Table of contents for issues of ACM Computing Surveys

Last update: Mon Jan 22 08:54:10 MST 2018                Valid HTML 3.2!

Volume 1, Number 1, March, 1969
Volume 1, Number 2, June, 1969
Volume 1, Number 3, September, 1969
Volume 1, Number 4, December, 1969
Volume 2, Number 1, March, 1970
Volume 2, Number 2, June, 1970
Volume 2, Number 3, September, 1970
Volume 2, Number 4, December, 1970
Volume 3, Number 1, March, 1971
Volume 3, Number 2, June, 1971
Volume 3, Number 3, September, 1971
Volume 3, Number 4, December, 1971
Volume 4, Number 1, March, 1972
Volume 4, Number 2, June, 1972
Volume 4, Number 3, September, 1972
Volume 4, Number 4, December, 1972
Volume 5, Number 1, March, 1973
Volume 5, Number 2, June, 1973
Volume 5, Number 3, September, 1973
Volume 5, Number 4, December, 1973
Volume 6, Number 1, March, 1974
Volume 6, Number 2, June, 1974
Volume 6, Number 3, September, 1974
Volume 6, Number 4, December, 1974
Volume 7, Number 1, March, 1975
Volume 7, Number 2, June, 1975
Volume 7, Number 3, September, 1975
Volume 7, Number 4, December, 1975
Volume 8, Number 1, March, 1976
Volume 8, Number 2, June, 1976
Volume 8, Number 3, September, 1976
Volume 8, Number 4, December, 1976
Volume 9, Number 1, March, 1977
Volume 9, Number 2, June, 1977
Volume 9, Number 3, September, 1977
Volume 9, Number 4, December, 1977
Volume 10, Number 1, March, 1978
Volume 10, Number 2, June, 1978
Volume 10, Number 3, September, 1978
Volume 10, Number 4, December, 1978
Volume 11, Number 1, March, 1979
Volume 11, Number 2, June, 1979
Volume 11, Number 3, September, 1979
Volume 11, Number 4, December, 1979
Volume 12, Number 1, March, 1980
Volume 12, Number 2, June, 1980
Volume 12, Number 3, September, 1980
Volume 12, Number 4, December, 1980
Volume 13, Number 1, March, 1981
Volume 13, Number 2, June, 1981
Volume 13, Number 3, September, 1981
Volume 13, Number 4, December, 1981
Volume 14, Number 1, March, 1982
Volume 14, Number 2, June, 1982
Volume 14, Number 3, September, 1982
Volume 14, Number 4, December, 1982
Volume 15, Number 1, March, 1983
Volume 15, Number 2, June, 1983
Volume 15, Number 3, September, 1983
Volume 15, Number 4, December, 1983
Volume 16, Number 1, March, 1984
Volume 16, Number 2, June, 1984
Volume 16, Number 3, September, 1984
Volume 16, Number 4, December, 1984
Volume 17, Number 1, March, 1985
Volume 17, Number 2, June, 1985
Volume 17, Number 3, September, 1985
Volume 17, Number 4, December, 1985
Volume 18, Number 1, March, 1986
Volume 18, Number 2, June, 1986
Volume 18, Number 3, September, 1986
Volume 18, Number 4, December, 1986
Volume 19, Number 1, March, 1987
Volume 19, Number 2, June, 1987
Volume 19, Number 3, September, 1987
Volume 19, Number 4, December, 1987
Volume 20, Number 1, March, 1988
Volume 20, Number 2, June, 1988
Volume 20, Number 3, September, 1988
Volume 20, Number 4, December, 1988
Volume 21, Number 1, March, 1989
Volume 21, Number 2, June, 1989
Volume 21, Number 3, September, 1989
Volume 21, Number 4, December, 1989
Volume 22, Number 1, March, 1990
Volume 22, Number 2, June, 1990
Volume 22, Number 3, September, 1990
Volume 22, Number 4, December, 1990
Volume 23, Number 1, March, 1991
Volume 23, Number 2, June, 1991
Volume 23, Number 3, September, 1991
Volume 23, Number 4, December, 1991
Volume 24, Number 1, March, 1992
Volume 24, Number 2, June, 1992
Volume 24, Number 3, September, 1992
Volume 24, Number 4, December, 1992
Volume 25, Number 1, March, 1993
Volume 25, Number 2, June, 1993
Volume 25, Number 3, September, 1993
Volume 25, Number 4, December, 1993
Volume 26, Number 1, March, 1994
Volume 26, Number 2, June, 1994
Volume 26, Number 3, September, 1994
Volume 26, Number 4, December, 1994
Volume 27, Number 1, March, 1995
Volume 27, Number 2, June, 1995
Volume 27, Number 3, September, 1995
Volume 27, Number 4, December, 1995
Volume 28, Number 1, March, 1996
Volume 28, Number 2, June, 1996
Volume 28, Number 3, September, 1996
Volume 28, Number 4, December, 1996
Volume 28, Number 4es, December, 1996
Volume 29, Number 1, March, 1997
Volume 29, Number 2, June, 1997
Volume 29, Number 3, September, 1997
Volume 29, Number 4, December, 1997
Volume 30, Number 1, March, 1998
Volume 30, Number 2, June, 1998
Volume 30, Number 3, September, 1998
Volume 30, Number 3es, September, 1998
Volume 30, Number 4, December, 1998
Volume 31, Number 1, March, 1999
Volume 31, Number 2, June, 1999
Volume 31, Number 2es, June, 1999
Volume 31, Number 3, September, 1999
Volume 31, Number 3es, September, 1999
Volume 31, Number 4, December, 1999
Volume 31, Number 4es, December, 1999
Volume 32, Number 1, March, 2000
Volume 32, Number 1es, March, 2000
Volume 32, Number 2, June, 2000
Volume 32, Number 3, September, 2000
Volume 32, Number 4, December, 2000
Volume 33, Number 1, March, 2001
Volume 33, Number 2, June, 2001
Volume 33, Number 3, September, 2001
Volume 33, Number 4, December, 2001
Volume 34, Number 1, March, 2002
Volume 34, Number 2, June, 2002
Volume 34, Number 3, September, 2002
Volume 34, Number 4, December, 2002
Volume 35, Number 1, March, 2003
Volume 35, Number 2, June, 2003
Volume 35, Number 3, September, 2003
Volume 35, Number 4, December, 2003
Volume 36, Number 1, March, 2004
Volume 36, Number 2, June, 2004
Volume 36, Number 3, September, 2004
Volume 36, Number 4, December, 2004
Volume 37, Number 1, March, 2005
Volume 37, Number 2, June, 2005
Volume 37, Number 3, September, 2005
Volume 37, Number 4, December, 2005
Volume 38, Number 1, March, 2006
Volume 38, Number 2, March, 2006
Volume 38, Number 3, September, 2006
Volume 38, Number 4, December, 2006
Volume 39, Number 1, April, 2007
Volume 39, Number 2, July, 2007
Volume 39, Number 3, September, 2007
Volume 39, Number 4, November, 2007
Volume 40, Number 1, February, 2008
Volume 40, Number 2, April, 2008
Volume 40, Number 3, August, 2008
Volume 40, Number 4, October, 2008
Volume 41, Number 1, December, 2008
Volume 41, Number 2, February, 2009
Volume 41, Number 3, July, 2009
Volume 41, Number 4, October, 2009
Volume 42, Number 1, December, 2009
Volume 42, Number 2, February, 2010
Volume 42, Number 3, March, 2010
Volume 42, Number 4, June, 2010
Volume 43, Number 1, November, 2010
Volume 43, Number 2, January, 2011
Volume 43, Number 3, April, 2011
Volume 43, Number 4, October, 2011
Volume 44, Number 1, January, 2012
Volume 44, Number 2, February, 2012
Volume 44, Number 3, June, 2012
Volume 44, Number 4, August, 2012
Volume 45, Number 1, November, 2012
Volume 45, Number 2, February, 2013
Volume 45, Number 3, June, 2013
Volume 45, Number 4, August, 2013
Volume 46, Number 1, October, 2013
Volume 46, Number 2, November, 2013
Volume 46, Number 3, January, 2013
Volume 46, Number 4, March, 2013
Volume 47, Number 1, May, 2014
Volume 47, Number 2, November, 2014
Volume 47, Number 3, April, 2015
Volume 47, Number 4, July, 2015
Volume 48, Number 1, September, 2015
Volume 48, Number 2, November, 2015
Volume 48, Number 3, February, 2016
Volume 48, Number 4, May, 2016
Volume 49, Number 1, July, 2016
Volume 49, Number 2, September, 2016
Volume 49, Number 3, November, 2016
Volume 49, Number 4, February, 2017
Volume 50, Number 1, April, 2017
Volume 50, Number 2, June, 2017
Volume 50, Number 3, October, 2017
Volume 50, Number 4, November, 2017
Volume 50, Number 5, November, 2017
Volume 50, Number 6, January, 2018


ACM Computing Surveys
Volume 1, Number 1, March, 1969

                 Aaron Finerman   An Editorial Note  . . . . . . . . . . . 1--1
                William S. Dorn   Editor's Preview\ldots . . . . . . . . . 2--5
                     Saul Rosen   Electronic Computers: a Historical
                                  Survey . . . . . . . . . . . . . . . . . 7--36
                Robert F. Rosin   Supervisory and Monitor Systems  . . . . 37--54
                    R. L. Glass   An Elementary Discussion of
                                  Compiler/Interpreter Writing . . . . . . 55--77

ACM Computing Surveys
Volume 1, Number 2, June, 1969

                William S. Dorn   Editor's Preview \ldots  . . . . . . . . 81--84
               Lance J. Hoffman   Computers and Privacy: a Survey  . . . . 85--103
                 J. M. McKinney   A Survey of Analytical Time-Sharing
                                  Models . . . . . . . . . . . . . . . . . 105--116
                 George G. Dodd   Elements of Data Management Systems  . . 117--133

ACM Computing Surveys
Volume 1, Number 3, September, 1969

                William S. Dorn   Editor's Preview \ldots  . . . . . . . . 135--138
                   M. V. Wilkes   The Growth of Interest in
                                  Microprogramming: a Literature Survey    139--145
               Azriel Rosenfeld   Picture Processing by Computer . . . . . 147--176
                William S. Dorn   Editor's Postview \ldots . . . . . . . . 177--177

ACM Computing Surveys
Volume 1, Number 4, December, 1969

                William S. Dorn   Editor's Preview \ldots  . . . . . . . . 179--182
                   William Kent   Assembler-Language Macroprogramming: a
                                  Tutorial Oriented Toward the IBM 360 . . 183--196
                Robert F. Rosin   Contemporary Concepts of
                                  Microprogramming and Emulation . . . . . 197--212
                     J. D. Aron   Information Systems in Perspective . . . 213--236


ACM Computing Surveys
Volume 2, Number 1, March, 1970

                William S. Dorn   Editor's Preview \ldots  . . . . . . . . 1--3
                  T. A. Dolotta   Functional Specifications for
                                  Typewriter-Like Time-Sharing Terminals   5--31
                    David Beech   A Structural View of PL/I  . . . . . . . 33--64
             Doron J. Cohen and   
                  C. C. Gotlieb   A List Structure Form of Grammars for
                                  Syntactic Analysis . . . . . . . . . . . 65--82

ACM Computing Surveys
Volume 2, Number 2, June, 1970

                William S. Dorn   Editor's Preview \ldots  . . . . . . . . 83--87
           Sally Yeates Sedelow   The Computer in the Humanities and Fine
                                  Arts . . . . . . . . . . . . . . . . . . 89--110
               H. Hellerman and   
               H. J. Smith, Jr.   Throughput Analysis of Some Idealized
                                  Input, Output, and Compute Overlap
                                  Configurations . . . . . . . . . . . . . 111--118
                     Ned Chapin   Flowcharting With the ANSI Standard: a
                                  Tutorial . . . . . . . . . . . . . . . . 119--146

ACM Computing Surveys
Volume 2, Number 3, September, 1970

                William S. Dorn   Editor's Preview \ldots  . . . . . . . . 147--152
               Peter J. Denning   Virtual Memory . . . . . . . . . . . . . 153--189
               M. H. MacDougall   Computer System Simulation: an
                                  Introduction . . . . . . . . . . . . . . 191--209
                 Cecil L. Smith   Digital Control of Industrial Processes  211--241
                William S. Dorn   Editor's Postview \ldots . . . . . . . . 243--243
            Albert C. Christoph   Letter to the Editor:
                                  ``Assembler-Language Macroprogramming: A
                                  Tutorial Oriented Toward the IBM 360''   243--244
                   William Kent   Letter to the Editor:
                                  ``Assembler-Language Macroprogramming: A
                                  Tutorial Oriented Toward the IBM 360''   244--244
                Robert F. Rosin   Erratum: ``Contemporary Concepts of
                                  Microprogramming and Emulation'' . . . . 244--244

ACM Computing Surveys
Volume 2, Number 4, December, 1970

                Donald E. Knuth   Von Neumann's First Computer Program . . 247--260
                  Lyle B. Smith   A Survey of Interactive Graphical
                                  Systems for Mathematics  . . . . . . . . 261--301


ACM Computing Surveys
Volume 3, Number 1, March, 1971

                 Robin Williams   A Survey of Data Structures for Computer
                                  Graphics Systems . . . . . . . . . . . . 1--21
               Caxton C. Foster   An Unclever Time-Sharing System  . . . . 23--48

ACM Computing Surveys
Volume 3, Number 2, June, 1971

                    C. E. Price   Table Lookup Techniques  . . . . . . . . 49--64
              E. G. Coffman and   
              M. J. Elphick and   
                    A. Shoshani   System Deadlocks . . . . . . . . . . . . 67--78

ACM Computing Surveys
Volume 3, Number 3, September, 1971

            Henry C. Lucas, Jr.   Performance Evaluation and Monitoring    79--91
            Andries van Dam and   
                  David E. Rice   On-line Text Editing: a Survey . . . . . 93--114
               Henry F. Ledgard   Ten Mini-Languages: a Study of Topical
                                  Issues in Programming Languages  . . . . 115--146

ACM Computing Surveys
Volume 3, Number 4, December, 1971

                   W. A. Martin   Sorting  . . . . . . . . . . . . . . . . 147--174
               Peter J. Denning   Third Generation Computer Systems  . . . 175--216


ACM Computing Surveys
Volume 4, Number 1, March, 1972

               Peter J. Denning   A Note on Paging Drum Efficiency . . . . 1--3
                   Peter Wegner   The Vienna Definition Language . . . . . 5--63

ACM Computing Surveys
Volume 4, Number 2, June, 1972

             W. R. Schucany and   
             Paul D. Minton and   
        B. Stanley Shannon, Jr.   A Survey of Statistical Packages . . . . 65--79
              J. Nievergelt and   
                   J. C. Farrar   What Machines Can and Cannot Do  . . . . 81--96
             Bernard Elspas and   
             Karl N. Levitt and   
       Richard J. Waldinger and   
                Abraham Waksman   An Assessment of Techniques for Proving
                                  Program Correctness  . . . . . . . . . . 97--147

ACM Computing Surveys
Volume 4, Number 3, September, 1972

                  Eric A. Weiss   An Appreciation  . . . . . . . . . . . . 147--147
               Leon Presser and   
                  John R. White   Linkers and Loaders  . . . . . . . . . . 149--167
             C. A. R. Hoare and   
               D. C. S. Allison   Incomputability  . . . . . . . . . . . . 169--178
                Richard C. Holt   Some Deadlock Properties of Computer
                                  Systems  . . . . . . . . . . . . . . . . 179--196

ACM Computing Surveys
Volume 4, Number 4, December, 1972

              Byron W. Stutzman   Data Communication Control Procedures    197--220
                Bruce H. Barnes   A Programmer's View of Automata  . . . . 221--239
         Theodore C. Willoughby   Staffing the MIS Function  . . . . . . . 241--259


ACM Computing Surveys
Volume 5, Number 1, March, 1973

            Elliott I. Organick   Editorial Policy \ldots  . . . . . . . . 1--3
              J. J. Horning and   
                     B. Randell   Process Structuring  . . . . . . . . . . 5--30
                     J. L. Baer   A Survey of Some Theoretical Aspects of
                                  Multiprocessing  . . . . . . . . . . . . 31--80

ACM Computing Surveys
Volume 5, Number 2, June, 1973

               Azriel Rosenfeld   Progress in Picture Processing: 1969--71 81--108
               Udo W. Pooch and   
                      Al Nieder   A Survey of Indexing Techniques for
                                  Sparse Matrices  . . . . . . . . . . . . 109--133

ACM Computing Surveys
Volume 5, Number 3, September, 1973

               William W. White   A Status Report on Computing Algorithms
                                  for Mathematical Programming . . . . . . 135--166
               J. Daniel Couger   Evolution of Business System Analysis
                                  Techniques . . . . . . . . . . . . . . . 167--198

