
                 defects, amongst which optimization defects have been
                 the most reported defects in our artifacts
                 publications. We observed 15 defect identification
                 techniques tailored for compilers and no single
                 technique identifying all observed defect
                 categories.\par

                 Conclusion: Our MLR lays the groundwork for
                 practitioners and researchers to identify defects in
                 compilers systematically.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "104",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yang:2024:DMC,
  author =       "Ling Yang and Zhilong Zhang and Yang Song and Shenda
                 Hong and Runsheng Xu and Yue Zhao and Wentao Zhang and
                 Bin Cui and Ming-Hsuan Yang",
  title =        "Diffusion Models: a Comprehensive Survey of Methods
                 and Applications",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "105:1--105:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626235",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626235",
  abstract =     "Diffusion models have emerged as a powerful new family
                 of deep generative models with record-breaking
                 performance in many applications, including \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "105",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wyrich:2024:YDC,
  author =       "Marvin Wyrich and Justus Bogner and Stefan Wagner",
  title =        "40 Years of Designing Code Comprehension Experiments:
                 a Systematic Mapping Study",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "106:1--106:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626522",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626522",
  abstract =     "The relevance of code comprehension in a developer's
                 daily work was recognized more than 40 years ago.
                 Consequently, many experiments were conducted to
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "106",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Heinis:2024:SIE,
  author =       "Thomas Heinis and Roman Sokolovskii and Jamie J.
                 Alnasir",
  title =        "Survey of Information Encoding Techniques for {DNA}",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "4",
  pages =        "107:1--107:??",
  month =        apr,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626233",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Dec 5 08:48:21 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626233",
  abstract =     "The yearly global production of data is growing
                 exponentially, outpacing the capacity of existing
                 storage media, such as tape and disk, and surpassing
                 our \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "107",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Marani:2024:RST,
  author =       "Amin Hosseiny Marani and Eric P. S. Baumer",
  title =        "A Review of Stability in Topic Modeling: Metrics for
                 Assessing and Techniques for Improving Stability",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "108:1--108:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3623269",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3623269",
  abstract =     "Topic modeling includes a variety of machine learning
                 techniques for identifying latent themes in a corpus of
                 documents. Generating an exact solution (i.e.,
                 \ldots{})",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "108",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Beyan:2024:CLH,
  author =       "Cigdem Beyan and Alessandro Vinciarelli and Alessio
                 {Del Bue}",
  title =        "Co-Located Human-Human Interaction Analysis Using
                 Nonverbal Cues: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "109:1--109:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626516",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626516",
  abstract =     "Automated co-located human-human interaction analysis
                 has been addressed by the use of nonverbal
                 communication as measurable evidence of social and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "109",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Becker:2024:EXA,
  author =       "Artur Becker and Carla M. {Dal Sasso Freitas}",
  title =        "Evaluation of {XR} Applications: a Tertiary Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "110:1--110:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626517",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626517",
  abstract =     "Extended reality (XR) applications-encompassing
                 virtual reality, augmented reality, and mixed
                 reality-are finding their way into multiple domains.
                 Each \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "110",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Fei:2024:SRI,
  author =       "Wen Fei and Hiroyuki Ohno and Srinivas Sampalli",
  title =        "A Systematic Review of {IoT} Security: Research
                 Potential, Challenges, and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "111:1--111:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3625094",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3625094",
  abstract =     "The Internet of Things (IoT) encompasses a network of
                 physical objects embedded with sensors, software, and
                 data processing technologies that can establish
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "111",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hu:2024:LRR,
  author =       "Xuke Hu and Zhiyong Zhou and Hao Li and Yingjie Hu and
                 Fuqiang Gu and Jens Kersten and Hongchao Fan and
                 Friederike Klan",
  title =        "Location Reference Recognition from Texts: a Survey
                 and Comparison",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "112:1--112:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3625819",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3625819",
  abstract =     "A vast amount of location information exists in
                 unstructured texts, such as social media posts, news
                 stories, scientific articles, web pages, travel blogs,
                 and historical \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "112",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Huang:2024:SDL,
  author =       "Qihan Huang and Haofei Zhang and Mengqi Xue and Jie
                 Song and Mingli Song",
  title =        "A Survey of Deep Learning for Low-shot Object
                 Detection",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "113:1--113:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626312",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626312",
  abstract =     "Object detection has achieved a huge breakthrough with
                 deep neural networks and massive annotated data.
                 However, current detection methods cannot be \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "113",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Paananen:2024:DME,
  author =       "Ville Paananen and Mohammad Sina Kiarostami and Lee
                 Lik-Hang and Tristan Braud and Simo Hosio",
  title =        "From Digital Media to Empathic Spaces: a Systematic
                 Review of Empathy Research in Extended Reality
                 Environments",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "114:1--114:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626518",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626518",
  abstract =     "Recent advances in extended reality (XR) technologies
                 have enabled new and increasingly realistic empathy
                 tools and experiences. In XR, all interactions
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "114",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Seyyedi:2024:MLP,
  author =       "Azra Seyyedi and Mahdi Bohlouli and Seyedehsan Nedaaee
                 Oskoee",
  title =        "Machine Learning and Physics: a Survey of Integrated
                 Models",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "115:1--115:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3611383",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3611383",
  abstract =     "Predictive modeling of various systems around the
                 world is extremely essential from the physics and
                 engineering perspectives. The recognition of different
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "115",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2024:SCM,
  author =       "Johann Li and Guangming Zhu and Cong Hua and Mingtao
                 Feng and Basheer Bennamoun and Ping Li and Xiaoyuan Lu
                 and Juan Song and Peiyi Shen and Xu Xu and Lin Mei and
                 Liang Zhang and Syed Afaq Ali Shah and Mohammed
                 Bennamoun",
  title =        "A Systematic Collection of Medical Image Datasets for
                 Deep Learning",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "116:1--116:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3615862",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3615862",
  abstract =     "The astounding success made by artificial intelligence
                 in healthcare and other fields proves that it can
                 achieve human-like performance. However, success
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "116",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mann:2024:TPS,
  author =       "Zolt{\'a}n {\'A}d{\'a}m Mann and Christian Weinert and
                 Daphnee Chabal and Joppe W. Bos",
  title =        "Towards Practical Secure Neural Network Inference: The
                 Journey So Far and the Road Ahead",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "117:1--117:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3628446",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3628446",
  abstract =     "Neural networks (NNs) have become one of the most
                 important tools for artificial intelligence.
                 Well-designed and trained NNs can perform inference
                 (e.g., make \ldots{})",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "117",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Luo:2024:SCV,
  author =       "Jiayun Luo and Boyang Li and Cyril Leung",
  title =        "A Survey of Computer Vision Technologies in Urban and
                 Controlled-environment Agriculture",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "118:1--118:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626186",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626186",
  abstract =     "In the evolution of agriculture to its next stage,
                 Agriculture 5.0, artificial intelligence will play a
                 central role. Controlled-environment agriculture, or
                 CEA, is \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "118",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2024:SSS,
  author =       "Feng Li and Jianfeng Ma and Yinbin Miao and Ximeng Liu
                 and Jianting Ning and Robert H. Deng",
  title =        "A Survey on Searchable Symmetric Encryption",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "119:1--119:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3617991",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3617991",
  abstract =     "Outsourcing data to the cloud has become prevalent, so
                 Searchable Symmetric Encryption (SSE), one of the
                 methods for protecting outsourced data, has \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "119",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jain:2024:CCA,
  author =       "Vaibhav Jain and Devendra Kumar Sharma and Hari Mohan
                 Gaur and Ashutosh Kumar Singh and Xiaoqing Wen",
  title =        "Comprehensive and Comparative Analysis of {QCA}-based
                 Circuit Designs for Next-generation Computation",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "120:1--120:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3622932",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3622932",
  abstract =     "For the past several decades, VLSI design has been
                 focused on lowering the size, power, and delay. As of
                 now, this miniaturization does not seems to be a
                 possible \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "120",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ding:2024:CTF,
  author =       "Yujuan Ding and Zhihui Lai and P. Y. Mok and Tat-Seng
                 Chua",
  title =        "Computational Technologies for Fashion Recommendation:
                 a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "121:1--121:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3627100",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3627100",
  abstract =     "Fashion recommendation is a key research field in
                 computational fashion research and has attracted
                 considerable interest in the computer vision,
                 multimedia, and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "121",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Huang:2024:SCD,
  author =       "Bing Huang and Dipankar Chaki and Athman Bouguettaya
                 and Kwok-Yan Lam",
  title =        "A Survey on Conflict Detection in {IoT}-based Smart
                 Homes",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "122:1--122:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3629517",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3629517",
  abstract =     "As the adoption of IoT-based smart homes continues to
                 grow, the importance of addressing potential conflicts
                 becomes increasingly vital for ensuring \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "122",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhou:2024:RCA,
  author =       "Dawei Zhou and Jingrui He",
  title =        "Rare Category Analysis for Complex Data: a Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "123:1--123:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626520",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626520",
  abstract =     "Though the sheer volume of data that is collected is
                 immense, it is the rare categories that are often the
                 most important in many high-impact domains, ranging
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "123",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Khalid:2024:CSQ,
  author =       "Adnan Khalid and Zohaib Mushtaq and Saad Arif and
                 Kamran Zeb and Muhammad Attique Khan and Sambit
                 Bakshi",
  title =        "Control Schemes for Quadrotor {UAV}: Taxonomy and
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "124:1--124:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3617652",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3617652",
  abstract =     "Quadrotor Unmanned Aerial Vehicle (UAV) is an unstable
                 system, so it needs to be controlled efficiently and
                 intelligently. Moreover, due to its non-linear,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "124",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hickling:2024:EDR,
  author =       "Thomas Hickling and Abdelhafid Zenati and Nabil Aouf
                 and Phillippa Spencer",
  title =        "Explainability in Deep Reinforcement Learning: a
                 Review into Current Methods and Applications",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "125:1--125:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3623377",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3623377",
  abstract =     "The use of Deep Reinforcement Learning (DRL) schemes
                 has increased dramatically since their first
                 introduction in 2015. Though uses in many different
                 applications \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "125",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2024:BGB,
  author =       "Zhiqian Chen and Fanglan Chen and Lei Zhang and Taoran
                 Ji and Kaiqun Fu and Liang Zhao and Feng Chen and
                 Lingfei Wu and Charu Aggarwal and Chang-Tien Lu",
  title =        "Bridging the Gap between Spatial and Spectral Domains:
                 a Unified Framework for Graph Neural Networks",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "126:1--126:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3627816",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3627816",
  abstract =     "Deep learning's performance has been extensively
                 recognized recently. Graph neural networks (GNNs) are
                 designed to deal with graph-structural data that
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "126",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cheng:2024:DDC,
  author =       "Debo Cheng and Jiuyong Li and Lin Liu and Jixue Liu
                 and Thuc Duy Le",
  title =        "Data-Driven Causal Effect Estimation Based on
                 Graphical Causal Modelling: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "127:1--127:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3636423",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3636423",
  abstract =     "In many fields of scientific research and real-world
                 applications, unbiased estimation of causal effects
                 from non-experimental data is crucial for understanding
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "127",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Villarreal-Narvaez:2024:BNG,
  author =       "Santiago Villarreal-Narvaez and Arthur Slu{\"y}ters
                 and Jean Vanderdonckt and Radu-Daniel Vatavu",
  title =        "Brave New {GES} World: a Systematic Literature Review
                 of Gestures and Referents in Gesture Elicitation
                 Studies",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "128:1--128:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3636458",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3636458",
  abstract =     "How do we determine highly effective and intuitive
                 gesture sets for interactive systems tailored to end
                 users' preferences? A substantial body of knowledge is
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "128",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liao:2024:APG,
  author =       "Fangjian Liao and Xingxing Zou and Waikeung Wong",