ACM Computing Surveys
Volume 5, Number 4, December, 1973

                 E. M. Timmreck   Computer Selection Methodology . . . . . 200--222
              Per Brinch Hansen   Concurrent Programming Concepts  . . . . 223--245


ACM Computing Surveys
Volume 6, Number 1, March, 1974

         Ivan E. Sutherland and   
          Robert F. Sproull and   
           Robert A. Schumacker   A Characterization of Ten Hidden-Surface
                                  Algorithms . . . . . . . . . . . . . . . 1--55
                Herbert Freeman   Computer Processing of Line-Drawing
                                  Images . . . . . . . . . . . . . . . . . 57--97

ACM Computing Surveys
Volume 6, Number 2, June, 1974

                  A. V. Aho and   
                  S. C. Johnson   LR Parsing . . . . . . . . . . . . . . . 99--124
                   Udo W. Pooch   Translation of Decision Tables . . . . . 125--151

ACM Computing Surveys
Volume 6, Number 3, September, 1974

           Daniel G. Bobrow and   
                Bertram Raphael   New Programming Languages for Artificial
                                  Intelligence Research  . . . . . . . . . 153--174
            Dennis G. Severance   Identifier Search Mechanisms: a Survey
                                  and Generalized Model  . . . . . . . . . 175--194
                  J. Nievergelt   Binary Search Trees and File
                                  Organisation . . . . . . . . . . . . . . 195--207

ACM Computing Surveys
Volume 6, Number 4, December, 1974

               Peter J. Denning   Guest Editor's Overview \ldots . . . . . 209--211
                    P. J. Brown   Programming and Documenting Software
                                  Projects . . . . . . . . . . . . . . . . 213--220
                     J. M. Yohe   An Overview of Programming Practices . . 221--245
                  Niklaus Wirth   On the Composition of Well-Structured
                                  Programs . . . . . . . . . . . . . . . . 247--259
                Donald E. Knuth   Structured Programming with go to
                                  Statements . . . . . . . . . . . . . . . 261--301
         Brian W. Kernighan and   
                  P. J. Plauger   Programming Style: Examples and
                                  Counterexamples  . . . . . . . . . . . . 303--319
                   Udo W. Pooch   Corrigendum: ``Translation of Decision
                                  Tables'' . . . . . . . . . . . . . . . . 321--321


ACM Computing Surveys
Volume 7, Number 1, March, 1975

            Elliott I. Organick   Editor's Overview  . . . . . . . . . . . 1--1
               W. D. Maurer and   
                    T. G. Lewis   Hash Table Methods . . . . . . . . . . . 5--19
                   Leon Presser   Multiprogramming Coordination  . . . . . 21--44
               Calvin N. Mooers   Computer Software and Copyright  . . . . 45--72

ACM Computing Surveys
Volume 7, Number 2, June, 1975

              John W. Boyse and   
                  David R. Warn   A Straightforward Model for Computer
                                  Performance Prediction . . . . . . . . . 73--93
                  Ira W. Cotton   Microeconomics and the Market for
                                  Computer Services  . . . . . . . . . . . 95--111

ACM Computing Surveys
Volume 7, Number 3, September, 1975

                    J. C. Huang   An Approach to Program Testing . . . . . 113--128
       Stephen R. Kimbleton and   
           G. Michael Schneider   Computer Communication Networks:
                                  Approaches, Objectives, and Performance
                                  Considerations . . . . . . . . . . . . . 129--173

ACM Computing Surveys
Volume 7, Number 4, December, 1975

            Elliott I. Organick   Editorial Policy Update  . . . . . . . . 173--173
                 Suhas S. Patil   Guest Editor's Note \ldots . . . . . . . 175--175
               Robert M. Keller   Look-Ahead Processors  . . . . . . . . . 177--195
         George A. Anderson and   
              E. Douglas Jensen   Computer Interconnection Structures:
                                  Taxonomy, Characteristics, and Examples  197--213
         Kenneth J. Thurber and   
                   Leon D. Wald   Associative and Parallel Processors  . . 215--255
            Elliott I. Organick   Editor's Note  . . . . . . . . . . . . . 257--257
                   Leon Presser   Corrigendum: ``Multiprogramming
                                  Coordination'' . . . . . . . . . . . . . 257--257


ACM Computing Surveys
Volume 8, Number 1, March, 1976

                   E. H. Sibley   Guest Editor's Introduction: The
                                  Development of Data-Base Technology  . . 1--5
               James P. Fry and   
                Edgar H. Sibley   Evolution of Data-Base Management
                                  Systems  . . . . . . . . . . . . . . . . 7--42
           Donald D. Chamberlin   Relational Data-Base Management Systems  43--66
           Robert W. Taylor and   
               Randall L. Frank   CODASYL Data-Base Management Systems . . 67--103
          D. C. Tsichritzis and   
                F. H. Lochovsky   Hierarchical Data-Base Management: a
                                  Survey . . . . . . . . . . . . . . . . . 105--123
            Ann S. Michaels and   
           Benjamin Mittman and   
              C. Robert Carlson   A Comparison of the Relational and
                                  CODASYL Approaches to Data-Base
                                  Management . . . . . . . . . . . . . . . 125--151

ACM Computing Surveys
Volume 8, Number 2, June, 1976

            Elliott I. Organick   Editorial Overview . . . . . . . . . . . 153--153
            Andrew S. Tanenbaum   A Tutorial on Algol 68 . . . . . . . . . 155--190
           Michael Marcotty and   
           Henry F. Ledgard and   
             Gregor V. Bochmann   A Sampler of Formal Definitions  . . . . 191--276
                S. S. Reddi and   
                  E. A. Feustel   A Conceptual Framework for Computer
                                  Architecture . . . . . . . . . . . . . . 277--300

ACM Computing Surveys
Volume 8, Number 3, September, 1976

                 Raymond T. Yeh   Guest Editorial \ldots . . . . . . . . . 301--303
           Lloyd D. Fosdick and   
              Leon J. Osterweil   Data Flow Analysis in Software
                                  Reliability  . . . . . . . . . . . . . . 305--330
          Sidney L. Hantler and   
                  James C. King   An Introduction to Proving the
                                  Correctness of Programs  . . . . . . . . 331--353

ACM Computing Surveys
Volume 8, Number 4, December, 1976

                 Raymond T. Yeh   Guest Editorial \ldots . . . . . . . . . 355--357
               Peter J. Denning   Fault Tolerant Operating Systems . . . . 359--389
                       H. Hecht   Fault-Tolerant Software for Real-Time
                                  Applications . . . . . . . . . . . . . . 391--407
             Theodore A. Linden   Operating System Structures to Support
                                  Security and Reliable Software . . . . . 409--445


ACM Computing Surveys
Volume 9, Number 1, March, 1977

                   Tse-Yun Feng   Guest Editorial: an Overview of Parallel
                                  Processors and Processing  . . . . . . . 1--2
                  S. S. Yau and   
                     H. S. Fung   Associative Processor Architecture --- a
                                  Survey . . . . . . . . . . . . . . . . . 3--27
                  David J. Kuck   A Survey of Parallel Machine
                                  Organization and Programming . . . . . . 29--59
          C. V. Ramamoorthy and   
                       H. F. Li   Pipeline Architecture  . . . . . . . . . 61--102
          Philip H. Enslow, Jr.   Multiprocessor Organization --- a Survey 103--129

ACM Computing Surveys
Volume 9, Number 2, June, 1977

               Peter J. Denning   About This Issue \ldots  . . . . . . . . 131--131
               Peter J. Denning   Editorial Policy . . . . . . . . . . . . 133--135
               Robert Sedgewick   Permutation Generation Methods . . . . . 137--164
                  Roy Levin and   
               Peter J. Denning   Surveyor's Forum: an Amplification on
                                  Hydra's Capabilities . . . . . . . . . . 165--165
                  James Donahue   Surveyor's Forum: a Criticism of Sampler 166--167
           Michael Marcotty and   
               Henry F. Ledgard   Surveyor's Forum: a Criticism of Sampler 167--168
           Michael Marcotty and   
           Henry F. Ledgard and   
             Gregor V. Bochmann   Corrigendum: ``A Sampler of Formal
                                  Definitions''  . . . . . . . . . . . . . 168--168

ACM Computing Surveys
Volume 9, Number 3, September, 1977

               Peter J. Denning   About This Issue \ldots  . . . . . . . . 171--172
         Mario J. Gonzalez, Jr.   Deterministic Processor Scheduling . . . 173--204
              Lester Lipsky and   
                   J. D. Church   Applications of a Queueing Network Model
                                  for a Computer System  . . . . . . . . . 205--221
              James L. Peterson   Petri Nets . . . . . . . . . . . . . . . 223--252
                   J. K. Iliffe   Surveyor's Forum: an Error Recovery  . . 253--254
                 Jack B. Dennis   Surveyor's Forum: An Error Recovery  . . 254--254
               Peter J. Denning   Surveyor's Forum: an Error Recovery  . . 254--255
            Andrew S. Tanenbaum   Corrigenda: ``A Tutorial on Algol 68''   255--256

ACM Computing Surveys
Volume 9, Number 4, December, 1977

               Peter J. Denning   About This Issue \ldots  . . . . . . . . 257--257
            D. G. Severance and   
                   J. V. Carlis   A Practical Approach to Selecting Record
                                  Access Paths . . . . . . . . . . . . . . 259--272
    William M. Taggart, Jr. and   
                Marvin O. Tharp   A Survey of Information Requirements
                                  Analysis Techniques  . . . . . . . . . . 273--290
                    Bruce Weide   A Survey of Analysis Techniques for
                                  Discrete Algorithms  . . . . . . . . . . 291--313
               Robert Sedgewick   Corrigenda: ``Permutation Generation
                                  Methods''  . . . . . . . . . . . . . . . 314--314
              Thomas W. Parsons   Surveyor's Forum: a Forgotten Generation
                                  of Permutations  . . . . . . . . . . . . 315--315
                I. R. MacCallum   Surveyor's Forum: a Forgotten Generation
                                  of Permutations  . . . . . . . . . . . . 316--317


ACM Computing Surveys
Volume 10, Number 1, March, 1978

               Peter J. Denning   About This Issue \ldots  . . . . . . . . 1--2
            Ann Fitzsimmons and   
                       Tom Love   A Review and Evaluation of Software
                                  Science  . . . . . . . . . . . . . . . . 3--18
           John Leslie King and   
              Edward L. Schrems   Cost-Benefit Analysis in Information
                                  Systems Development and Operation  . . . 19--34
                 Erik Sandewall   Programming in an Interactive
                                  Environment: the ``\sc Lisp'' Experience 35--71
              Ronald J. Srodawa   Positive Experiences with a
                                  Multiprocessing System . . . . . . . . . 73--82
        Montgomery Phister, Jr.   Surveyor's Forum: Putting Costs Through
                                  Effectively  . . . . . . . . . . . . . . 83--83
              Lester Lipsky and   
                James D. Church   Surveyor's Forum: Putting Costs Through
                                  Effectively: Author's Reply  . . . . . . 83--84
              H. J. Genrich and   
              P. S. Thiagarajan   Surveyor's Forum: Net Progress . . . . . 84--85
                 James Peterson   Surveyor's Forum: Net Progress: Author's
                                  Reply  . . . . . . . . . . . . . . . . . 85--85

ACM Computing Surveys
Volume 10, Number 2, June, 1978

               Peter J. Denning   About This Issue \ldots  . . . . . . . . 87--87
               Peter J. Denning   Editorial Policy . . . . . . . . . . . . 89--92
                N. C. Davis and   
                  S. E. Goodman   The Soviet Bloc's Unified System of
                                  Computers  . . . . . . . . . . . . . . . 93--122
                 B. Randell and   
                  P. A. Lee and   
                P. C. Treleaven   Reliability Issues in Computing System
                                  Design . . . . . . . . . . . . . . . . . 123--165
         Joost S. M. Verhofstad   Recovery Techniques for Database Systems 167--195
            Marvin V. Zelkowitz   Perspectives in Software Engineering . . 197--216
                  Nathan Relles   Surveyor's Forum: Devising the Rhetoric
                                  of Rhetorical Devices  . . . . . . . . . 217--217

ACM Computing Surveys
Volume 10, Number 3, September, 1978

                G. Scott Graham   Guest Editor's Overview\ldots Queuing
                                  Network Models of Computer System
                                  Performance  . . . . . . . . . . . . . . 219--224
           Peter J. Denning and   
               Jeffrey P. Buzen   The Operational Analysis of Queueing
                                  Network Models . . . . . . . . . . . . . 225--261
               Clifford A. Rose   A Measurement Procedure for Queueing
                                  Network Models of Computer Systems . . . 263--280
             K. Mani Chandy and   
               Charles H. Sauer   Approximate Methods for Analyzing
                                  Queueing Network Models of Computing
                                  Systems  . . . . . . . . . . . . . . . . 281--317
               Jeffrey P. Buzen   A Queueing Network Model of MVS  . . . . 319--331
                        Y. Bard   The VM/370 Performance Predictor . . . . 333--342
                     J. W. Wong   Queueing Network Modeling of Computer
                                  Communication Networks . . . . . . . . . 343--351
               Richard R. Muntz   Queueing Networks: a Critique of the
                                  State of the Art and Directions for the
                                  Future . . . . . . . . . . . . . . . . . 353--359
                  John Gaschnig   Surveyor's Forum: Experimental Analysis
                                  Discretely Done  . . . . . . . . . . . . 361--361
                 Bruce W. Weide   Surveyor's Forum: Experimental Analysis
                                  Discretely Done: Author's Reply  . . . . 361--362

ACM Computing Surveys
Volume 10, Number 4, December, 1978

               Peter J. Denning   About This Issue \ldots  . . . . . . . . 363--364
          William M. Newman and   
                Andries van Dam   Recent Efforts Towards Graphics
                                  Standardization  . . . . . . . . . . . . 365--380
          James C. Michener and   
                Andries van Dam   Functional Overview of the Core System
                                  with Glossary  . . . . . . . . . . . . . 381--387
         R. Daniel Bergeron and   
              Peter R. Bono and   
                 James D. Foley   Graphics Programming Using the Core
                                  System . . . . . . . . . . . . . . . . . 389--443
          James C. Michener and   
                 James D. Foley   Some Major Issues in the Design of the
                                  Core Graphics System . . . . . . . . . . 445--463
             Ingrid Carlbom and   
                Joseph Paciorek   Planar Geometric Projections and Viewing
                                  Transformations  . . . . . . . . . . . . 465--502
                Paul B. Moranda   Surveyor's Forum: Is Software Science
                                  Hard?  . . . . . . . . . . . . . . . . . 503--504
                    T. P. Baker   Surveyor's Forum: Is Software Science
                                  Hard?  . . . . . . . . . . . . . . . . . 504--504
            Ann Fitzsimmons and   
                       Tom Love   Surveyor's Forum: Is Software Science
                                  Hard?  . . . . . . . . . . . . . . . . . 504--505
            Richard M. Stallman   Surveyor's Forum: Structured Editing
                                  with a Lisp  . . . . . . . . . . . . . . 505--507
                 Erik Sandewall   Surveyor's Forum: Structured Editing
                                  with a \sc Lisp  . . . . . . . . . . . . 507--508
          C. V. Ramamoorthy and   
                       H. F. Li   Corrigenda: ``Pipeline Architecture''    508--508


ACM Computing Surveys
Volume 11, Number 1, March, 1979

               Peter J. Denning   About This Issue \ldots  . . . . . . . . 1--1
                    Dan Bernard   Management Issues in Cooperative
                                  Computing  . . . . . . . . . . . . . . . 3--17
           Norman I. Badler and   
             Stephen W. Smoliar   Digital Representations of Human
                                  Movement . . . . . . . . . . . . . . . . 19--38
               Subrata Dasgupta   The Organization of Microprogram Stores  39--65
               Edward A. Bender   Surveyor's Forum: a Recurrent Problem    67--68
                 Bruce W. Weide   Surveyor's Forum: a Recurrent Problem    68--68
               Irving K. Wendel   Surveyor's Forum: The Real Costs of
                                  Software . . . . . . . . . . . . . . . . 68--68
               Marvin Zelkowitz   Surveyor's Forum: The Real Costs of
                                  Software . . . . . . . . . . . . . . . . 69--69
                  Yonathan Bard   Surveyor's Forum: Stochastic or
                                  Operational? . . . . . . . . . . . . . . 69--70
           Jeffrey P. Buzen and   
               Peter J. Denning   Surveyor's Forum: Stochastic or
                                  Operational? . . . . . . . . . . . . . . 70--70
               Jeffrey P. Buzen   Surveyor's Forum: a Predictable Problem  71--72
               Richard R. Muntz   Surveyor's Forum: a Predictable Problem  72--72

ACM Computing Surveys
Volume 11, Number 2, June, 1979

                 Adele Goldberg   About This Issue \ldots  . . . . . . . . 73--74
                 Adele Goldberg   Editorial Policy . . . . . . . . . . . . 75--78
                  Jacques Cohen   Non-De\-ter\-min\-is\-tic Algorithms . . 79--94
        Francisco Walter Molina   A Survey of Resource Directive
                                  Decomposition in Mathematical
                                  Programming  . . . . . . . . . . . . . . 95--104
             Lynn J. McKell and   
            James V. Hansen and   
              Lester E. Heitger   Charging for Computing Resources . . . . 105--120
                  Douglas Comer   Ubiquitous B-Tree  . . . . . . . . . . . 121--137
                George Nagy and   
                   Sharad Wagle   Geographic Data Processing . . . . . . . 139--181

ACM Computing Surveys
Volume 11, Number 3, September, 1979

                 Adele Goldberg   About This Issue \ldots  . . . . . . . . 183--183
                        Won Kim   Relational Database Systems  . . . . . . 187--211
                     A. G. Dale   Database Management Systems Development
                                  in the USSR  . . . . . . . . . . . . . . 213--226
         Dorothy E. Denning and   
               Peter J. Denning   Data Security  . . . . . . . . . . . . . 227--249
                Siba N. Mohanty   Models and Measurements for Quality
                                  Assessment of Software . . . . . . . . . 251--275
                Robert Fenichel   Surveyor's Forum: Heads I Win, Tails You
                                  Lose . . . . . . . . . . . . . . . . . . 277--277
               Stuart H. Zweben   Surveyor's Forum: Heads I Win, Tails You
                                  Lose . . . . . . . . . . . . . . . . . . 277--278
                  H. Christiaen   Surveyor's Forum: Projecting Problems    278--279
                 Ingrid Carlbom   Surveyor's Forum: Projecting Problems    279--280
             Ingrid Carlbom and   
                Joseph Paciorek   Corrigenda: ``Geometric Projection and
                                  Viewing Transformations''  . . . . . . . 280--280

ACM Computing Surveys
Volume 11, Number 4, December, 1979

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 281--281
               Peter J. Denning   Editor's Overview --- Special Section on
                                  Data Encryption  . . . . . . . . . . . . 283--283
                 Abraham Lempel   Cryptology in Transition . . . . . . . . 285--303
            Gustavus J. Simmons   Symmetric and Asymmetric Encryption  . . 305--330
            Gerald J. Popek and   
               Charles S. Kline   Encryption and Secure Computer Networks  331--356
          Herbert S. Bright and   
              Richard L. Enison   Quasi-Random Number Sequences from a
                                  Long-Period TLP Generator with Remarks
                                  on Application to Cryptography . . . . . 357--370
             Gary H. Sockut and   
             Robert P. Goldberg   Database Reorganization --- Principles
                                  and Practice . . . . . . . . . . . . . . 371--395
          Jon Louis Bentley and   
             Jerome H. Friedman   Data Structures for Range Searching  . . 397--409
               David S. Alberts   Surveyor's Forum: a Question of
                                  Transition . . . . . . . . . . . . . . . 411--411
            Marvin V. Zelkowitz   Surveyor's Forum: a Question of
                                  Transition . . . . . . . . . . . . . . . 411--412
                  Douglas Comer   Surveyor's Forum: The Tree Branches  . . 412--412
                Maylun Buck-Lew   Surveyor's Forum: a Dance Prelude  . . . 412--413


ACM Computing Surveys
Volume 12, Number 1, March, 1980

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 1--2
              Fred J. Maryanski   Backend Database Systems . . . . . . . . 3--25
          Clarence A. Ellis and   
                   Gary J. Nutt   Office Information Systems and Computer
                                  Science  . . . . . . . . . . . . . . . . 27--60
                      Rob Kling   Social Analyses of Computing:
                                  Theoretical Perspectives in Recent
                                  Empirical Research . . . . . . . . . . . 61--110
                E. B. Fernandez   Surveyor's Forum: Related Information    111--112
                        Won Kim   Surveyor's Forum: Related Information    112--112
                Oris D. Friesen   Surveyor's Forum: Related Information    112--113

ACM Computing Surveys
Volume 12, Number 2, June, 1980

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 115--116
              Adele J. Goldberg   Editorial Policy . . . . . . . . . . . . 117--120
             Anita K. Jones and   
                  Peter Schwarz   Experience Using Multiprocessor Systems
                                  --- a Status Report  . . . . . . . . . . 121--165
                     C. K. Wong   Minimizing Expected Head Movement in
                                  One-Dimensional and Two-Dimensional Mass
                                  Storage Systems  . . . . . . . . . . . . 167--178
             Toby J. Teorey and   
                   James P. Fry   The Logical Record Access Approach to
                                  Database Design  . . . . . . . . . . . . 179--211
               Lee D. Erman and   
       Frederick Hayes-Roth and   
           Victor R. Lesser and   
                   D. Raj Reddy   The Hearsay-II Speech-Understanding
                                  System: Integrating Knowledge to Resolve
                                  Uncertainty  . . . . . . . . . . . . . . 213--253
                   Stanley Dunn   Surveyor's Forum: Working on
                                  Interpretations  . . . . . . . . . . . . 255--255
                   Siba Mohanty   Surveyor's Forum: Working on
                                  Interpretations  . . . . . . . . . . . . 256--256

ACM Computing Surveys
Volume 12, Number 3, September, 1980

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 257--258
                  Stanley Habib   Special Section on Microprogramming  . . 259--259
             David Landskov and   
             Scott Davidson and   
              Bruce Shriver and   
             Patrick W. Mallett   Local Microcode Compaction Techniques    261--294
               Subrata Dasgupta   Some Aspects of High-Level
                                  Microprogramming . . . . . . . . . . . . 295--323
                Wesley A. Clark   From Electron Mobility to Logical
                                  Structure: a View of Integrated Circuits 325--356
                  Walter Wilson   Surveyor's Forum: Determining a Search   357--358
                  Jacques Cohen   Surveyor's Forum: Determining a Search   358--358

ACM Computing Surveys
Volume 12, Number 4, December, 1980

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 359--360
                C. S. Wetherell   Probabilistic Languages: a Review and
                                  Some Open Questions  . . . . . . . . . . 361--379
         Patrick A. V. Hall and   
               Geoff R. Dowling   Approximate String Matching  . . . . . . 381--402
                     R. S. Bird   Tabulation Techniques for Recursive
                                  Programs . . . . . . . . . . . . . . . . 403--417
               George S. Lueker   Some Techniques for Solving Recurrences  419--436
       Aristides A. G. Requicha   Representations for Rigid Solids:
                                  Theory, Methods, and Systems . . . . . . 437--464
             Toby J. Teorey and   
                   James P. Fry   Corrigenda: ``The Logical Record Access
                                  Approach to Database Design''  . . . . . 465--465


ACM Computing Surveys
Volume 13, Number 1, March, 1981

                Thomas P. Moran   Guest Editor's Introduction: an Applied
                                  Psychology of the User . . . . . . . . . 1--11
                Phyllis Reisner   Human Factors Studies of Database Query
                                  Languages: a Survey and Assessment . . . 13--31
            David W. Embley and   
                    George Nagy   Behavioral Aspects of Text Editors . . . 33--70
               William B. Rouse   Human-Computer Interaction in the
                                  Control of Dynamic Systems . . . . . . . 71--99
                    B. A. Sheil   The Psychological Study of Programming   101--120
               Richard E. Mayer   The Psychology of How Novices Learn
                                  Computer Programming . . . . . . . . . . 121--141

ACM Computing Surveys
Volume 13, Number 2, June, 1981

                 Adele Goldberg   About This Issue \ldots  . . . . . . . . 143--144
                 Adele Goldberg   Editorial Policy . . . . . . . . . . . . 145--148
               Walter H. Kohler   A Survey of Techniques for
                                  Synchronization and Recovery in
                                  Decentralized Computer Systems . . . . . 149--183
        Philip A. Bernstein and   
                 Nathan Goodman   Concurrency Control in Distributed
                                  Database Systems . . . . . . . . . . . . 185--221
                   Jim Gray and   
               Paul McJones and   
               Mike Blasgen and   
              Bruce Lindsay and   
              Raymond Lorie and   
                  Tom Price and   
             Franco Putzolu and   
                 Irving Traiger   The Recovery Manager of the System R
                                  Database Manager . . . . . . . . . . . . 223--242
                     R. S. Bird   Surveyor's Forum: a Recurring Bug  . . . 243--243
                 Helmut Richter   Surveyor's Forum: a Recurring Bug  . . . 243--243

ACM Computing Surveys
Volume 13, Number 3, September, 1981

                 Adele Goldberg   About This Issue \ldots  . . . . . . . . 245--245
               Carl E. Landwehr   Formal Models for Computer Security  . . 247--278
     Maureen Harris Cheheyl and   
              Morrie Gasser and   
             George A. Huff and   
             Jonathan K. Millen   Verifying Security . . . . . . . . . . . 279--339
                  Jacques Cohen   Garbage Collection of Linked Data
                                  Structures . . . . . . . . . . . . . . . 341--367
       Aristides A. G. Requicha   Surveyor's Forum: an Update on
                                  SynthaVision . . . . . . . . . . . . . . 369--369
           Herbert A. Steinberg   Surveyor's Forum: an Update on
                                  SynthaVision . . . . . . . . . . . . . . 369--369
              Douglas J. Keenan   Surveyor's Forum: Generating Solutions   370--370
               George S. Lueker   Surveyor's Forum: Generating Solutions   370--370

ACM Computing Surveys
Volume 13, Number 4, December, 1981

                 Adele Goldberg   About This Issue \ldots  . . . . . . . . 371--372
             Narendra Ahuja and   
                B. J. Schachter   Image Models . . . . . . . . . . . . . . 373--397
              Sargur N. Srihari   Representation of Three-Dimensional
                                  Digital Images . . . . . . . . . . . . . 399--424
            Edward H. Frank and   
              Robert F. Sproull   Testing and Debugging Custom Integrated
                                  Circuits . . . . . . . . . . . . . . . . 425--451
            Andrew S. Tanenbaum   Network Protocols  . . . . . . . . . . . 453--489
           Christiane Floyd and   
              Reinhard Keil and   
               Erhard Nullmeier   Surveyor's Forum: Augmentation or
                                  Dehumanization?  . . . . . . . . . . . . 491--492
                Thomas P. Moran   Surveyor's Forum: Augmentation or
                                  Dehumanization?  . . . . . . . . . . . . 492--493
                 Bruce Leverett   Surveyor's Forum: Interpreting
                                  Experimental Data  . . . . . . . . . . . 493--494
            David W. Embley and   
                    George Nagy   Surveyor's Forum: Interpreting
                                  Experimental Data  . . . . . . . . . . . 494--494


ACM Computing Surveys
Volume 14, Number 1, March, 1982

                 Adele Goldberg   About This Issue \ldots  . . . . . . . . 1--2
                  Michael Brady   Computational Approaches to Image
                                  Understanding  . . . . . . . . . . . . . 3--71
              Alan R. Feuer and   
               Narain H. Gehani   Comparison of the Programming Languages
                                  C and Pascal . . . . . . . . . . . . . . 73--92
        Philip C. Treleaven and   
       David R. Brownbridge and   
             Richard P. Hopkins   Data-Driven and Demand-Driven Computer
                                  Architecture . . . . . . . . . . . . . . 93--143
                  David P. Reed   Surveyor's Forum: Recovering an Error    145--146
               Walter H. Kohler   Surveyor's Forum: Recovering an Error    146--147

ACM Computing Surveys
Volume 14, Number 2, June, 1982

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 149--150
              Adele J. Goldberg   Editorial Policy . . . . . . . . . . . . 151--157
         W. Richards Adrion and   
         Martha A. Branstad and   
            John C. Cherniavsky   Validation, Verification, and Testing of
                                  Computer Software  . . . . . . . . . . . 159--192
              William E. Howden   Validation of Scientific Programs  . . . 193--227
          Douglas D. Dunlop and   
               Victor R. Basili   A Comparative Analysis of Functional
                                  Correctness  . . . . . . . . . . . . . . 229--244
             Frank W. Allen and   
          Mary E. S. Loomis and   
             Michael V. Mannino   The Integrated Dictionary/Directory
                                  System . . . . . . . . . . . . . . . . . 245--286
          Lawrence W. Dowdy and   
              Derrell V. Foster   Comparative Models of the File
                                  Assignment Problem . . . . . . . . . . . 287--313
                   Heinz Bender   Surveyor's Forum: Technical Transactions 315--316
                  David Gifford   Surveyor's Forum: Technical Transactions 316--316
           Philip Bernstein and   
                 Nathan Goodman   Surveyor's Forum: Technical Transactions 317--318

ACM Computing Surveys
Volume 14, Number 3, September, 1982

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 319--320
           Norman Meyrowitz and   
                Andries Van Dam   Interactive Editing Systems: Part I  . . 321--352
           Norman Meyrowitz and   
                Andries van Dam   Interactive Editing Systems: Part II . . 353--415
             Richard Furuta and   
           Jeffrey Scofield and   
                      Alan Shaw   Document Formatting Systems: Survey,
                                  Concepts, and Issues . . . . . . . . . . 417--472
                 Alan Jay Smith   Cache Memories . . . . . . . . . . . . . 473--530

ACM Computing Surveys
Volume 14, Number 4, December, 1982

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 531--532
             T. A. Marsland and   
                    M. Campbell   Parallel Search of Strongly Ordered Game
                                  Trees  . . . . . . . . . . . . . . . . . 533--551
         Stephen T. Barnard and   
             Martin A. Fischler   Computational Stereo . . . . . . . . . . 553--572
        Mahadevan Ganapathi and   
         Charles N. Fischer and   
               John L. Hennessy   Retargetable Compiler Code Generation    573--592
            Bernard M. E. Moret   Decision Trees and Diagrams  . . . . . . 593--623
              James L. Peterson   Surveyor's Forum: Idiomatic Programming  625--625
              Alan R. Feuer and   
               Narain H. Gehani   Surveyor's Forum: Idiomatic Programming  625--626


ACM Computing Surveys
Volume 15, Number 1, March, 1983

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 1--2
         Gregory R. Andrews and   
              Fred B. Schneider   Concepts and Notations for Concurrent
                                  Programming  . . . . . . . . . . . . . . 3--43
             Salvatore T. March   Techniques for Structuring Database
                                  Records  . . . . . . . . . . . . . . . . 45--79
    J. (Yiannis) G. Kollias and   
           Michalis Hatzopoulos   Surveyor's Forum: The File Assignment
                                  Problem  . . . . . . . . . . . . . . . . 81--82
          Lawrence W. Dowdy and   
              Derrell V. Foster   Surveyor's Forum: The File Assignment
                                  Problem  . . . . . . . . . . . . . . . . 82--82
                  Govind Sharma   Surveyor's Forum: Image Models . . . . . 83--84
             Narendra Ahuja and   
                B. J. Schachter   Surveyor's Forum: Image Models . . . . . 84--84

ACM Computing Surveys
Volume 15, Number 2, June, 1983

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 85--86
           Anthony I. Wasserman   Editorial Policy . . . . . . . . . . . . 87--94
            George Broomell and   
                J. Robert Heath   Classification Categories and Historical
                                  Development of Circuit Switching
                                  Topologies . . . . . . . . . . . . . . . 95--133
          Victor L. Voydock and   
                Stephen T. Kent   Security Mechanisms in High-Level
                                  Network Protocols  . . . . . . . . . . . 135--171

ACM Computing Surveys
Volume 15, Number 3, September, 1983

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 173--174
            Magdy S. Abadir and   
             Hassan K. Reghbati   Functional Testing of Semiconductor
                                  Random Access Memories . . . . . . . . . 175--198
                 H. Partsch and   
           R. Steinbrüggen   Program Transformation Systems . . . . . 199--236
               Dana Angluin and   
                  Carl H. Smith   Inductive Inference: Theory and Methods  237--269
               Bennet P. Lientz   Issues in Software Maintenance . . . . . 271--278
            William A. Wulf and   
               Joe Newcomer and   
             Bruce Leverett and   
               Rick Cattell and   
                   Paul Knueven   Surveyor's Forum: Retargetable Code
                                  Generators . . . . . . . . . . . . . . . 279--280
               M. Ganapathi and   
             J. L. Hennessy and   
                  C. N. Fischer   Surveyor's Forum: Retargetable Code
                                  Generators . . . . . . . . . . . . . . . 280--281
          Christopher W. Fraser   Surveyor's Forum: Retargetable Code
                                  Generators . . . . . . . . . . . . . . . 281--283
               M. Ganapathi and   
             J. L. Hennessy and   
                  C. N. Fischer   Surveyor's Forum: Retargetable Code
                                  Generators . . . . . . . . . . . . . . . 283--284