  title =        "Appearance and Pose-guided Human Generation: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "129:1--129:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3637060",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3637060",
  abstract =     "Appearance and pose-guided human generation is a
                 burgeoning field that has captured significant
                 attention. This subject's primary objective is to
                 transfer \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "129",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2024:ECR,
  author =       "Shiwei Li and Huifeng Guo and Xing Tang and Ruiming
                 Tang and Lu Hou and Ruixuan Li and Rui Zhang",
  title =        "Embedding Compression in Recommender Systems: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "130:1--130:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3637841",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3637841",
  abstract =     "To alleviate the problem of information explosion,
                 recommender systems are widely deployed to provide
                 personalized information filtering services. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "130",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Kebande:2024:IIT,
  author =       "Victor R. Kebande and Ali Ismail Awad",
  title =        "{Industrial Internet of Things} Ecosystems Security
                 and Digital Forensics: Achievements, Open Challenges,
                 and Future Directions",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "131:1--131:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3635030",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3635030",
  abstract =     "The Industrial Internet of Things (IIoT) has been
                 positioned as a key pillar of the Industry 4.0
                 revolution, which is projected to continue accelerating
                 and realizing \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "131",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Jayasena:2024:DTG,
  author =       "Aruna Jayasena and Prabhat Mishra",
  title =        "Directed Test Generation for Hardware Validation: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "132:1--132:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3638046",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3638046",
  abstract =     "The complexity of hardware designs has increased over
                 the years due to the rapid advancement of technology
                 coupled with the need to support diverse and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "132",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gecer:2024:FLM,
  author =       "Melike Gecer and Benoit Garbinato",
  title =        "Federated Learning for Mobility Applications",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "133:1--133:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3637868",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3637868",
  abstract =     "The increasing concern for privacy and the use of
                 machine learning on personal data has led researchers
                 to introduce new approaches to machine learning.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "133",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2024:RCB,
  author =       "Gengrui Zhang and Fei Pan and Yunhao Mao and Sofia
                 Tijanic and Michael Dang'ana and Shashank Motepalli and
                 Shiquan Zhang and Hans-Arno Jacobsen",
  title =        "Reaching Consensus in the {Byzantine} Empire: a
                 Comprehensive Review of {BFT} Consensus Algorithms",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "5",
  pages =        "134:1--134:??",
  month =        may,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3636553",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:49:16 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3636553",
  abstract =     "Byzantine fault-tolerant (BFT) consensus algorithms
                 are at the core of providing safety and liveness
                 guarantees for distributed systems that must \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "134",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Vincenzi:2024:SRS,
  author =       "Marco {De Vincenzi} and Gianpiero Costantino and
                 Ilaria Matteucci and Florian Fenzl and Christian
                 Plappert and Roland Rieke and Daniel Zelle",
  title =        "A Systematic Review on Security Attacks and
                 Countermeasures in Automotive {Ethernet}",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "135:1--135:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3637059",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3637059",
  abstract =     "In the past years, the automotive industry has
                 experienced a technological revolution driven by the
                 increasing demand of connectivity and data to develop
                 driver-assistance systems and autonomous vehicles, and
                 improve the mobility experience. To provide higher
                 bandwidth in in-vehicle communication networks,
                 carmakers are choosing Ethernet technology, which
                 becomes Automotive Ethernet (AE) when applied in
                 in-vehicle communication networks. However, with the
                 rise of vehicle connectivity, the cybersecurity of
                 vehicle systems has become a primary concern for the
                 automotive industry. To address this issue, we
                 conducted a systematic review, deeply analyzing the
                 impact of AE on security and safety, and comparing it
                 with the current in-vehicle communication solutions
                 like Controller Area Network protocol. We retrieved the
                 key security attacks and mitigations proposed in the
                 current literature to highlight their significance,
                 including a mapping between the regulation UNECE WP.29
                 R155 and the retrieved answers. We found that the
                 industry has only implemented some automotive-dedicated
                 Ethernet solutions to date. In the near future, the
                 vehicle and road ecosystems may require more exclusive
                 automotive solutions to meet specific constraints such
                 as low latency. Our results can provide a comprehensive
                 baseline, both for industry and academia, for the
                 current and future development of AE.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "135",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wong:2024:MHM,
  author =       "Andrew Wei-Loong Wong and Say Leng Goh and Mohammad
                 Kamrul Hasan and Salmah Fattah",
  title =        "Multi-Hop and Mesh for {LoRa} Networks: Recent
                 Advancements, Issues, and Recommended Applications",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "136:1--136:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3638241",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3638241",
  abstract =     "A comprehensive review is presented on the latest
                 approaches to solutions focusing on multi-hop and mesh
                 LoRa networks through the evaluation of simulations and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "136",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2024:BHV,
  author =       "Yanbin Liu and Girish Dwivedi and Farid Boussaid and
                 Mohammed Bennamoun",
  title =        "{$3$D} Brain and Heart Volume Generative Models: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "137:1--137:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3638044",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3638044",
  abstract =     "Generative models such as generative adversarial
                 networks and autoencoders have gained a great deal of
                 attention in the medical field due to their excellent
                 data generation capability. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "137",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Li:2024:SRS,
  author =       "Yanjie Li and Bin Xie and Songtao Guo and Yuanyuan
                 Yang and Bin Xiao",
  title =        "A Survey of Robustness and Safety of {$2$D} and {$3$D}
                 Deep Learning Models against Adversarial Attacks",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "138:1--138:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3636551",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3636551",
  abstract =     "Benefiting from the rapid development of deep
                 learning, 2D and 3D computer vision applications are
                 deployed in many safe-critical systems, such as
                 autopilot and identity \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "138",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yang:2024:SBE,
  author =       "Changlin Yang and Kwan-Wu Chin and Jiguang Wang and
                 Xiaodong Wang and Ying Liu and Zibin Zheng",
  title =        "Scaling Blockchains with Error Correction Codes: a
                 Survey on Coded Blockchains",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "139:1--139:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3637224",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3637224",
  abstract =     "A fundamental issue in blockchain systems is their
                 scalability in terms of data storage, computation,
                 communication, and security. To resolve this issue, a
                 promising research \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "139",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Islam:2024:SFI,
  author =       "Sk Maidul Islam and Subhankar Joardar and Arif Ahmed
                 Sekh*",
  title =        "A Survey on Fashion Image Retrieval",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "140:1--140:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3636552",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3636552",
  abstract =     "Fashion is the manner in which we introduce ourselves
                 to the world and has become perhaps the biggest
                 industry on the planet. In recent years,
                 fashion-related research has \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "140",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ahmadilivani:2024:SLR,
  author =       "Mohammad Hasan Ahmadilivani and Mahdi Taheri and Jaan
                 Raik and Masoud Daneshtalab and Maksim Jenihhin",
  title =        "A Systematic Literature Review on Hardware Reliability
                 Assessment Methods for Deep Neural Networks",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "141:1--141:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3638242",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3638242",
  abstract =     "Artificial Intelligence (AI) and, in particular,
                 Machine Learning (ML), have emerged to be utilized in
                 various applications due to their capability to learn
                 how to solve \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "141",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Falazi:2024:CCS,
  author =       "Ghareeb Falazi and Uwe Breitenb{\"u}cher and Frank
                 Leymann and Stefan Schulte",
  title =        "Cross-Chain Smart Contract Invocations: a Systematic
                 Multi-Vocal Literature Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "142:1--142:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3638045",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3638045",
  abstract =     "The introduction of smart contracts has expanded the
                 applicability of blockchains to many domains beyond
                 finance and cryptocurrencies. Moreover, different
                 blockchain \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "142",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gomes:2024:SEN,
  author =       "Jo{\~a}o Eduardo Costa Gomes and Ricardo Rodrigues
                 Ehlert and Rodrigo Murillo Boesche and Vinicius
                 Santosde Lima and Jorgito Matiuzzi Stocchero and Dante
                 A. C. Barone and JulianoAraujo Wickboldt and Edison
                 Pignaton de Freitas and Julio C. S. dos Anjos and
                 Ricardo Queiroz de Araujo Fernandes",
  title =        "Surveying Emerging Network Approaches for Military
                 Command and Control Systems",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "143:1--143:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626090",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626090",
  abstract =     "This survey paper examines emerging network approaches
                 for military Command and Control (C2) systems. An
                 extensive literature review is provided along the text
                 on \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "143",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Szymoniak:2024:KDA,
  author =       "Sabina Szymoniak",
  title =        "Key Distribution and Authentication Protocols in
                 Wireless Sensor Networks: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "144:1--144:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3638043",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3638043",
  abstract =     "We use sensor technologies in many areas of everyday
                 life. We use sensors to check and study various
                 phenomena and to improve our lives. Hence, the sensors
                 are used in \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "144",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Maniriho:2024:SRA,
  author =       "Pascal Maniriho and Abdun Naser Mahmood and Mohammad
                 Jabed Morshed Chowdhury",
  title =        "A Survey of Recent Advances in Deep Learning Models
                 for Detecting Malware in Desktop and Mobile Platforms",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "145:1--145:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3638240",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3638240",
  abstract =     "Malware is one of the most common and severe cyber
                 threats today. Malware infects millions of devices and
                 can perform several malicious activities including
                 compromising \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "145",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ye:2024:DLW,
  author =       "Zhisheng Ye and Wei Gao and Qinghao Hu and Peng Sun
                 and Xiaolin Wang and Yingwei Luo and Tianwei Zhang and
                 Yonggang Wen",
  title =        "Deep Learning Workload Scheduling in {GPU}
                 Datacenters: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "146:1--146:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3638757",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3638757",
  abstract =     "Deep learning (DL) has demonstrated its remarkable
                 success in a wide variety of fields. The development of
                 a DL model is a time-consuming and resource-intensive
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "146",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ghosheh:2024:SGA,
  author =       "Ghadeer O. Ghosheh and Jin Li and Tingting Zhu",
  title =        "A Survey of Generative Adversarial Networks for
                 Synthesizing Structured Electronic Health Records",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "147:1--147:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3636424",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3636424",
  abstract =     "Electronic Health Records (EHRs) are a valuable asset
                 to facilitate clinical research and point of care
                 applications; however, many challenges such as data
                 privacy concerns impede its \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "147",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gaber:2024:MDA,
  author =       "Matthew G. Gaber and Mohiuddin Ahmed and Helge
                 Janicke",
  title =        "Malware Detection with Artificial Intelligence: a
                 Systematic Literature Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "148:1--148:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3638552",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3638552",
  abstract =     "In this survey, we review the key developments in the
                 field of malware detection using AI and analyze core
                 challenges. We systematically survey state-of-the-art
                 methods \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "148",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Pato:2024:SRS,
  author =       "Matilde Pato and M{\'a}rcia Barros and Francisco M.