ACM Computing Surveys
Volume 15, Number 4, December, 1983

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 285--286
               Theo Haerder and   
                 Andreas Reuter   Principles of Transaction Oriented
                                  Database Recovery  . . . . . . . . . . . 287--317
               John Leslie King   Centralized versus decentralized
                                  computing:organizational considerations
                                  and management options . . . . . . . . . 319--349
                  D. L. Lee and   
                F. H. Lochovsky   Voice Response Systems . . . . . . . . . 351--374
               M. Stella Atkins   Surveyor's Forum: Notations for
                                  Concurrent Programming . . . . . . . . . 375--376
         Gregory R. Andrews and   
              Fred B. Schneider   Surveyor's Forum: Notations for
                                  Concurrent Programming . . . . . . . . . 376--377
         Gregory R. Andrews and   
              Fred B. Schneider   Corrigenda: ``Concepts and notations for
                                  concurrent programs''  . . . . . . . . . 377--377


ACM Computing Surveys
Volume 16, Number 1, March, 1984

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 1--2
              William Stallings   Local Networks . . . . . . . . . . . . . 3--41
            James F. Kurose and   
            Mischa Schwartz and   
                 Yechiam Yemini   Multiple-Access Protocols and
                                  Time-Con\-strained Communication . . . . 43--70
                        Won Kim   Highly Available Systems for Database
                                  Applications . . . . . . . . . . . . . . 71--98

ACM Computing Surveys
Volume 16, Number 2, June, 1984

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 99--100
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 101--102
           Anthony I. Wasserman   Editorial Policy . . . . . . . . . . . . 103--110
             Matthias Jarke and   
               Jürgen Koch   Query Optimization in Database Systems   111--152
      Hervé Gallaire and   
                Jack Minker and   
             Jean-Marie Nicolas   Logic and Databases: a Deductive
                                  Approach . . . . . . . . . . . . . . . . 153--185
                    Hanan Samet   The Quadtree and Related Hierarchical
                                  Data Structures  . . . . . . . . . . . . 187--260

ACM Computing Surveys
Volume 16, Number 3, September, 1984

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 261--262
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 263--264
                Ben Shneiderman   Response Time and Display Rate in Human
                                  Performance with Computers . . . . . . . 265--285
                Dina Bitton and   
            David J. DeWitt and   
             David K. Hsiao and   
               Jaishankar Menon   A Taxonomy of Parallel Sorting . . . . . 287--318
           Michael J. Quinn and   
                   Narsingh Deo   Parallel Graph Algorithms  . . . . . . . 319--348

ACM Computing Surveys
Volume 16, Number 4, December, 1984

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 349--350
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 351--351
                 Liba Svobodova   File Servers for Network-Based
                                  Distributed Systems  . . . . . . . . . . 353--398
                   C. T. Yu and   
                    C. C. Chang   Distributed Query Processing . . . . . . 399--433


ACM Computing Surveys
Volume 17, Number 1, March, 1985

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 1--2
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 3--4
             Gopal K. Gupta and   
            Ron Sacks-Davis and   
               Peter E. Tischer   A Review of Recent Developments in
                                  Solving ODEs . . . . . . . . . . . . . . 5--47
             Christos Faloutsos   Access Methods for Text  . . . . . . . . 49--74
               Paul J. Besl and   
                 Ramesh C. Jain   Three-Dimensional Object Recognition . . 75--145

ACM Computing Surveys
Volume 17, Number 2, June, 1985

                  Curtis Abbott   Guest Editor's Introduction to the
                                  Special Issue on Computer Music  . . . . 147--151
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 153--154
           Anthony I. Wasserman   Editorial Policy . . . . . . . . . . . . 155--162
                   Curtis Roads   Research in Music and Artificial
                                  Intelligence . . . . . . . . . . . . . . 163--190
                 John W. Gordon   System Architectures for Computer Music  191--233
                 Gareth Loy and   
                  Curtis Abbott   Programming Languages for Computer Music
                                  Synthesis, Performance, and Composition  235--265
             Bruce W. Pennycook   Computer-Music Interfaces: a Survey  . . 267--289

ACM Computing Surveys
Volume 17, Number 3, September, 1985

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 291--292
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 293--294
            James H. Hester and   
           Daniel S. Hirschberg   Self-Organizing Linear Search  . . . . . 295--311
             Matthias Jarke and   
               Yannis Vassiliou   A Framework for Choosing a Database
                                  Query Language . . . . . . . . . . . . . 313--340
          Susan B. Davidson and   
       Hector Garcia-Molina and   
                     Dale Skeen   Consistency in Partitioned Networks  . . 341--370

ACM Computing Surveys
Volume 17, Number 4, December, 1985

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 375--376
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 377--378
         John S. Quarterman and   
       Abraham Silberschatz and   
              James L. Peterson   4.2BSD and 4.3BSD as Examples of the
                                  UNIX System  . . . . . . . . . . . . . . 379--418
        Andrew S. Tanenbaum and   
            Robbert van Renesse   Distributed Operating Systems  . . . . . 419--470
              Luca Cardelli and   
                   Peter Wegner   On Understanding Types, Data
                                  Abstraction, and Polymorphism  . . . . . 471--522


ACM Computing Surveys
Volume 18, Number 1, March, 1986

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 1--2
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 3--4
              R. H. Perrott and   
              A. Zarea-Aliabadi   Supercomputer Languages  . . . . . . . . 5--22
                      Zvi Galil   Efficient Algorithms for Finding Maximum
                                  Matching in Graphs . . . . . . . . . . . 23--38
                  Jayadev Misra   Distributed Discrete-Event Simulation    39--65
             Roland T. Chin and   
                Charles R. Dyer   Model-Based Recognition in Robot Vision  67--108

ACM Computing Surveys
Volume 18, Number 2, June, 1986

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 113--114
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 115--116
           Anthony I. Wasserman   Editorial Policy . . . . . . . . . . . . 117--124
               Nancy G. Leveson   Software Safety: Why, What, and How  . . 125--163
               R. A. Hirschheim   The Effect of \em A Priori Views on the
                                  Social Implications of Computing: The
                                  Case of Office Automation  . . . . . . . 165--195
             Toby J. Teorey and   
              Dongqing Yang and   
                   James P. Fry   A Logical Design Methodology for
                                  Relational Databases Using the Extended
                                  Entity-Relationship Model  . . . . . . . 197--222

ACM Computing Surveys
Volume 18, Number 3, September, 1986

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 227--228
             Salvatore T. March   About the Authors \ldots . . . . . . . . 229--229
                   Ali Mili and   
           Jules Desharnais and   
      Jean Raymond Gagné   Formal Models of Stepwise Refinement of
                                  Programs . . . . . . . . . . . . . . . . 231--276
           Barbara G. Ryder and   
                Marvin C. Paull   Elimination Algorithms for Data Flow
                                  Analysis . . . . . . . . . . . . . . . . 277--316

ACM Computing Surveys
Volume 18, Number 4, December, 1986

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 319--319
             Salvatore T. March   About the Authors \ldots . . . . . . . . 321--321
                  C. Batini and   
               M. Lenzerini and   
                  S. B. Navathe   A Comparative Analysis of Methodologies
                                  for Database Schema Integration  . . . . 323--364
                 Arthur H. Veen   Dataflow Machine Architecture  . . . . . 365--396


ACM Computing Surveys
Volume 19, Number 1, March, 1987

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 1--1
             Salvatore T. March   About the Authors \ldots . . . . . . . . 3--3
                 Kalle Lyytinen   Different Perspectives on Information
                                  Systems: Problems and Solutions  . . . . 5--46
              Alfons Kemper and   
              Mechtild Wallrath   An Analysis of Geometric Modeling in
                                  Database Systems . . . . . . . . . . . . 47--91

ACM Computing Surveys
Volume 19, Number 2, June, 1987

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 93--93
             Salvatore T. March   About the Authors \ldots . . . . . . . . 95--95
             Salvatore T. March   Editorial Policy . . . . . . . . . . . . 97--104
        Malcolm P. Atkinson and   
               O. Peter Buneman   Types and Persistence in Database
                                  Programming Languages  . . . . . . . . . 105--190
                     Arie Segev   Surveyor's Forum: Transitive
                                  Dependencies . . . . . . . . . . . . . . 191--192
                 Toby J. Teorey   Surveyor's Forum: Transitive
                                  Dependencies . . . . . . . . . . . . . . 193--193
                   Ali Mili and   
           Jules Desharnais and   
      Jean Raymond Gagné   Corrigendum: ``Formal Models of Stepwise
                                  Refinements of Programs''  . . . . . . . 195--195

ACM Computing Surveys
Volume 19, Number 3, September, 1987

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 197--198
             Salvatore T. March   About the Authors \ldots . . . . . . . . 199--199
               Richard Hull and   
                     Roger King   Semantic Database Modeling: Survey,
                                  Applications, and Research Issues  . . . 201--260
           Debra A. Lelewer and   
           Daniel S. Hirschberg   Data Compression . . . . . . . . . . . . 261--296

ACM Computing Surveys
Volume 19, Number 4, December, 1987

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 299--299
             Salvatore T. March   About the Authors \ldots . . . . . . . . 301--301
                    Edgar Knapp   Deadlock Detection in Distributed
                                  Databases  . . . . . . . . . . . . . . . 303--328
       Carol Bergfeld Mills and   
                Linda J. Weldon   Reading Text from Computer Screens . . . 329--358


ACM Computing Surveys
Volume 20, Number 1, March, 1988

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 1--1
             Salvatore T. March   About the Authors \ldots . . . . . . . . 3--3
                 Hideaki Takagi   Queuing Analysis of Polling Models . . . 5--28
             Scott Danforth and   
                Chris Tomlinson   Type Theories and Object-Oriented
                                  Programming  . . . . . . . . . . . . . . 29--72

ACM Computing Surveys
Volume 20, Number 2, June, 1988

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 73--73
             Salvatore T. March   About the Authors \ldots . . . . . . . . 75--75
             Salvatore T. March   Editorial Policy . . . . . . . . . . . . 77--84
               R. J. Enbody and   
                       H. C. Du   Dynamic Hashing Schemes  . . . . . . . . 85--113
         Kenneth L. Kraemer and   
               John Leslie King   Computer-Based Systems for Cooperative
                                  Work and Group Decision Making . . . . . 115--146

ACM Computing Surveys
Volume 20, Number 3, September, 1988

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 149--149
             Salvatore T. March   About the Authors \ldots . . . . . . . . 151--151
               Joan Peckham and   
                 Fred Maryanski   Semantic Data Models . . . . . . . . . . 153--189
         Michael V. Mannino and   
               Paicheng Chu and   
                   Thomas Sager   Statistical Profile Estimation in
                                  Database Systems . . . . . . . . . . . . 191--221

ACM Computing Surveys
Volume 20, Number 4, December, 1988

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 223--224
             Salvatore T. March   About the Authors \ldots . . . . . . . . 225--225
      Allen M. Johnson, Jr. and   
                 Miroslaw Malek   Survey of Software Tools for Evaluating
                                  Reliability, Availability, and
                                  Serviceability . . . . . . . . . . . . . 227--269
                    Hanan Samet   Hierarchical Representations of
                                  Collections of Small Rectangles  . . . . 271--309


ACM Computing Surveys
Volume 21, Number 1, March, 1989

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 1--2
             Salvatore T. March   About the Authors \ldots . . . . . . . . 3--3
             H. Rex Hartson and   
                    Deborah Hix   Human-Computer Interface Development:
                                  Concepts and Systems for Its Management  5--92
                   Kevin Knight   Unification: a Multidisciplinary Survey  93--124

ACM Computing Surveys
Volume 21, Number 2, June, 1989

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 125--126
             Salvatore T. March   About the Authors \ldots . . . . . . . . 127--127
             Salvatore T. March   Editorial Policy . . . . . . . . . . . . 129--136
                 Bruce Abramson   Control Strategies for Two-Player Games  137--161
                  Thomas Ellman   Explanation-Based Learning: a Survey of
                                  Programs and Perspectives  . . . . . . . 163--221
        Charles J. Colbourn and   
           Paul C. van Oorschot   Applications of Combinatorial Designs in
                                  Computer Science . . . . . . . . . . . . 223--250

ACM Computing Surveys
Volume 21, Number 3, September, 1989

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 251--251
                   Peter Wegner   Guest Editor's Introduction to the
                                  Special Issue on Programming Language
                                  Paradigms  . . . . . . . . . . . . . . . 253--258
             Salvatore T. March   About the Authors \ldots . . . . . . . . 259--260
               Henri E. Bal and   
        Jennifer G. Steiner and   
            Andrew S. Tanenbaum   Programming Languages for Distributed
                                  Computing Systems  . . . . . . . . . . . 261--322
          Nicholas Carriero and   
                David Gelernter   How to Write Parallel Programs: a Guide
                                  to the Perplexed . . . . . . . . . . . . 323--357
                     Paul Hudak   Conception, Evolution, and Application
                                  of Functional Programming Languages  . . 359--411
                   Ehud Shapiro   The Family of Concurrent Logic
                                  Programming Languages  . . . . . . . . . 413--510

ACM Computing Surveys
Volume 21, Number 4, December, 1989

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 511--512
             Salvatore T. March   About the Authors \ldots . . . . . . . . 513--513
              Nabil R. Adam and   
               John C. Wortmann   Security-Control Methods for Statistical
                                  Databases: a Comparative Study . . . . . 515--556
               Timothy Bell and   
              Ian H. Witten and   
                 John G. Cleary   Modeling for Text Compression  . . . . . 557--591
        Charles E. McDowell and   
              David P. Helmbold   Debugging Concurrent Programs  . . . . . 593--622


ACM Computing Surveys
Volume 22, Number 1, March, 1990

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 1--2
             Salvatore T. March   About the Authors \ldots . . . . . . . . 3--3
          A. J. van de Goor and   
                 C. A. Verruijt   An Overview of Deterministic Functional
                                  RAM Chip Testing . . . . . . . . . . . . 5--33
              Russell J. Abbott   Resourceful Systems for Fault Tolerance,
                                  Reliability, and Safety  . . . . . . . . 35--68

ACM Computing Surveys
Volume 22, Number 2, June, 1990

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 69--70
             Salvatore T. March   About the Authors \ldots . . . . . . . . 71--71
             Salvatore T. March   Editorial Policy . . . . . . . . . . . . 73--81
                Raif O. Onvural   Survey of Closed Queueing Networks with
                                  Blocking . . . . . . . . . . . . . . . . 83--121
          Krzysztof Pawlikowski   Steady-State Simulation of Queueing
                                  Processes: a Survey of Problems and
                                  Solutions  . . . . . . . . . . . . . . . 123--170
                   Robert Mandl   Surveyor's Forum: ``Applications of
                                  Combinatorial Designs in Computer
                                  Science''  . . . . . . . . . . . . . . . 171--171

ACM Computing Surveys
Volume 22, Number 3, September, 1990

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 173--173
        Ahmed K. Elmagarmid and   
                      Calton Pu   Introduction to the Special Issue on
                                  Heterogeneous Databases  . . . . . . . . 175--178
             Salvatore T. March   About the Authors \ldots . . . . . . . . 179--181
              Amit P. Sheth and   
                James A. Larson   Federated Database Systems for Managing
                                  Distributed, Heterogeneous, and
                                  Autonomous Databases . . . . . . . . . . 183--236
               Gomer Thomas and   
          Glenn R. Thompson and   
             Chin-Wan Chung and   
           Edward Barkmeyer and   
                Fred Carter and   
         Marjorie Templeton and   
                Stephen Fox and   
                   Berl Hartman   Heterogeneous Distributed Database
                                  Systems for Production Use . . . . . . . 237--266
              Witold Litwin and   
                   Leo Mark and   
              Nick Roussopoulos   Interoperability of Multiple Autonomous
                                  Databases  . . . . . . . . . . . . . . . 267--293

ACM Computing Surveys
Volume 22, Number 4, December, 1990

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 295--296
             Salvatore T. March   About the Authors \ldots . . . . . . . . 297--297
              Fred B. Schneider   Implementing Fault-Tolerant Services
                                  Using the State Machine Approach: a
                                  Tutorial . . . . . . . . . . . . . . . . 299--319
               Eliezer Levy and   
           Abraham Silberschatz   Distributed File Systems: Concepts and
                                  Examples . . . . . . . . . . . . . . . . 321--374
                  Randy H. Katz   Toward a Unified Framework for Version
                                  Modeling in Engineering Databases  . . . 375--408
          Krzysztof Pawlikowski   Corrigenda: ``Steady-State Simulation of
                                  Queueing Processes: A Survey of Problems
                                  and Solutions''  . . . . . . . . . . . . 409--409