                 Couto",
  title =        "Survey on Recommender Systems for Biomedical Items in
                 Life and Health Sciences",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "149:1--149:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3639047",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3639047",
  abstract =     "The generation of biomedical data is of such magnitude
                 that its retrieval and analysis have posed several
                 challenges. A survey of recommender system (RS)
                 approaches \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "149",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Razniewski:2024:CRN,
  author =       "Simon Razniewski and Hiba Arnaout and Shrestha Ghosh
                 and Fabian Suchanek",
  title =        "Completeness, Recall, and Negation in Open-world
                 Knowledge Bases: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "150:1--150:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3639563",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3639563",
  abstract =     "General-purpose knowledge bases (KBs) are a
                 cornerstone of knowledge-centric AI. Many of them are
                 constructed pragmatically from web sources and are thus
                 far from \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "150",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chen:2024:SML,
  author =       "Huaming Chen and M. Ali Babar",
  title =        "Security for Machine Learning-based Software Systems:
                 a Survey of Threats, Practices, and Challenges",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "151:1--151:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3638531",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3638531",
  abstract =     "The rapid development of Machine Learning (ML) has
                 demonstrated superior performance in many areas, such
                 as computer vision and video and speech recognition. It
                 has now been \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "151",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Mo:2024:SPI,
  author =       "Kanghua Mo and Peigen Ye and Xiaojun Ren and Shaowei
                 Wang and Wenjun Li and Jin Li",
  title =        "Security and Privacy Issues in Deep Reinforcement
                 Learning: Threats and Countermeasures",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "152:1--152:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3640312",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3640312",
  abstract =     "Deep Reinforcement Learning (DRL) is an essential
                 subfield of Artificial Intelligence (AI), where agents
                 interact with environments to learn policies for
                 solving complex tasks. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "152",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yao:2024:DLP,
  author =       "Jianping Yao and Son N. Tran and Saurabh Garg and
                 Samantha Sawyer",
  title =        "Deep Learning for Plant Identification and Disease
                 Classification from Leaf Images: Multi-prediction
                 Approaches",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "153:1--153:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3639816",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3639816",
  abstract =     "Deep learning (DL) plays an important role in modern
                 agriculture, especially in plant pathology using leaf
                 images where convolutional neural networks (CNN) are
                 attracting a lot of \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "153",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Khan:2024:MDB,
  author =       "Simon Khan and Charles Devlen and Michael Manno and
                 Daqing Hou",
  title =        "Mouse Dynamics Behavioral Biometrics: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "154:1--154:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3640311",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3640311",
  abstract =     "Utilization of the Internet in our everyday lives has
                 made us vulnerable in terms of privacy and security of
                 our data and systems. Therefore, there is a pressing
                 need to protect our \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "154",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Hughes:2024:ACC,
  author =       "Jack Hughes and Sergio Pastrana and Alice Hutchings
                 and Sadia Afroz and Sagar Samtani and Weifeng Li and
                 Ericsson Santana Marin",
  title =        "The Art of Cybercrime Community Research",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "155:1--155:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3639362",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3639362",
  abstract =     "In the last decade, cybercrime has risen considerably.
                 One key factor is the proliferation of online
                 cybercrime communities, where actors trade products and
                 services, and also \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "155",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Subagdja:2024:MLR,
  author =       "Budhitama Subagdja and D. Shanthoshigaa and Zhaoxia
                 Wang and Ah-Hwee Tan",
  title =        "Machine Learning for Refining Knowledge Graphs: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "156:1--156:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3640313",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3640313",
  abstract =     "Knowledge graph (KG) refinement refers to the process
                 of filling in missing information, removing
                 redundancies, and resolving inconsistencies in KGs.
                 With the \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "156",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zahid:2024:MBT,
  author =       "Maryam Zahid and Alessio Bucaioni and Francesco
                 Flammini",
  title =        "Model-based Trustworthiness Evaluation of Autonomous
                 Cyber-Physical Production Systems: a Systematic Mapping
                 Study",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "157:1--157:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3640314",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3640314",
  abstract =     "The fourth industrial revolution, i.e., Industry 4.0,
                 is associated with Cyber-Physical Systems (CPS), which
                 are entities integrating hardware (e.g., smart sensors
                 and actuators \ldots{})",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "157",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Dou:2024:DDI,
  author =       "Mingliang Dou and Jijun Tang and Prayag Tiwari and
                 Yijie Ding and Fei Guo",
  title =        "Drug-Drug Interaction Relation Extraction Based on
                 Deep Learning: a Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "158:1--158:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3645089",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3645089",
  abstract =     "Drug-drug interaction (DDI) is an important part of
                 drug development and pharmacovigilance. At the same
                 time, DDI is an important factor in treatment planning,
                 monitoring effects \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "158",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Cao:2024:KGE,
  author =       "Jiahang Cao and Jinyuan Fang and Zaiqiao Meng and
                 Shangsong Liang",
  title =        "Knowledge Graph Embedding: a Survey from the
                 Perspective of Representation Spaces",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "159:1--159:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3643806",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3643806",
  abstract =     "Knowledge graph embedding (KGE) is an increasingly
                 popular technique that aims to represent entities and
                 relations of knowledge graphs into low-dimensional
                 semantic \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "159",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Becherer:2024:TRS,
  author =       "Marius Becherer and Omar Khadeer Hussain and Yu Zhang
                 and Frank den Hartog and Elizabeth Chang",
  title =        "On Trust Recommendations in the {Social Internet of
                 Things} --- A Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "160:1--160:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3645100",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3645100",
  abstract =     "The novel paradigm Social Internet of Things (SIoT)
                 improves the network navigability, identifies suitable
                 service providers, and addresses scalability concerns.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "160",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Ciatto:2024:SKE,
  author =       "Giovanni Ciatto and Federico Sabbatini and Andrea
                 Agiollo and Matteo Magnini and Andrea Omicini",
  title =        "Symbolic Knowledge Extraction and Injection with
                 Sub-symbolic Predictors: a Systematic Literature
                 Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "6",
  pages =        "161:1--161:??",
  month =        jun,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3645103",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Mar 25 11:39:38 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3645103",
  abstract =     "In this article, we focus on the opacity issue of
                 sub-symbolic machine learning predictors by promoting
                 two complementary activities- symbolic knowledge
                 extraction (SKE) and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "161",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Calegari:2024:ISI,
  author =       "Roberta Calegari and Fosca Giannotti and Francesca
                 Pratesi and Michela Milano",
  title =        "Introduction to Special Issue on Trustworthy
                 Artificial Intelligence",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "162:1--162:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3649452",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3649452",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "162",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2024:EBM,
  author =       "Peiyun Zhang and Song Ding and Qinglin Zhao",
  title =        "Exploiting Blockchain to Make {AI} Trustworthy: a
                 Software Development Lifecycle View",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "163:1--163:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3614424",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3614424",
  abstract =     "Artificial intelligence (AI) is a very powerful
                 technology and can be a potential disrupter and
                 essential enabler. As AI expands into almost every
                 aspect of our lives, people raise serious concerns
                 about AI misbehaving and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "163",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Conlon:2024:SAM,
  author =       "Nicholas Conlon and Nisar R. Ahmed and Daniel Szafir",
  title =        "A Survey of Algorithmic Methods for Competency
                 Self-Assessments in Human-Autonomy Teaming",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "164:1--164:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3616010",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3616010",
  abstract =     "Humans working with autonomous artificially
                 intelligent systems may not be experts in the inner
                 workings of their machine teammates, but need to
                 understand when to employ, trust, and rely on the
                 system. A critical \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "164",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xing:2024:NIM,
  author =       "Xiaodan Xing and Huanjun Wu and Lichao Wang and Iain
                 Stenson and May Yong and Javier {Del Ser} and Simon
                 Walsh and Guang Yang",
  title =        "Non-imaging Medical Data Synthesis for Trustworthy
                 {AI}: a Comprehensive Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "165:1--165:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3614425",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3614425",
  abstract =     "Data quality is a key factor in the development of
                 trustworthy AI in healthcare. A large volume of curated
                 datasets with controlled confounding factors can
                 improve the accuracy, robustness, and privacy of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "165",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Caton:2024:FML,
  author =       "Simon Caton and Christian Haas",
  title =        "Fairness in Machine Learning: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "166:1--166:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3616865",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3616865",
  abstract =     "When Machine Learning technologies are used in
                 contexts that affect citizens, companies as well as
                 researchers need to be confident that there will not be
                 any unexpected social implications, such as bias
                 towards gender, \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "166",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lorena:2024:TMP,
  author =       "Ana C. Lorena and Pedro Y. A. Paiva and Ricardo B. C.
                 Prud{\^e}ncio",
  title =        "Trusting My Predictions: On the Value of
                 Instance-Level Analysis",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "167:1--167:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3615354",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3615354",
  abstract =     "Machine Learning solutions have spread along many
                 domains, including critical applications. The
                 development of such models usually relies on a dataset
                 containing labeled data. This dataset is then split
                 into training and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "167",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Milani:2024:ERL,
  author =       "Stephanie Milani and Nicholay Topin and Manuela Veloso
                 and Fei Fang",
  title =        "Explainable Reinforcement Learning: a Survey and
                 Comparative Review",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "168:1--168:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3616864",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3616864",
  abstract =     "Explainable reinforcement learning (XRL) is an
                 emerging subfield of explainable machine learning that
                 has attracted considerable attention in recent years.
                 The goal of XRL is to elucidate the decision-making
                 process of \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "168",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Guerraoui:2024:BML,
  author =       "Rachid Guerraoui and Nirupam Gupta and Rafael Pinot",
  title =        "{Byzantine} Machine Learning: a Primer",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "169:1--169:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3616537",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3616537",
  abstract =     "The problem of Byzantine resilience in distributed
                 machine learning, a.k.a. Byzantine machine learning,
                 consists of designing distributed algorithms that can
                 train an accurate model despite the presence of
                 Byzantine \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "169",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Qayyum:2024:STA,
  author =       "Adnan Qayyum and Muhammad Atif Butt and Hassan Ali and
                 Muhammad Usman and Osama Halabi and Ala Al-Fuqaha and
                 Qammer H. Abbasi and Muhammad Ali Imran and Junaid
                 Qadir",
  title =        "Secure and Trustworthy Artificial
                 Intelligence-extended Reality ({AI-XR}) for
                 Metaverses",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "170:1--170:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3614426",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3614426",
  abstract =     "Metaverse is expected to emerge as a new paradigm for
                 the next-generation Internet, providing fully immersive
                 and personalized experiences to socialize, work, and
                 play in self-sustaining and hyper-spatio-temporal
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "170",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Prado-Romero:2024:SGC,
  author =       "Mario Alfonso Prado-Romero and Bardh Prenkaj and
                 Giovanni Stilo and Fosca Giannotti",
  title =        "A Survey on Graph Counterfactual Explanations:
                 Definitions, Methods, Evaluation, and Research
                 Challenges",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "171:1--171:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3618105",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3618105",
  abstract =     "Graph Neural Networks (GNNs) perform well in community
                 detection and molecule classification. Counterfactual
                 Explanations (CE) provide counter-examples to overcome
                 the transparency limitations of black-box \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "171",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wan:2024:SDR,
  author =       "Zhijing Wan and Zhixiang Wang and Cheukting Chung and