ACM Computing Surveys
Volume 23, Number 1, March, 1991

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 1--2
             Salvatore T. March   About the Authors \ldots . . . . . . . . 3--3
                 David Goldberg   What Every Computer Scientist Should
                                  Know About Floating-Point Arithmetic . . 5--48
             Gregory R. Andrews   Paradigms for Process Interaction in
                                  Distributed Programs . . . . . . . . . . 49--90
              Roger S. Chin and   
              Samuel T. Chanson   Distributed, object-based programming
                                  systems  . . . . . . . . . . . . . . . . 91--124
                  S. Sankar and   
                D. S. Rosenblum   Surveyor's Forum: Runtime Checking and
                                  Debugging of Formally Specified Programs 125--127

ACM Computing Surveys
Volume 23, Number 2, June, 1991

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 129--129
             Salvatore T. March   About the Authors \ldots . . . . . . . . 131--131
             Salvatore T. March   Editorial Policy . . . . . . . . . . . . 133--141
               K. Shahookar and   
                    P. Mazumder   VLSI Cell Placement Techniques . . . . . 143--220
     Bandula W. Abeysundara and   
                 Ahmed E. Kamal   High-Speed Local Area Networks and Their
                                  Performance: a Survey  . . . . . . . . . 221--264

ACM Computing Surveys
Volume 23, Number 3, September, 1991

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 265--266
             Salvatore T. March   About the Authors \ldots . . . . . . . . 267--267
         Naser S. Barghouti and   
                 Gail E. Kaiser   Concurrency Control in Advanced Database
                                  Applications . . . . . . . . . . . . . . 269--317
                  Zvi Galil and   
           Giuseppe F. Italiano   Data Structures and Algorithms for
                                  Disjoint Set Union Problems  . . . . . . 319--344
              Franz Aurenhammer   Voronoi Diagrams: a Survey of a
                                  Fundamental Geometric Data Structure . . 345--405
               Lorenzo Strigini   Surveyor's Forum: ``Resourceful Systems
                                  for Fault Tolerance, Reliability, and
                                  Safety'' . . . . . . . . . . . . . . . . 407--409
                 Russell Abbott   Surveyor's Forum: ``Resourceful Systems
                                  for Fault Tolerance, Reliability, and
                                  Safety'' . . . . . . . . . . . . . . . . 409--411
                 David Goldberg   Corrigendum: ``What Every Computer
                                  Scientist Should Know About
                                  Floating-Point Arithmetic''  . . . . . . 413--413

ACM Computing Surveys
Volume 23, Number 4, December, 1991

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 417--418
             Salvatore T. March   About the Authors \ldots . . . . . . . . 419--419
                M. R. Stytz and   
                 G. Frieder and   
                     O. Frieder   Three-Dimensional Medical Imaging:
                                  Algorithms and Computer Systems  . . . . 421--499
     L. Edwin McKenzie, Jr. and   
       Richard Thomas Snodgrass   Evaluation of Relational Algebras
                                  Incorporating the Time Dimension in
                                  Databases  . . . . . . . . . . . . . . . 501--543


ACM Computing Surveys
Volume 24, Number 1, March, 1992

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 1--2
             Salvatore T. March   About the Authors \ldots . . . . . . . . 3--3
               Paul Suetens and   
                 Pascal Fua and   
               Andrew J. Hanson   Computational Strategies for Object
                                  Recognition  . . . . . . . . . . . . . . 5--61
               Priti Mishra and   
               Margaret H. Eich   Join Processing in Relational Databases  63--113

ACM Computing Surveys
Volume 24, Number 2, June, 1992

             Salvatore T. March   Editorial Policy . . . . . . . . . . . . 117--125
             Salvatore T. March   About This Issue \ldots  . . . . . . . . 127--128
             Salvatore T. March   About the Authors \ldots . . . . . . . . 129--129
             Charles W. Krueger   Software Reuse . . . . . . . . . . . . . 131--183
              Per Brinch Hansen   Householder Reduction of Linear
                                  Equations  . . . . . . . . . . . . . . . 185--194
              Catherine McGeoch   Analyzing Algorithms by Simulation:
                                  Variance Reduction Techniques and
                                  Simulation Speedups  . . . . . . . . . . 195--212

ACM Computing Surveys
Volume 24, Number 3, September, 1992

               Richard R. Muntz   A Personal Note  . . . . . . . . . . . . 213--214
               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 215--215
               Richard R. Muntz   About the Authors \ldots . . . . . . . . 217--217
              Yong K. Hwang and   
                 Narendra Ahuja   Gross Motion Planning --- a Survey . . . 219--291
               Randal E. Bryant   Symbolic Boolean Manipulation with
                                  Ordered Binary-Decision Diagrams . . . . 293--318
              Charles B. Dunham   Surveyor's Forum: ``What Every Computer
                                  Scientist Should Know About
                                  Floating-Point Arithmetic''  . . . . . . 319--319
              Brian A. Wichmann   Surveyor's Forum: ``What Every Computer
                                  Scientist Should Know About
                                  Floating-Point Arithmetic''  . . . . . . 319--319

ACM Computing Surveys
Volume 24, Number 4, December, 1992

               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 321--322
               Richard R. Muntz   About the Authors \ldots . . . . . . . . 323--323
          Lisa Gottesfeld Brown   A Survey of Image Registration
                                  Techniques . . . . . . . . . . . . . . . 325--376
                   Karen Kukich   Techniques for Automatically Correcting
                                  Words in Text  . . . . . . . . . . . . . 377--439
   Vladimir Estivill-Castro and   
                    Derick Wood   A Survey of Adaptive Sorting Algorithms  441--476


ACM Computing Surveys
Volume 25, Number 1, March, 1993

               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 1--2
               Richard R. Muntz   About the Authors \ldots . . . . . . . . 3--3
              Farshid Arman and   
                 J. K. Aggarwal   Model-Based Object Recognition in
                                  Dense-Range Images --- a Review  . . . . 5--43
                Marco Schneider   Self-Sta\-bi\-li\-za\-tion . . . . . . . 45--67

ACM Computing Surveys
Volume 25, Number 2, June, 1993

               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 69--70
               Richard R. Muntz   About the Authors \ldots . . . . . . . . 71--72
                   Goetz Graefe   Query Evaluation Techniques for Large
                                  Databases  . . . . . . . . . . . . . . . 73--170
           Michael Barborak and   
             Miroslaw Malek and   
                  Anton Dahbura   The Consensus Problem in Fault-Tolerant
                                  Computing  . . . . . . . . . . . . . . . 171--220

ACM Computing Surveys
Volume 25, Number 3, September, 1993

               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 221--222
               Richard R. Muntz   About the Authors \ldots . . . . . . . . 223--223
               A. Udaya Shankar   An Introduction to Assertional Reasoning
                                  for Concurrent Systems . . . . . . . . . 225--262
          Michael G. Norman and   
                 Peter Thanisch   Models of Machines and Computation for
                                  Mapping in Multicomputers  . . . . . . . 263--302
                 David J. Lilja   Cache Coherence in Large-Scale
                                  Shared-Memory Multiprocessors: Issues
                                  and Comparisons  . . . . . . . . . . . . 303--338
             Randolph D. Nelson   The Mathematics of Product Form Queuing
                                  Networks . . . . . . . . . . . . . . . . 339--369

ACM Computing Surveys
Volume 25, Number 4, December, 1993

               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 371--372
               Richard R. Muntz   About the Authors \ldots . . . . . . . . 373--373
            Richard Baskerville   Information Systems Security Design
                                  Methods: Implications for Information
                                  Systems Development  . . . . . . . . . . 375--414
            Bernhard Eschermann   State Assignment for Hardwired VLSI
                                  Control Units  . . . . . . . . . . . . . 415--436
         James C. Brancheau and   
                 Carol V. Brown   The Management of End-User Computing:
                                  Status and Directions  . . . . . . . . . 437--482


ACM Computing Surveys
Volume 26, Number 1, March, 1994

                Rajiv Gupta and   
            Scott A. Smolka and   
                  Shaji Bhaskar   On Randomization in Sequential and
                                  Distributed Algorithms . . . . . . . . . 7--86
           Thomas W. Malone and   
                 Kevin Crowston   The Interdisciplinary Study of
                                  Coordination . . . . . . . . . . . . . . 87--119
                 Sunggu Lee and   
                 Kang Geun Shin   Probabilistic Diagnosis of
                                  Multiprocessor Systems . . . . . . . . . 121--139

ACM Computing Surveys
Volume 26, Number 2, June, 1994

               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 141--142
               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 143--144
              Peter M. Chen and   
              Edward K. Lee and   
            Garth A. Gibson and   
              Randy H. Katz and   
             David A. Patterson   RAID: High-Performance, Reliable
                                  Secondary Storage  . . . . . . . . . . . 145--185
                  Tim J. Harris   A Survey of PRAM Simulation Techniques   187--206

ACM Computing Surveys
Volume 26, Number 3, September, 1994

               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 207--207
               Richard R. Muntz   About the Authors \ldots . . . . . . . . 209--210
           Carl E. Landwehr and   
               Alan R. Bull and   
          John P. McDermott and   
                William S. Choi   A Taxonomy of Computer Program Security
                                  Flaws  . . . . . . . . . . . . . . . . . 211--254
             Mary L. Bailey and   
        Jack V. Briner, Jr. and   
           Roger D. Chamberlain   Parallel Logic Simulation of VLSI
                                  Systems  . . . . . . . . . . . . . . . . 255--294
Jacques Chassin de Kergommeaux and   
              Philippe Codognet   Parallel Logic Programming Systems . . . 295--336

ACM Computing Surveys
Volume 26, Number 4, December, 1994

               Peter Wegner and   
                  Marvin Israel   Editorial Directions . . . . . . . . . . 337--339
               Richard R. Muntz   About This Issue . . . . . . . . . . . . 341--341
               Richard R. Muntz   About The Authors  . . . . . . . . . . . 343--343
             David F. Bacon and   
            Susan L. Graham and   
                Oliver J. Sharp   Compiler Transformations for
                                  High-Performance Computing . . . . . . . 345--420
       Ji\vrí Matou\vsek   Geometric Range Searching  . . . . . . . 421--461


ACM Computing Surveys
Volume 27, Number 1, March, 1995

               Peter Wegner and   
                  Marvin Israel   About This Issue \ldots  . . . . . . . . 1--2
                Juris Hartmanis   Turing Award Lecture: On Computational
                                  Complexity and the Nature of Computer
                                  Science  . . . . . . . . . . . . . . . . 7--16
               Laszlo A. Belady   The Disappearance of the ``Pure''
                                  Software Industry  . . . . . . . . . . . 17--18
                Gilles Brassard   Time for Another Paradigm Shift  . . . . 19--21
               Peter J. Denning   Can there be a science of information?   23--25
               Peter A. Freeman   Effective Computer Science . . . . . . . 27--29
                Michael C. Loui   Computer Science is a New Engineering
                                  Discipline . . . . . . . . . . . . . . . 31--32
                    John Plaice   Computer Science is an Experimental
                                  Science  . . . . . . . . . . . . . . . . 33--33
                 John E. Savage   Will computer science become irrelevant? 35--37
                  N. F. Stewart   Science and Computer Science . . . . . . 39--41
              Jeffrey D. Ullman   The Role of Theory Today . . . . . . . . 43--44
                   Peter Wegner   Interaction as a Basis for Empirical
                                  Computer Science . . . . . . . . . . . . 45--48
                Fred Weingarten   Government Funding and Computing
                                  Research Priorities  . . . . . . . . . . 49--54
                     W. A. Wulf   Are we scientists or engineers?  . . . . 55--57
                Juris Hartmanis   Response to the Essays ``On
                                  Computational Complexity and the Nature
                                  of Computer Science''  . . . . . . . . . 59--61
              Peter A. Buhr and   
             Michel Fortier and   
              Michael H. Coffin   Monitor Classification . . . . . . . . . 63--107
         Ricardo A. Baeza-Yates   Fringe Analysis Revisited  . . . . . . . 109--119
                        Various   The Scope and Tutorial Needs of the ACM
                                  SIGs . . . . . . . . . . . . . . . . . . 121--137

ACM Computing Surveys
Volume 27, Number 2, June, 1995

               Peter Wegner and   
                  Marvin Israel   About This Issue . . . . . . . . . . . . 139--140
          Evaggelia Pitoura and   
              Omran Bukhres and   
               Ahmed Elmagarmid   Object Orientation in Multidatabase
                                  Systems  . . . . . . . . . . . . . . . . 141--195
                   Jukka Paakki   Attribute Grammar Paradigms --- a
                                  High-Level Methodology in Language
                                  Implementation . . . . . . . . . . . . . 196--255
                   David Garlan   Research Directions in Software
                                  Architecture . . . . . . . . . . . . . . 257--261
           Oscar Nierstrasz and   
              Theo Dirk Meijler   Research Directions in Software
                                  Composition  . . . . . . . . . . . . . . 262--264
                 Gio Wiederhold   Mediation in Information Systems . . . . 265--267
                   Frank Manola   Interoperability Issues in Large-Scale
                                  Distributed Object Systems . . . . . . . 268--270
                  Sandra Heiler   Semantic Interoperability  . . . . . . . 271--273
                Jeff Sutherland   Business Objects in Corporate
                                  Information Systems  . . . . . . . . . . 274--276
     Efstratios Gallopoulos and   
           Elias N. Houstis and   
                   John R. Rice   Workshop on Problem-Solving
                                  Environments: Findings and
                                  Recommendations  . . . . . . . . . . . . 277--279
            Arnold L. Rosenberg   Thoughts on Parallelism and Concurrency
                                  in Computing Curricula . . . . . . . . . 280--283
               P. Takis Metaxas   Fundamental Ideas for a Parallel
                                  Computing Course . . . . . . . . . . . . 284--286
               Faron Moller and   
                Scott A. Smolka   On the Computational Complexity of
                                  Bisimulation . . . . . . . . . . . . . . 287--289
              Ron K. Cytron and   
                 Brent Hailpern   SIGPLAN Scope and Tutorial Needs . . . . 290--291
            Alexander Thomasian   Surveyors' forum --- high-performance
                                  secondary memory . . . . . . . . . . . . 292--295

ACM Computing Surveys
Volume 27, Number 3, September, 1995

               Peter Wegner and   
                  Marvin Israel   About This Issue . . . . . . . . . . . . 297--297
                      Raj Reddy   Grand Challenges in AI . . . . . . . . . 301--303
                 Narendra Ahuja   On Detection and Representation of
                                  Multiscale Low-Level Image Structure . . 304--306
          Yiannis Aloimonos and   
          C. Fermüller and   
                   A. Rosenfeld   Seeing and Understanding: Representing
                                  the Visual World . . . . . . . . . . . . 307--309
                  Ruzena Bajcsy   Signal-to-Symbol Transformation and Vice
                                  Versa: From Fundamental Processes to
                                  Representation . . . . . . . . . . . . . 310--313
         Ronald J. Brachman and   
             Hector J. Levesque   Undirected Behavior Without Unbounded
                                  Search . . . . . . . . . . . . . . . . . 314--316
                Eugene Charniak   Natural Language Learning  . . . . . . . 317--319
             William J. Clancey   AI: Inventing a New Kind of Machine  . . 320--322
                     A. G. Cohn   The Challenge of Qualitative Spatial
                                  Reasoning  . . . . . . . . . . . . . . . 323--325
                 Tom Dietterich   Overfitting and Undercomputing in
                                  Machine Learning . . . . . . . . . . . . 326--327
              Didier Dubois and   
                    Henri Prade   What Does Fuzzy Logic Bring to AI? . . . 328--330
            Matthew L. Ginsberg   Epistemological and Heuristic Adequacy
                                  Revisited  . . . . . . . . . . . . . . . 331--333
           Subbarao Kambhampati   AI Planning: a Prospectus on Theory and
                                  Applications . . . . . . . . . . . . . . 334--336
                Richard E. Korf   Space-Efficient Search Algorithms  . . . 337--339
               Victor R. Lesser   Multiagent Systems: An Emerging
                                  Subdiscipline of AI  . . . . . . . . . . 340--342
             Vladimir Lifschitz   The Logic of Common Sense  . . . . . . . 343--345
                     R. P. Loui   Models of Deliberation in the Social
                                  Sciences . . . . . . . . . . . . . . . . 346--348
                 Jacques Pitrat   AI Systems are Dumb Because AI
                                  Researchers Are Too Clever . . . . . . . 349--350
                    Austin Tate   Don't Leave Your Plan on the Shelf . . . 351--352
             Pietro Torasso and   
               Luca Console and   
            Luigi Portinale and   
 Daniele Theseider Dupré   On the Role of Abduction . . . . . . . . 353--355
                David Waltz and   
                    Simon Kasif   On Reasoning From Data . . . . . . . . . 356--359
             Michael P. Wellman   The Economic Approach to Artificial
                                  Intelligence . . . . . . . . . . . . . . 360--362
                Kenneth Yip and   
                  Feng Zhao and   
                   Elisha Sacks   Imagistic Reasoning  . . . . . . . . . . 363--365
             Vicki H. Allan and   
             Reese B. Jones and   
             Randall M. Lee and   
               Stephen J. Allan   Software Pipelining  . . . . . . . . . . 367--432
           S. S. Beauchemin and   
                   J. L. Barron   The Computation of Optical Flow  . . . . 433--467