                 Zheng Wang",
  title =        "A Survey of Dataset Refinement for Problems in
                 Computer Vision Datasets",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "172:1--172:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3627157",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3627157",
  abstract =     "Large- scale datasets have played a crucial role in
                 the advancement of computer vision. However, they often
                 suffer from problems such as class imbalance, noisy
                 labels, dataset bias, or high resource costs, which can
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "172",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Lu:2024:RAP,
  author =       "Qinghua Lu and Liming Zhu and Xiwei Xu and Jon Whittle
                 and Didar Zowghi and Aurelie Jacquet",
  title =        "Responsible {AI} Pattern Catalogue: a Collection of
                 Best Practices for {AI} Governance and Engineering",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "173:1--173:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626234",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626234",
  abstract =     "Responsible Artificial Intelligence (RAI) is widely
                 considered as one of the greatest scientific challenges
                 of our time and is key to increase the adoption of
                 Artificial Intelligence (AI). Recently, a number of AI
                 ethics principles \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "173",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Xiong:2024:IAA,
  author =       "Peiyu Xiong and Michael Tegegn and Jaskeerat Singh
                 Sarin and Shubhraneel Pal and Julia Rubin",
  title =        "It Is All about Data: a Survey on the Effects of Data
                 on Adversarial Robustness",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "174:1--174:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3627817",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3627817",
  abstract =     "Adversarial examples are inputs to machine learning
                 models that an attacker has intentionally designed to
                 confuse the model into making a mistake. Such examples
                 pose a serious threat to the applicability of machine
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "174",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Chaalan:2024:PDR,
  author =       "Tarek Chaalan and Shaoning Pang and Joarder
                 Kamruzzaman and Iqbal Gondal and Xuyun Zhang",
  title =        "The Path to Defence: a Roadmap to Characterising Data
                 Poisoning Attacks on Victim Models",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "175:1--175:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3627536",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3627536",
  abstract =     "Data Poisoning Attacks (DPA) represent a sophisticated
                 technique aimed at distorting the training data of
                 machine learning models, thereby manipulating their
                 behavior. This process is not only technically
                 intricate but also \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "175",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Perez-Cerrolaza:2024:AIS,
  author =       "Jon Perez-Cerrolaza and Jaume Abella and Markus Borg
                 and Carlo Donzella and Jes{\'u}s Cerquides and
                 Francisco J. Cazorla and Cristofer Englund and Markus
                 Tauber and George Nikolakopoulos and Jose Luis Flores",
  title =        "Artificial Intelligence for Safety-Critical Systems in
                 Industrial and Transportation Domains: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "176:1--176:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3626314",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3626314",
  abstract =     "Artificial Intelligence (AI) can enable the
                 development of next-generation autonomous
                 safety-critical systems in which Machine Learning (ML)
                 algorithms learn optimized and safe solutions. AI can
                 also support and assist \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "176",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhao:2024:SRC,
  author =       "Chuanjun Zhao and Meiling Wu and Xinyi Yang and Wenyue
                 Zhang and Shaoxia Zhang and Suge Wang and Deyu Li",
  title =        "A Systematic Review of Cross-Lingual Sentiment
                 Analysis: Tasks, Strategies, and Prospects",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "177:1--177:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3645106",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3645106",
  abstract =     "Traditional methods for sentiment analysis, when
                 applied in a monolingual context, often yield less than
                 optimal results in multilingual settings. This
                 underscores the need for a more thorough exploration of
                 cross-lingual \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "177",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2024:TSC,
  author =       "Jiliang Zhang and Congcong Chen and Jinhua Cui and
                 Keqin Li",
  title =        "Timing Side-channel Attacks and Countermeasures in
                 {CPU} Microarchitectures",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "178:1--178:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3645109",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3645109",
  abstract =     "Microarchitectural vulnerabilities, such as Meltdown
                 and Spectre, exploit subtle microarchitecture state to
                 steal the user's secret data and even compromise the
                 operating systems. In recent years, considerable
                 discussion \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "178",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Heo:2024:BDS,
  author =       "Jun Wook Heo and Gowri Sankar Ramachandran and Ali
                 Dorri and Raja Jurdak",
  title =        "Blockchain Data Storage Optimisations: a Comprehensive
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "179:1--179:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3645104",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3645104",
  abstract =     "Blockchain offers immutability, transparency, and
                 security in a decentralised way for many applications,
                 including finance, supply chain, and the Internet of
                 Things (IoT). Due to its popularity and widespread
                 adoption, it has \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "179",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhang:2024:SRD,
  author =       "Cheng Zhang and Bo Ou and Fei Peng and Yao Zhao and
                 Keqin Li",
  title =        "A Survey on Reversible Data Hiding for Uncompressed
                 Images",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "180:1--180:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3645105",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3645105",
  abstract =     "Reversible data hiding (RDH) has developed various
                 theories and algorithms since the early 1990s. The
                 existing works involve a large amount of specialized
                 knowledge, making it difficult for researchers,
                 especially primary \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "180",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Bakhtiarnia:2024:EHR,
  author =       "Arian Bakhtiarnia and Qi Zhang and Alexandros
                 Iosifidis",
  title =        "Efficient High-Resolution Deep Learning: a Survey",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "181:1--181:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3645107",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3645107",
  abstract =     "Cameras in modern devices such as smartphones,
                 satellites and medical equipment are capable of
                 capturing very high resolution images and videos. Such
                 high-resolution data often need to be processed by deep
                 learning \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "181",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Rodrigues:2024:SMS,
  author =       "Andrey Rodrigues and Maria L{\'u}cia Villela and
                 Eduardo Feitosa",
  title =        "A Systematic Mapping Study on Social Network Privacy:
                 Threats and Solutions",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "182:1--182:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3645086",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3645086",
  abstract =     "Online Social Networks (OSNs) are becoming pervasive
                 in today's world. Millions of people worldwide are
                 involved in different forms of online networking.