ACM Computing Surveys
Volume 27, Number 4, December, 1995

           Raymond Greenlaw and   
             Rossella Petreschi   Cubic Graphs . . . . . . . . . . . . . . 471--495
              Ronald E. Prather   Design and Analysis of Hierarchical
                                  Software Metrics . . . . . . . . . . . . 497--518
                   Dilip Sarkar   Methods to Speed Up Error
                                  Back-Propagation Learning Algorithm  . . 519--542
                      Anonymous   Computing Surveys Symposium on
                                  Multimedia . . . . . . . . . . . . . . . 543--544
             Venkat N. Gudivada   Multimedia Systems --- An
                                  Interdisciplinary Perspective  . . . . . 545--548
              Edward A. Fox and   
               Linda M. Kieffer   Multimedia Curricula, Courses, and
                                  Knowledge Modules  . . . . . . . . . . . 549--551
                    Borko Furht   Where Are Information Superhighways
                                  Headed?  . . . . . . . . . . . . . . . . 554--556
               Jenny Preece and   
                Ben Shneiderman   Survival of the Fittest: The Evolution
                                  of Multimedia User Interfaces  . . . . . 557--559
         Elisabeth André   Intellimedia: Making Multimedia Usable
                                  by Exploiting AI Methods . . . . . . . . 560--563
              Walid G. Aref and   
              Ibrahim Kamel and   
             Daniel P. Lopresti   On Handling Electronic Ink . . . . . . . 564--567
             James E. Baker and   
             Isabel F. Cruz and   
            Giuseppe Liotta and   
               Roberto Tamassia   A New Model for Algorithm Animation Over
                                  the WWW  . . . . . . . . . . . . . . . . 568--572
                  Shih-Fu Chang   Exploring Functionalities in the
                                  Compressed Image/Video Domain  . . . . . 573--575
    Stavros Christodoulakis and   
            Peter Triantafillou   Research and Development Issues for
                                  Large-Scale Multimedia Information
                                  Systems  . . . . . . . . . . . . . . . . 576--579
              Crispin Cowan and   
                Shanwei Cen and   
           Jonathan Walpole and   
                      Calton Pu   Adaptive Methods for Distributed Video
                                  Presentation . . . . . . . . . . . . . . 580--583
              Nevenka Dimitrova   The Myth of Semantic Video Retrieval . . 584--586
                   Sharon Flank   The Role of Natural-Language Processing
                                  in Multimedia  . . . . . . . . . . . . . 587--589
       Minos N. Garofalakis and   
            Yannis E. Ioannidis   Scheduling Issues in Multimedia Query
                                  Optimization . . . . . . . . . . . . . . 590--592
                   Arif Ghafoor   Multimedia Database Management Systems   593--598
                     Wendy Hall   The Role of Hypermedia in Multimedia
                                  Information Systems  . . . . . . . . . . 599--601
                    Qing Li and   
                Liu Sheng Huang   A Dynamic Data Model for a Video
                                  Database Management System . . . . . . . 602--606
            Alistair Moffat and   
                   Justin Zobel   Index Organization for Multimedia
                                  Database Systems . . . . . . . . . . . . 607--609
            Daniel Mossé   Resource Reservations in Networked
                                  Multimedia Systems . . . . . . . . . . . 610--612
                Klara Nahrstedt   End-to-End QoS Guarantees in Networked
                                  Multimedia Systems . . . . . . . . . . . 613--616
            Banu Özden and   
             Rajeev Rastogi and   
               Avi Silberschatz   Research Issues in Multimedia Storage
                                  Servers  . . . . . . . . . . . . . . . . 617--620
             Rosalind W. Picard   Computer Learning of Subjectivity  . . . 621--623
                 Teresa Roselli   Artificial Intelligence Can Improve
                                  Hypermedia Instructional Technologies
                                  for Learning . . . . . . . . . . . . . . 624--626
                Daniela Rus and   
             Devika Subramanian   Customizing Multimedia Information
                                  Access . . . . . . . . . . . . . . . . . 627--629
                    Hanan Samet   General Research Issues in Multimedia
                                  Database Systems . . . . . . . . . . . . 630--632
            Roger C. Schank and   
           Michael Korcuska and   
                  Menachem Jona   Multimedia Applications for Education
                                  and Training: Revolution or Red Herring? 633--635
         Prashant J. Shenoy and   
                Pawan Goyal and   
                 Harrick M. Vin   Issues in Multimedia Server Design . . . 636--639
            Richard Staehli and   
           Jonathan Walpole and   
                    David Maier   Device and Physical-Data Independence
                                  for Multimedia Presentations . . . . . . 640--642
            HongJiang Zhang and   
                        Qi Tian   Digital Video Analysis and Recognition
                                  for Content-Based Access . . . . . . . . 643--644
                      Anonymous   Contents: Author Index: Vols. 23--27
                                  (1991--1995) . . . . . . . . . . . . . . 645--650
                      Anonymous   Contents: Subject index: Vols. 23--27
                                  (1991--1995) . . . . . . . . . . . . . . 650--653


ACM Computing Surveys
Volume 28, Number 1, March, 1996

            Serge Abiteboul and   
           Gabriel M. Kuper and   
           Harry G. Mairson and   
    Alexander A. Shvartsman and   
                 Moshe Y. Vardi   In memoriam Paris C. Kanellakis  . . . . 3--15
             Edward M. Reingold   Basic techniques for design and analysis
                                  of algorithms  . . . . . . . . . . . . . 19--21
               Allen Tucker and   
                   Peter Wegner   ACM 50th-Anniversary Symposium:
                                  Perspectives in Computer Science . . . . 19--286
               Roberto Tamassia   Data structures  . . . . . . . . . . . . 23--26
                      D. T. Lee   Computational geometry . . . . . . . . . 27--31
             Rajeev Motwani and   
             Prabhakar Raghavan   Randomized algorithms  . . . . . . . . . 33--37
          Maxime Crochemore and   
                 Thierry Lecroq   Pattern-matching and text-compression
                                  algorithms . . . . . . . . . . . . . . . 39--41
              Samir Khuller and   
            Balaji Raghavachari   Graph and network algorithms . . . . . . 43--45
                Michael C. Loui   Computational complexity theory  . . . . 47--49
            Guy E. Blelloch and   
                 Bruce M. Maggs   Parallel algorithms  . . . . . . . . . . 51--54
              Vijay Chandru and   
                      M. R. Rao   Combinatorial optimization: an integer
                                  programming perspective  . . . . . . . . 55--58
              Andrea S. Lapaugh   Layout algorithm for VLSI design . . . . 59--61
                    Doug Burger   Memory systems . . . . . . . . . . . . . 63--65
           Michael J. Flynn and   
                  Kevin W. Rudd   Parallel architectures . . . . . . . . . 67--70
                  J. R. Quinlan   Learning decision tree classifiers . . . 71--72
          Michael I. Jordan and   
          Christopher M. Bishop   Neural networks  . . . . . . . . . . . . 73--75
              Stephanie Forrest   Genetic algorithms . . . . . . . . . . . 77--80
                F. L. Lewis and   
              M. Fitzgerald and   
                         K. Liu   Robotics . . . . . . . . . . . . . . . . 81--83
                    Thomas Dean   Automated planning . . . . . . . . . . . 85--87
                    Judea Pearl   Decision making under uncertainty  . . . 89--92
              Pasquale Cinnella   Numerical simulations of reactive flows  93--96
                Joseph S. Shang   Computational electromagnetics . . . . . 97--99
             David T. Kingsbury   Computational biology  . . . . . . . . . 101--103
           Avi Silberschatz and   
             Henry F. Korth and   
                   S. Sudarshan   Data models  . . . . . . . . . . . . . . 105--108
               Stefano Ceri and   
             Raghu Ramakrishnan   Rules in database systems  . . . . . . . 109--111
                  Dennis Shasha   Tuning databases for high performance    113--115
                 Betty Salzberg   Access methods . . . . . . . . . . . . . 117--120
            Yannis E. Ioannidis   Query optimization . . . . . . . . . . . 121--123
         M. Tamer Özsu and   
              Patrick Valduriez   Distributed and parallel database
                                  systems  . . . . . . . . . . . . . . . . 125--128
                 Sushil Jajodia   Database security and privacy  . . . . . 129--131
               Ellen Riloff and   
                    Lee Hollaar   Text databases and information retrieval 133--135
      François Bancilhon   Object databases . . . . . . . . . . . . 137--140
                     Jim Melton   SQL language summary . . . . . . . . . . 141--143
                Donald H. House   Overview of three-dimensional computer
                                  graphics . . . . . . . . . . . . . . . . 145--148
                 A. P. Rockwood   Geometric primitives . . . . . . . . . . 149--151
                 David S. Ebert   Advanced modeling techniques for
                                  computer graphics  . . . . . . . . . . . 153--156
                      Alan Watt   Rendering techniques: past, present and
                                  future . . . . . . . . . . . . . . . . . 157--159
    Nadia Magnenat Thalmann and   
                Daniel Thalmann   Computer animation . . . . . . . . . . . 161--163
                Arie E. Kaufman   Volume visualization . . . . . . . . . . 165--167
                Jonathan Grudin   The organizational contexts of
                                  development and use  . . . . . . . . . . 169--171
                 Wolfgang Dzida   International usability standards  . . . 173--175
             Robert J. K. Jacob   Human-computer interaction: input
                                  devices  . . . . . . . . . . . . . . . . 177--179
                     Colin Ware   Multimedia output devices and techniques 181--183
            Jürgen Ziegler   Interactive techniques . . . . . . . . . 185--187
                  Brad A. Myers   User interface software technology . . . 189--191
               Mary Beth Rosson   Human factors in programming and
                                  software development . . . . . . . . . . 193--195
           Stuart A. Selber and   
     Johndan Johnson-Eilola and   
              Brad Mehlenbacher   Online support systems . . . . . . . . . 197--200
               Raphel A. Finkel   Operating systems  . . . . . . . . . . . 201--203
              John A. Stankovic   Real-time and embedded systems . . . . . 205--208
                 Craig E. Wills   Process synchronization and IPC  . . . . 209--211
               Peter J. Denning   Virtual memory . . . . . . . . . . . . . 213--216
         Marshall Kirk McKusick   Secondary storage and filesystems  . . . 217--219
              William Stallings   Advances in high-speed networking  . . . 221--223
              Sape J. Mullender   Distributed operating systems  . . . . . 225--227
        Thomas W. Doeppner, Jr.   Distributed file systems and distributed
                                  memory . . . . . . . . . . . . . . . . . 229--231
                Steve J. Chapin   Distributed and multiprocessor
                                  scheduling . . . . . . . . . . . . . . . 233--235
          Howard Jay Siegel and   
             Henry G. Dietz and   
                John K. Antonio   Software support for heterogeneous
                                  computing  . . . . . . . . . . . . . . . 237--239
                Ravi Sandhu and   
            Pierangela Samarati   Authentication, access control, and
                                  audit  . . . . . . . . . . . . . . . . . 241--243
                   Kim B. Bruce   Progress in programming languages  . . . 245--247
              Benjamin Goldberg   Functional programming languages . . . . 249--251
          Stuart Hirshfield and   
                 Raimund K. Ege   Object-oriented programming  . . . . . . 253--255
                  Jacques Cohen   Logic programming and constraint logic
                                  programming  . . . . . . . . . . . . . . 257--259
                  Michael Wolfe   Parallelizing compilers  . . . . . . . . 261--262
                  Luca Cardelli   Type systems . . . . . . . . . . . . . . 263--264
               David A. Schmidt   Programming language semantics . . . . . 265--267
                Ian Sommerville   Software process models  . . . . . . . . 269--271
             Ian M. Holland and   
             Karl J. Lieberherr   Object-oriented design . . . . . . . . . 273--275
              Stephen R. Schach   Testing: principles and practice . . . . 277--279
                Steven P. Reiss   Software tools and environments  . . . . 281--284
                   Peter Wegner   Interoperability . . . . . . . . . . . . 285--287

ACM Computing Surveys
Volume 28, Number 2, June, 1996

               Chris Hankin and   
             Hanne Riis Nielson   Computing Surveys Symposium on Models of
                                  Programming Languages and Computation    293--294
                    Gul A. Agha   Linguistic Paradigms for Programming
                                  Complex Distributed Systems  . . . . . . 295--296
         Jean-Marc Andreoli and   
                  Remo Pareschi   Integrated Computational Paradigms for
                                  Flexible Client-Server Communication . . 297--299
               Paolo Ciancarini   Coordination Models and Languages as
                                  Software Integrators . . . . . . . . . . 300--302
                  David Gilbert   Can Computational Logic Provide a
                                  Paradigm for Both the Specification and
                                  Implementation of Concurrent Systems?    303--305
              Michael Hanus and   
                 Herbert Kuchen   Integration of Functional and Logic
                                  Programming  . . . . . . . . . . . . . . 306--308
                   Alan Mycroft   On Integration of Programming Paradigms  309--311
                    U. S. Reddy   Imperative Functional Programming  . . . 312--314
             Dennis Volpano and   
                 Geoffrey Smith   On the Systematic Design of Web
                                  Languages  . . . . . . . . . . . . . . . 315--317
                  Philip Wadler   Lazy Versus Strict . . . . . . . . . . . 318--320
                   P. N. Benton   On the Relationship Between Formal
                                  Semantics and Static Analysis  . . . . . 321--323
                 Patrick Cousot   Abstract Interpretation  . . . . . . . . 324--328
              Olivier Danvy and   
               Nevin Hentze and   
        Karoline Malmkjær   Resource-bounded partial evaluation  . . 329--332
       Gilberto Filé and   
         Roberto Giacobazzi and   
              Francesco Ranzato   A Unifying View of Abstract Domain
                                  Design . . . . . . . . . . . . . . . . . 333--336
         Suresh Jagannathan and   
                  Andrew Wright   Compiling Functional Languages with Flow
                                  Analysis . . . . . . . . . . . . . . . . 337--339
   Daniel Le Métayer and   
                  David Schmidt   Structural Operational Semantics as a
                                  Basis for Static Program Analysis  . . . 340--343
               Flemming Nielson   Annotated Type and Effect Systems  . . . 344--345
                       Mads Dam   Modalities in Analysis and Verification  346--348
          Robert Cartwright and   
             Matthias Felleisen   Program Verification Through Soft Typing 349--351
           Pierpaolo Degano and   
                 Corrado Priami   Enhanced Operational Semantics . . . . . 352--354
                   C. Barry Jay   Shape in Computing . . . . . . . . . . . 355--357
                  Jens Palsberg   Type Inference for Objects . . . . . . . 358--359
         Alberto Pettorossi and   
              Maurizio Proietti   Rules and Strategies for Transforming
                                  Functional and Logic Programs  . . . . . 360--414
             William Frakes and   
                    Carol Terry   Software Reuse: Metrics and Models . . . 415--435

ACM Computing Surveys
Volume 28, Number 3, September, 1996

             Antero Taivalsaari   On the Notion of Inheritance . . . . . . 438--479
                  Neil D. Jones   An Introduction to Partial Evaluation    480--503
              Joseph A. Gallian   Error Detection Methods  . . . . . . . . 504--517
           Peter Soderquist and   
                  Miriam Leeser   Area and Performance Tradeoffs in
                                  Floating-Point Divide and Square-Root
                                  Implementations  . . . . . . . . . . . . 518--564

ACM Computing Surveys
Volume 28, Number 4, December, 1996

               Peter Wegner and   
                      Jon Doyle   Editorial: Strategic directions in
                                  computing research . . . . . . . . . . . 565--574
                      Anonymous   ACM 50th Anniversary Issue --- Strategic
                                  Directions in Computing Research . . . . 565--845
            Michael C. Loui and   
                Anne Condon and   
                 Faith Fich and   
       Greg N. Frederickson and   
         Andrew V. Goldberg and   
           David S. Johnson and   
              Steven Mahney and   
         Prabhakar Raghavan and   
                John Savage and   
             Alan L. Selman and   
                David B. Shmoys   Strategic directions in research in
                                  theory of computing  . . . . . . . . . . 575--590
           Roberto Tamassia and   
          Pankaj K. Agarwal and   
                Nancy Amato and   
              Danny Z. Chen and   
               David Dobkin and   
              Scot Drysdale and   
             Steven Fortune and   
        Michael T. Goodrich and   
           John Hershberger and   
            Joseph O'Rourke and   
        Franco P. Preparata and   
         Joerg-Rudiger Sack and   
               Subhash Suri and   
             Ioannis Tollis and   
          Jeffrey S. Vitter and   
                 Sue Whitesides   Strategic directions in computational
                                  geometry . . . . . . . . . . . . . . . . 591--606
           Rance Cleaveland and   
            Scott A. Smolka and   
                Rajeev Alur and   
                 Jos Baeten and   
            Jan A. Bergstra and   
                  Eike Best and   
            Rocco De Nicola and   
                 Helen Gill and   
           Roberto Gorrieri and   
           Mohamed G. Gouda and   
           Jan Friso Groote and   
           Tom A. Henzinger and   
             C. A. R. Hoare and   
       Maj. David Luginbuhl and   
               Albert Meyer and   
                Dale Miller and   
              Jayadev Misra and   
               Faron Moller and   
              Ugo Montanari and   
                Amir Pnueli and   
             Sanjiva Prasad and   
           Vaughan R. Pratt and   
             Joseph Sifakis and   
           Bernhard Steffen and   
               Bent Thomsen and   
           Frits Vaandrager and   
                Moshe Vardi and   
                  Pierre Wolper   Strategic directions in concurrency
                                  research . . . . . . . . . . . . . . . . 607--625
           Edmund M. Clarke and   
          Jeannette M. Wing and   
                Rajeev Alur and   
           Rance Cleaveland and   
                 David Dill and   
              Allen Emerson and   
            Stephen Garland and   
              Steven German and   
                John Guttag and   
               Anthony Hall and   
           Thomas Henzinger and   
            Gerard Holzmann and   
                Cliff Jones and   
             Robert Kurshan and   
              Nancy Leveson and   
           Kenneth McMillan and   
                   J. Moore and   
                Doron Peled and   
                Amir Pnueli and   
                John Rushby and   
          Natarajan Shankar and   
             Joseph Sifakis and   
              Prasad Sistla and   
           Bernhard Steffen and   
              Pierre Wolper and   
               Jim Woodcock and   
                    Pamela Zave   Formal methods: state of the art and
                                  future directions  . . . . . . . . . . . 626--643
               Chris Hankin and   
         Hanne Riis Nielson and   
              Jens Palsberg and   
                         others   Strategic directions in research on
                                  programming languages  . . . . . . . . . 644--652
                  Jon Doyle and   
                Thomas Dean and   
                         others   Strategic directions in artificial
                                  intelligence . . . . . . . . . . . . . . 653--670
                   Trevor Mudge   Strategic directions in computer
                                  architecture . . . . . . . . . . . . . . 671--678
                David Clark and   
            Joseph Pasquale and   
                         others   Strategic directions in networks and
                                  telecommunications . . . . . . . . . . . 679--690
           Rachid Guerraoui and   
                         others   Strategic directions in object-oriented
                                  programming  . . . . . . . . . . . . . . 691--700
      Pascal Van Hentenryck and   
             Vijay Saraswat and   
                         others   Strategic directions in constraint
                                  programming  . . . . . . . . . . . . . . 701--726
                Carl Gunter and   
              John Mitchell and   
                   David Notkin   Strategic directions in software
                                  engineering and programming languages    727--737
             Leon Osterweil and   
                         others   Strategic directions in software quality 738--750
          John A. Stankovic and   
                         others   Strategic directions in real-time and
                                  embedded systems . . . . . . . . . . . . 751--763
           Avi Silberschatz and   
                Stan Zdonik and   
                         others   Strategic directions in database systems
                                  --- breaking out of the box  . . . . . . 764--778
            Garth A. Gibson and   
       Jeffrey Scott Vitter and   
                John Wilkes and   
                         others   Strategic directions in storage I/O
                                  issues in large-scale computing  . . . . 779--793
                 Brad Myers and   
                 Jim Hollan and   
                Isabel Cruz and   
               Steve Bryson and   
             Dick Bulterman and   
            Tiziana Catarci and   
               Wayne Citrin and   
            Ephraim Glinert and   
            Jonathan Grudin and   
                  Rob Jacob and   
                Bonnie John and   
            David Kurlander and   
                  Dan Olsen and   
               Randy Pausch and   
             Stuart Shieber and   
            Ben Shneiderman and   
                John Stasko and   
                Gary Strong and   
                Kent Wittenburg   Strategic directions in human-computer
                                  interaction  . . . . . . . . . . . . . . 794--809
                   A. Sameh and   
                 G. Cybenko and   
                   M. Kalos and   
                   K. Neves and   
                    J. Rice and   
                D. Sorensen and   
                    F. Sullivan   Computational science and engineering    810--817
                 Nabil Adam and   
               Yelena Yesha and   
                         others   Strategic directions in electronic
                                  commerce and digital libraries: towards
                                  a digital agora  . . . . . . . . . . . . 818--835
            Allen B. Tucker and   
                         others   Strategic directions in computer science
                                  education  . . . . . . . . . . . . . . . 836--845
                      Anonymous   Author Index: Vols. 24--28 (1992--1996)  846--854
                      Anonymous   Subject Index: Vols. 24--28 (1992--1996) 854--859