                 However, this ease of use of OSNs comes with a cost in
                 terms of \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "182",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Niksirat:2024:WAT,
  author =       "Kavous Salehzadeh Niksirat and Lev Velykoivanenko and
                 No{\'e} Zufferey and Mauro Cherubini and K{\'e}vin
                 Huguenin and Mathias Humbert",
  title =        "Wearable Activity Trackers: a Survey on Utility,
                 Privacy, and Security",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "183:1--183:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3645091",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3645091",
  abstract =     "Over the past decade, wearable activity trackers
                 (WATs) have become increasingly popular. However,
                 despite many research studies in different fields (e.g.
                 psychology, health, and design), few have sought to
                 jointly examine \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "183",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Methnani:2024:WCH,
  author =       "Leila Methnani and Manolis Chiou and Virginia Dignum
                 and Andreas Theodorou",
  title =        "Who's in Charge Here? {A} Survey on Trustworthy {AI}
                 in Variable Autonomy Robotic Systems",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "184:1--184:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3645090",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3645090",
  abstract =     "This article surveys the Variable Autonomy (VA)
                 robotics literature that considers two contributory
                 elements to Trustworthy AI: transparency and
                 explainability. These elements should play a crucial
                 role when \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "184",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Wang:2024:UBI,
  author =       "Jiajia Wang and Jimmy Xiangji Huang and Xinhui Tu and
                 Junmei Wang and Angela Jennifer Huang and Md Tahmid
                 Rahman Laskar and Amran Bhuiyan",
  title =        "Utilizing {BERT} for Information Retrieval: Survey,
                 Applications, Resources, and Challenges",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "185:1--185:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3648471",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3648471",
  abstract =     "Recent years have witnessed a substantial increase in
                 the use of deep learning to solve various natural
                 language processing (NLP) problems. Early deep learning
                 models were constrained by their sequential or
                 unidirectional \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "185",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Shahidinejad:2024:AIT,
  author =       "Ali Shahidinejad and Jemal Abawajy",
  title =        "An All-Inclusive Taxonomy and Critical Review of
                 Blockchain-Assisted Authentication and Session Key
                 Generation Protocols for {IoT}",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "186:1--186:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3645087",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3645087",
  abstract =     "Authentication and Session Key Generation Protocols
                 (SKGPs) play an essential role in securing the
                 communication channels of connected Internet of Things
                 (IoT) devices. Recently, through blockchain \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "186",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Zhou:2024:SEE,
  author =       "Lihua Zhou and Guowang Du and Kevin L{\"u} and Lizheng
                 Wang and Jingwei Du",
  title =        "A Survey and an Empirical Evaluation of Multi-View
                 Clustering Approaches",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "187:1--187:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3645108",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3645108",
  abstract =     "Multi- view clustering (MVC) holds a significant role
                 in domains like machine learning, data mining, and
                 pattern recognition. Despite the development of
                 numerous new MVC approaches employing various
                 techniques, \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "187",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Gao:2024:GBX,
  author =       "Yuyang Gao and Siyi Gu and Junji Jiang and Sungsoo Ray
                 Hong and Dazhou Yu and Liang Zhao",
  title =        "Going Beyond {XAI}: a Systematic Survey for
                 Explanation-Guided Learning",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "188:1--188:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3644073",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3644073",
  abstract =     "As the societal impact of Deep Neural Networks (DNNs)
                 grows, the goals for advancing DNNs become more complex
                 and diverse, ranging from improving a conventional
                 model accuracy metric to infusing advanced human
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "188",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Liu:2024:GVA,
  author =       "Yang Liu and Dingkang Yang and Yan Wang and Jing Liu
                 and Jun Liu and Azzedine Boukerche and Peng Sun and
                 Liang Song",
  title =        "Generalized Video Anomaly Event Detection: Systematic
                 Taxonomy and Comparison of Deep Models",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "189:1--189:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3645101",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3645101",
  abstract =     "Video Anomaly Detection (VAD) serves as a pivotal
                 technology in the intelligent surveillance systems,
                 enabling the temporal or spatial identification of
                 anomalous events within videos. While existing reviews
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "189",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

@Article{Yang:2024:IWS,
  author =       "Luyao Yang and Osama Amin and Basem Shihada",
  title =        "Intelligent Wearable Systems: Opportunities and
                 Challenges in Health and Sports",
  journal =      j-COMP-SURV,
  volume =       "56",
  number =       "7",
  pages =        "190:1--190:??",
  month =        jul,
  year =         "2024",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3648469",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 18 06:07:10 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3648469",
  abstract =     "Wearable devices, or wearables, designed to be
                 attached to the human body, can gather personalized
                 real-time data and continuously monitor an individual's
                 health status and physiological disposition in a
                 non-invasive \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Comput. Surv.",
  articleno =    "190",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "https://dl.acm.org/loi/csur",
}

%%% ====================================================================
%%% Cross-referenced entries come last:
@Book{Aspray:1987:PJN,
  editor =       "William Aspray and Arthur Burks",
  booktitle =    "Papers of {John von Neumann} on computing and computer
                 theory",
  title =        "Papers of {John von Neumann} on computing and computer
                 theory",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  pages =        "xviii + 624",
  year =         "1987",
  ISBN =         "0-262-22030-X",
  ISBN-13 =      "978-0-262-22030-9",
  LCCN =         "QA76.5 .P31451 1987",
  bibdate =      "Thu Apr 29 17:01:25 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "See \cite{Knuth:1970:NFC}.",
  acknowledgement = ack-nhfb,
}

@Book{Knuth:1992:LP,
  author =       "Donald E. Knuth",
  booktitle =    "Literate Programming",
  title =        "Literate Programming",
  publisher =    pub-SUCSLI,
  address =      pub-SUCSLI:adr,
  pages =        "xvi + 368",
  year =         "1992",
  ISBN =         "0-937073-80-6 (paperback), 0-937073-81-4 (hardcover)",
  ISBN-13 =      "978-0-937073-80-3 (paperback), 978-0-937073-81-0
                 (hardcover)",
  LCCN =         "QA76.6 .K644 1992",
  bibdate =      "Fri Jul 22 09:08:14 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib",
  note =         "Distributed by the University of Chicago Press.",
  price =        "US\$24.95 (paperback), US\$59.95 (hardcover)",
  series =       "CSLI Lecture Notes Number 27",
  acknowledgement = ack-nhfb,
}