ACM Computing Surveys
Volume 28, Number 4es, December, 1996

         Ronald J. Brachman and   
             Hector J. Levesque   Undirected behavior without unbounded
                                  search . . . . . . . . . . . . . . . . . 1:1--1:??
                 Thomas L. Dean   Integrating theory and practice in
                                  planning . . . . . . . . . . . . . . . . 2:1--2:??
                 Tom Dietterich   Machine learning . . . . . . . . . . . . 3:1--3:??
                      Jon Doyle   Cleaving (unto) artificial intelligence  4:1--4:??
                  Cordell Green   Formality helps scalability and
                                  robustness . . . . . . . . . . . . . . . 5:1--5:??
               Barbara J. Grosz   The importance of integration for AI . . 6:1--6:??
                   Ian Horswill   Integrated systems and naturalistic
                                  tasks  . . . . . . . . . . . . . . . . . 7:1--7:??
                  Daphne Koller   Structured representations and
                                  intractability . . . . . . . . . . . . . 8:1--8:??
               Fernando Pereira   Language, computation and artificial
                                  intelligence . . . . . . . . . . . . . . 9:1--9:??
                    Bart Selman   Computational challenges in artificial
                                  intelligence . . . . . . . . . . . . . . 10:1--10:??
                    Yoav Shoham   The open scientific borders of AI, and
                                  the case of economics  . . . . . . . . . 11:1--11:??
               Howard E. Shrobe   Two challenging domains  . . . . . . . . 12:1--12:??
            William R. Swartout   Future directions in knowledge-based
                                  systems  . . . . . . . . . . . . . . . . 13:1--13:??
             Michael P. Wellman   The economic approach to artificial
                                  intelligence . . . . . . . . . . . . . . 14:1--14:??
             Shlomo Zilberstein   Resource-bounded reasoning in
                                  intelligent systems  . . . . . . . . . . 15:1--15:??
          Pankaj K. Agarwal and   
                   Subhash Suri   Simple and practical geometric
                                  algorithms . . . . . . . . . . . . . . . 16:1--16:??
                 Nancy M. Amato   Equipping CAD/CAM systems with geometric
                                  intelligence . . . . . . . . . . . . . . 17:1--17:??
                  Danny Z. Chen   Developing algorithms and software for
                                  geometric path planning problems . . . . 18:1--18:??
              Ioannis G. Tollis   Graph drawing and information
                                  visualization  . . . . . . . . . . . . . 19:1--19:??
              Jeffrey S. Vitter   Communication issues in large-scale
                                  geometric computation  . . . . . . . . . 20:1--20:??
                 George Cybenko   Large-scope computing: the industrial
                                  challenges . . . . . . . . . . . . . . . 21:1--21:??
                   Melvin Kalos   Challenges in computational science  . . 22:1--22:??
                  Kenneth Neves   Thoughts on CSE candidates for
                                  industrial positions . . . . . . . . . . 23:1--23:??
                   John R. Rice   Computational science as one driving
                                  force for all aspects of computing
                                  research . . . . . . . . . . . . . . . . 24:1--24:??
               Francis Sullivan   From theory to practice  . . . . . . . . 25:1--25:??
                      Tom Conte   Importance of profiling and
                                  compatibility  . . . . . . . . . . . . . 26:1--26:??
                      Joel Emer   Incremental versus revolutionary
                                  research . . . . . . . . . . . . . . . . 27:1--27:??
                   Matt Farrens   Distributed decentralized computing  . . 28:1--28:??
                  Dirk Grunwald   Embedded, general-purpose, and
                                  high-performance systems . . . . . . . . 29:1--29:??
                         Kai Li   Applications, storage hierarchy, and
                                  integration  . . . . . . . . . . . . . . 30:1--30:??
                     Jack Mills   An industrial perspective on computer
                                  architecture . . . . . . . . . . . . . . 31:1--31:??
                    David Nagle   Synergy between software and hardware    32:1--32:??
                      Yale Patt   Microarchitecture, compilers and
                                  algorithms . . . . . . . . . . . . . . . 33:1--33:??
                      Jim Smith   Multiscalar as a new architecture
                                  paradigm . . . . . . . . . . . . . . . . 34:1--34:??
                  Wen-Hann Wang   Microprocessor architecture challenges
                                  --- the best is yet to come! . . . . . . 35:1--35:??
                     David Wood   Problems, challenges and the importance
                                  of performance evaluation  . . . . . . . 36:1--36:??
                    Robert Yung   The importance of process technology to
                                  microarchitecture  . . . . . . . . . . . 37:1--37:??
           Jos C. M. Baeten and   
                Jan A. Bergstra   Six issues concerning future directions
                                  in concurrency research  . . . . . . . . 39:1--39:??
                      Eike Best   Some major dichotomies relating to
                                  future research in concurrency . . . . . 40:1--40:??
               Rance Cleaveland   Semantic theories and system design  . . 41:1--41:??
               Roberto Gorrieri   On the power of concurrency theory . . . 42:1--42:??
               Mohamed G. Gouda   Network protocols between exact
                                  specifications and pragmatic
                                  implementations  . . . . . . . . . . . . 43:1--43:??
               Jan Friso Groote   Concurrency theory will set standards
                                  for description and analysis of software 44:1--44:??
                 C. A. R. Hoare   Unifying theories: a personal statement  46:1--46:??
                David Luginbuhl   Issues in concurrent systems research    47:1--47:??
                    Dale Miller   Logical foundations for open system
                                  design . . . . . . . . . . . . . . . . . 48:1--48:??
                  Jayadev Misra   A discipline of multiprogramming . . . . 49:1--49:??
                   Faron Moller   Logics for concurrency: structure versus
                                  automata . . . . . . . . . . . . . . . . 50:1--50:??
                  Ugo Montanari   Causal computing . . . . . . . . . . . . 51:1--51:??
            Rocco De Nicola and   
                Scott A. Smolka   Concurrency: theory and practice . . . . 52:1--52:??
                 Sanjiva Prasad   Models for mobile computing agents . . . 53:1--53:??
               Vaughan R. Pratt   Concurrency concepts: an ongoing search  54:1--54:??
                 Joseph Sifakis   Research directions for concurrency  . . 55:1--55:??
           Bernhard Steffen and   
               Tiziana Margaria   Method engineering for real-life
                                  concurrent systems . . . . . . . . . . . 56:1--56:??
                   Bent Thomsen   Programming languages, analysis tools,
                                  and concurrency theory . . . . . . . . . 57:1--57:??
                  Pierre Wolper   Where is the algorithmic support?  . . . 58:1--58:??
              Alexander Brodsky   Constraint databases: promising
                                  technology or just intellectual
                                  exercise?  . . . . . . . . . . . . . . . 59:1--59:??
              Philippe Codognet   The virtuality of constraints and the
                                  constraints of virtuality  . . . . . . . 60:1--60:??
                     R. Dechter   Bucket elimination: a unifying framework
                                  for processing hard and soft constraints 61:1--61:??
                     M. Dincbas   Constraint programming . . . . . . . . . 62:1--62:??
                     E. Freuder   In pursuit of the holy grail . . . . . . 63:1--63:??
            Manuel Hermenegildo   Some challenges for constraint
                                  programming  . . . . . . . . . . . . . . 64:1--64:??
                  J. Jaffar and   
                         R. Yap   Constraint programming 2000  . . . . . . 65:1--65:??
                       S. Kasif   Towards a constraint-based engineering
                                  framework for algorithm design and
                                  application  . . . . . . . . . . . . . . 66:1--66:??
                 Alan Mackworth   Constraint-based design of embedded
                                  intelligent systems  . . . . . . . . . . 67:1--67:??
                  D. McAllester   The rise of nonlinear mathematical
                                  programming  . . . . . . . . . . . . . . 68:1--68:??
                    Ken McAloon   Constraint-based programming . . . . . . 69:1--69:??
              Ugo Montanari and   
                Francesca Rossi   Constraint solving and programming:
                                  what's next? . . . . . . . . . . . . . . 70:1--70:??
               William J. Older   CLP (intervals)  . . . . . . . . . . . . 71:1--71:??
     Jean-François Puget   Future of constraint programming . . . . 72:1--72:??
                R. Ramakrishnan   Constraints in databases . . . . . . . . 73:1--73:??
                 Vijay Saraswat   Compositional computing  . . . . . . . . 74:1--74:??
                    Gert Smolka   Constraints in OZ  . . . . . . . . . . . 75:1--75:??
          Pascal Van Hentenryck   Constraint programming for combinatorial
                                  search problems  . . . . . . . . . . . . 76:1--76:??
           José Blakeley   Thoughts on directions in database
                                  research . . . . . . . . . . . . . . . . 77:1--77:??
                 Umeshwar Dayal   Database technology at a crossroads  . . 78:1--78:??
                 Sushil Jajodia   Managing security and privacy of
                                  information  . . . . . . . . . . . . . . 79:1--79:??
                 Henry F. Korth   New focal points for research in
                                  database systems . . . . . . . . . . . . 80:1--80:??
                  Guy M. Lohman   You think your DBMS is complex
                                  now\ldots? . . . . . . . . . . . . . . . 81:1--81:??
                    David Lomet   A role for research in the database
                                  industry . . . . . . . . . . . . . . . . 82:1--82:??
                    David Maier   Repackaging database systems . . . . . . 83:1--83:??
                   Frank Manola   Transforming the database system into an
                                  open service concept . . . . . . . . . . 84:1--84:??
             M. Tamer Özsu   Future of database systems: changing
                                  applications and technological
                                  developments . . . . . . . . . . . . . . 85:1--85:??
             Raghu Ramakrishnan   Some promising directions for database
                                  research . . . . . . . . . . . . . . . . 86:1--86:??
             Krithi Ramamritham   Application-oriented database support    87:1--87:??
                  Hans-J. Schek   Improving the role of future database
                                  systems  . . . . . . . . . . . . . . . . 88:1--88:??
       Richard Thomas Snodgrass   The inefficiency of misalignment . . . . 89:1--89:??
                    Jeff Ullman   Moving database theory into database
                                  practice . . . . . . . . . . . . . . . . 90:1--90:??
                 Jennifer Widom   Integrating heterogeneous databases:
                                  lazy or eager? . . . . . . . . . . . . . 91:1--91:??
                 Owen Astrachan   Education goals and priorities . . . . . 92:1--92:??
                      Kim Bruce   Thoughts on computer science education   93:1--93:??
                  Robert Cupper   A revised curriculum framework . . . . . 94:1--94:??
                  Peter Denning   Business designs of the university . . . 95:1--95:??
                  Scot Drysdale   What should we teach?  . . . . . . . . . 96:1--96:??
                Charles Kelemen   First courses for nonmajors and public
                                  understanding of computer science  . . . 97:1--97:??
              Catherine McGeoch   Research in the curriculum, and the Web  98:1--98:??
                      Yale Patt   First courses and fundamentals . . . . . 99:1--99:??
             Richard Proulx and   
                 Richard Rosala   The future of computer science education 100:1--100:??
                       Roy Rada   Calling for a virtual computing college  101:1--101:??
                   Eric Roberts   Directions in computer science education 102:1--102:??
              Lynn Andrea Stein   Interactive programming: revolutionizing
                                  introductory computer science  . . . . . 103:1--103:??
                   Allen Tucker   Crisis in computer science education . . 104:1--104:??
              Nabil R. Adam and   
                   Shamim Naqvi   Universal access in digital libraries    105:1--105:??
                Baruch Awerbuch   Maximizing gross network product (GNP):
                                  resource management on the GII . . . . . 106:1--106:??
                   Alex Brodsky   Constraint database technology for
                                  electronic trade with complex objectives 107:1--107:??
                Robert Grossman   Database mining challenges for digital
                                  libraries  . . . . . . . . . . . . . . . 108:1--108:??
                    Jim Johnson   The physics of politics in the
                                  information age  . . . . . . . . . . . . 109:1--109:??
       Barbara T. Blaustein and   
         Catherine McCollum and   
                Arnon Rosenthal   Flexible security policies for digital
                                  libraries  . . . . . . . . . . . . . . . 110:1--110:??
               Anna-Lena Neches   The future of electronic commerce: a
                                  pragmatic view . . . . . . . . . . . . . 111:1--111:??
               Karen Bennet and   
                   Jacob Slonim   The electronic commerce position paper   112:1--112:??
                   Ouri Wolfson   Infrastructure and cost models for
                                  digital libraries  . . . . . . . . . . . 113:1--113:??
              Howard D. Wactlar   The next generation electronic library
                                  --- capturing the experience . . . . . . 114:1--114:??
                    Rajeev Alur   Next steps in formal verification  . . . 115:1--115:??
              Edmund Clarke and   
              Jeannette M. Wing   Tools and partial analysis . . . . . . . 116:1--116:??
               Rance Cleaveland   Formality and software design  . . . . . 117:1--117:??
                  Steven German   Research goals for formal methods  . . . 118:1--118:??
            Thomas A. Henzinger   Some myths about formal verification . . 119:1--119:??
                Gerard Holzmann   On-the-fly model checking  . . . . . . . 120:1--120:??
                    Cliff Jones   Formal methods light . . . . . . . . . . 121:1--121:??
                    Doron Peled   User interfaces for formal methods . . . 122:1--122:??
                    John Rushby   Enhancing the utility of formal methods  123:1--123:??
                 Joseph Sifakis   Safety, security and quality . . . . . . 124:1--124:??
                  Prasad Sistla   Hybrid and incremental modelchecking
                                  techniques . . . . . . . . . . . . . . . 125:1--125:??
           Bernhard Steffen and   
               Tiziana Margaria   Tools get formal methods into practice   126:1--126:??
                  Pierre Wolper   The meaning of ``formal''  . . . . . . . 127:1--127:??
                   Jim Woodcock   Software engineering research directions 128:1--128:??
                   Steve Bryson   Implications of near-real-time
                                  three-dimensional interfaces . . . . . . 129:1--129:??
           Dick C. A. Bulterman   Making the technology serve the user . . 130:1--130:??
                Tiziana Catarci   Databases and the Web: new requirements
                                  for an easy access . . . . . . . . . . . 131:1--131:??
                   Wayne Citrin   Strategic directions in visual languages
                                  research . . . . . . . . . . . . . . . . 132:1--132:??
                 Isabel F. Cruz   Tailorable information visualization . . 133:1--133:??
         Ephraim P. Glinert and   
            R. Lindsay Todd and   
                 G. Bowden Wise   The adaptive multi-interface multimodal
                                  environment  . . . . . . . . . . . . . . 134:1--134:??
                Jonathan Grudin   The end of exile . . . . . . . . . . . . 135:1--135:??
                James D. Hollan   Strategic issues for human-computer
                                  interaction  . . . . . . . . . . . . . . 136:1--136:??
            Yannis E. Ioannidis   Visual user interfaces for database
                                  systems  . . . . . . . . . . . . . . . . 137:1--137:??
             Robert J. K. Jacob   The future of input devices  . . . . . . 138:1--138:??
                 Bonnie E. John   Evaluating usability evaluation
                                  techniques . . . . . . . . . . . . . . . 139:1--139:??
                David Kurlander   Thoughts on user interface processes and
                                  agendas  . . . . . . . . . . . . . . . . 140:1--140:??
                  Brad A. Myers   Programmability and heuristics in the
                                  user interfaces  . . . . . . . . . . . . 141:1--141:??
              Dan R. Olsen, Jr.   Computational resources and the Internet 142:1--142:??
              Stuart M. Shieber   A call for collaborative interfaces  . . 143:1--143:??
                Ben Shneiderman   Advanced graphic user interfaces:
                                  elastic and tightly coupled windows  . . 144:1--144:??
                    John Stasko   Future research directions in
                                  human-computer interaction . . . . . . . 145:1--145:??
                 Gary W. Strong   Human-centered information systems
                                  (HCIS) . . . . . . . . . . . . . . . . . 146:1--146:??
                Kent Wittenburg   The WWW information glut: implications
                                  for next-generation HCI technologies . . 147:1--147:??
                       M. Aksit   Separation and composition of concerns
                                  in the object-oriented model . . . . . . 148:1--148:??
                    A. P. Black   Object-oriented languages: the next
                                  generation . . . . . . . . . . . . . . . 149:1--149:??
                    L. Cardelli   Bad engineering properties of
                                  object-orient languages  . . . . . . . . 150:1--150:??
                      P. Cointe   Reflective languages and metalevel
                                  architectures  . . . . . . . . . . . . . 151:1--151:??
                     J. Coplien   Broadening beyond objects to patterns
                                  and to other paradigms . . . . . . . . . 152:1--152:??
                   R. Guerraoui   Distributed programming abstractions . . 153:1--153:??
                    G. Kiczales   Aspect-oriented programming  . . . . . . 154:1--154:??
                         D. Lea   Specification, architecture, and
                                  interoperability . . . . . . . . . . . . 155:1--155:??
                  K. Lieberherr   From transience to persistence in
                                  object-oriented programming:
                                  architectures and patterns . . . . . . . 156:1--156:??
                      O. Madsen   Strategic research directions in
                                  object-oriented programming  . . . . . . 157:1--157:??
                   B. Magnusson   Technology integration . . . . . . . . . 158:1--158:??
           José Meseguer   Why OOP needs new semantic foundations   159:1--159:??
        H. Mössenböck   Trends in object-oriented programming    160:1--160:??
                    J. Palsberg   Compiler technology for object-oriented
                                  languages  . . . . . . . . . . . . . . . 161:1--161:??
                     D. Schmidt   Using design patterns to guide the
                                  development of reusable object-oriented
                                  software . . . . . . . . . . . . . . . . 162:1--162:??
                  Luca Cardelli   Global computation . . . . . . . . . . . 163:1--163:??
                 Charles Consel   Program adaptation based on program
                                  transformation . . . . . . . . . . . . . 164:1--164:??
                 Patrick Cousot   Program analysis: the abstract
                                  interpretation perspective . . . . . . . 165:1--165:??
                  Michael Hanus   Integration of declarative paradigms:
                                  benefits and challenges  . . . . . . . . 166:1--166:??
       Daniel Le Métayer   Program analysis for software
                                  engineering: new applications, new
                                  requirements, new tools  . . . . . . . . 167:1--167:??
               Flemming Nielson   Perspectives on program analysis . . . . 168:1--168:??
                 Martin Odersky   Challenges in type systems research  . . 169:1--169:??
                   Robert Paige   Future directions in program
                                  transformations  . . . . . . . . . . . . 170:1--170:??
         Alberto Pettorossi and   
              Maurizio Proietti   Future directions in program
                                  transformation . . . . . . . . . . . . . 171:1--171:??
                  John Reynolds   Beyond ML  . . . . . . . . . . . . . . . 172:1--172:??
                  Jon G. Riecke   Semantics: the description of
                                  computational structures . . . . . . . . 173:1--173:??
                  Barbara Ryder   The future of program analysis . . . . . 174:1--174:??
               David A. Schmidt   On the need for a popular formal
                                  semantics  . . . . . . . . . . . . . . . 175:1--175:??
                 Dennis Volpano   Provably secure programming languages
                                  for remote evaluation  . . . . . . . . . 176:1--176:??
               Reinhard Wilhelm   Program analysis --- a toolmaker's
                                  perspective  . . . . . . . . . . . . . . 177:1--177:??
                     Alan Burns   Broadening real-time systems research    178:1--178:??
                   Kevin Jeffay   Technical and educational challenges for
                                  real-time computing  . . . . . . . . . . 179:1--179:??
                     Mike Jones   Consumer real-time systems . . . . . . . 180:1--180:??
                      Gary Koob   Large-scale distributed real-time
                                  systems  . . . . . . . . . . . . . . . . 181:1--181:??
                      Insup Lee   Formal verification, testing and
                                  checking of real-time systems  . . . . . 182:1--182:??
                  John Lehoczky   Analytical methods for real-time
                                  computing  . . . . . . . . . . . . . . . 183:1--183:??
                       Jane Liu   Validation of timing properties  . . . . 184:1--184:??
                         Al Mok   Firm real-time systems . . . . . . . . . 185:1--185:??
             Krithi Ramamritham   Predictability: demonstrating real-time
                                  properties . . . . . . . . . . . . . . . 186:1--186:??
                        Lui Sha   Real-time in the real world  . . . . . . 187:1--187:??
                 Jack Stankovic   The pervasiveness of real-time computing 188:1--188:??
              Andre van Tilborg   Real-time research in the Department of
                                  Defense  . . . . . . . . . . . . . . . . 189:1--189:??
                  Gregory Abowd   Software engineering and programming
                                  language considerations for ubiquitous
                                  computing  . . . . . . . . . . . . . . . 190:1--190:??
                 Craig Chambers   Towards reusable, extensible components  192:1--192:??
             Lori A. Clarke and   
                      Peri Tarr   New functionality for programming
                                  languages  . . . . . . . . . . . . . . . 193:1--193:??
        William G. Griswold and   
             Richard Wolski and   
             Scott B. Baden and   
            Stephen J. Fink and   
                  Scott R. Kohn   Programming language requirements for
                                  the next millennium  . . . . . . . . . . 194:1--194:??
              Robert Harper and   
                      Peter Lee   Research in programming languages for
                                  composability, safety, and performance   195:1--195:??
                     Paul Hudak   Building domain-specific embedded
                                  languages  . . . . . . . . . . . . . . . 196:1--196:??
                      Sam Kamin   The challenge of language technology
                                  transfer . . . . . . . . . . . . . . . . 197:1--197:??
                Melody M. Moore   Representation issues for reengineering
                                  interactive systems  . . . . . . . . . . 199:1--199:??
                  Jens Palsberg   Software evolution and integration . . . 200:1--200:??
                  Bill Scherlis   Beyond coding  . . . . . . . . . . . . . 201:1--201:??
                   Jack Wileden   Programming languages and software
                                  engineering: past, present and future    202:1--202:??
                 Lori A. Clarke   How do we improve software quality and
                                  how do we show that it matters?  . . . . 203:1--203:??
             Richard A. DeMillo   Mission-critical applications,
                                  commercial value and software quality    204:1--204:??
               William McKeeman   Separating concerns in software quality  205:1--205:??
          Edward F. Miller, Jr.   Getting quality methods into practice    206:1--206:??
             Alok Choudhary and   
                     David Kotz   Large-scale file systems with the
                                  flexibility of databases . . . . . . . . 207:1--207:??
           Thomas H. Cormen and   
            Michael T. Goodrich   A bridging model for parallel
                                  computation, communication, and I/O  . . 208:1--208:??
            Garth A. Gibson and   
                    John Wilkes   Self-managing network-attached storage   209:1--209:??
           Richard R. Muntz and   
                Joseph Pasquale   System-level design issues for storage
                                  I/O  . . . . . . . . . . . . . . . . . . 210:1--210:??
          M. Satyanarayanan and   
          Carla Schlatter Ellis   Adaptation: the key to mobile I/O  . . . 211:1--211:??
       Darren Erik Vengroff and   
           Jeffrey Scott Vitter   I/O-efficient algorithms and
                                  environments . . . . . . . . . . . . . . 212:1--212:??
                     Paul Green   The impact of the Web on networking
                                  research . . . . . . . . . . . . . . . . 213:1--213:??
                     Jim Kurose   Future directions in networking research 214:1--214:??
                Joseph Pasquale   Towards Internet computing . . . . . . . 215:1--215:??
                   Dana Angluin   A 1996 snapshot of computational
                                  learning theory  . . . . . . . . . . . . 216:1--216:??
                     Faith Fich   Infrastructure issues related to theory
                                  of computing research  . . . . . . . . . 217:1--217:??
             Oded Goldreich and   
                  Avi Wigderson   Theory of computing: a scientific
                                  perspective  . . . . . . . . . . . . . . 218:1--218:??
              Robert Harper and   
                  John Mitchell   ML and beyond  . . . . . . . . . . . . . 219:1--219:??


ACM Computing Surveys
Volume 29, Number 1, March, 1997

                   Peter Wegner   Editorial Statement  . . . . . . . . . . 1--2
                 M. M. Reid and   
               R. J. Millar and   
                    N. D. Black   Second-Generation Image Coding: An
                                  Overview . . . . . . . . . . . . . . . . 3--29
            Micha\l Walicki and   
                  Sigurd Meldal   Algebraic approaches to nondeterminism
                                  --- an overview  . . . . . . . . . . . . 30--81
                  Fong Pong and   
                  Michel Dubois   Verification Techniques for Cache
                                  Coherence Protocols  . . . . . . . . . . 82--126

ACM Computing Surveys
Volume 29, Number 2, June, 1997

                   Peter Wegner   About this Issue \ldots  . . . . . . . . 127--127
           Richard A. Uhlig and   
                Trevor N. Mudge   Trace-Driven Memory Simulation: a Survey 128--170
            Vangelis T. Paschos   A Survey of Approximately Optimal
                                  Solutions to Some Covering and Packing
                                  Problems . . . . . . . . . . . . . . . . 171--209

ACM Computing Surveys
Volume 29, Number 3, September, 1997

                    Tommy Thorn   Programming languages for mobile code    213--239
                  Philip Wadler   How to declare an imperative . . . . . . 240--263
                   Qiang Ji and   
             Michael M. Marefat   Machine interpretation of CAD data for
                                  manufacturing applications . . . . . . . 264--311

ACM Computing Surveys
Volume 29, Number 4, December, 1997

                    Pamela Zave   Classification of research efforts in
                                  requirements engineering . . . . . . . . 315--321
              Hyacinth S. Nwana   Is computer science education in crisis? 322--324
      Frederick M. Weinhaus and   
               Venkat Devarajan   Texture mapping $3$D models of
                                  real-world scenes  . . . . . . . . . . . 325--365
                   Hong Zhu and   
         Patrick A. V. Hall and   
                 John H. R. May   Software unit test coverage and adequacy 366--427
                      Anonymous   Errata . . . . . . . . . . . . . . . . . 428--428
                      Anonymous   Author index: Vols. 25--29 (1993--1997)  429--437
                      Anonymous   Author index . . . . . . . . . . . . . . 429--437
                      Anonymous   Subject index: Vols. 25--29 (1993--1997) 437--442
                  Subject index   Subject index  . . . . . . . . . . . . . 437--442


ACM Computing Surveys
Volume 30, Number 1, March, 1998

                   Peter Wegner   About this issue . . . . . . . . . . . . 1--1
           Scott M. Lewandowski   Frameworks for component-based
                                  client/server computing  . . . . . . . . 3--27
                   Ran El-Yaniv   Competitive solutions for online
                                  financial problems . . . . . . . . . . . 28--69
            Alexander Thomasian   Concurrency control: methods,
                                  performance, and analysis  . . . . . . . 70--119

ACM Computing Surveys
Volume 30, Number 2, June, 1998

        David B. Skillicorn and   
                 Domenico Talia   Models and languages for parallel
                                  computation  . . . . . . . . . . . . . . 123--169
               Volker Gaede and   
            Oliver Günther   Multidimensional access methods  . . . . 170--231
             Reidar Conradi and   
           Bernhard Westfechtel   Version models for software
                                  configuration management . . . . . . . . 232--282

ACM Computing Surveys
Volume 30, Number 3, September, 1998

                      Anonymous   Contents: Computing Surveys' Electronic
                                  Symposium on Partial Evaluating:
                                  \path=http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/=  283--283
                      Anonymous   Editorial  . . . . . . . . . . . . . . . 284--284
               Peter Wegner and   
                  Marvin Israel   Editorial  . . . . . . . . . . . . . . . 284--284
              Olivier Danvy and   
          Robert Glück and   
                 Peter Thiemann   1998 Symposium on Partial Evaluation . . 285--290
          Jean-Pierre Briot and   
           Rachid Guerraoui and   
               Klaus-Peter Lohr   Concurrency and Distribution in
                                  Object-Oriented Programming  . . . . . . 291--329
         Saleh E. Abdullahi and   
              Graem A. Ringwood   Garbage Collecting the Internet: a
                                  Survey of Distributed Garbage Collection 330--373
              Prasant Mohapatra   Wormhole Routing Techniques for Directly
                                  Connected Multicomputer Systems  . . . . 374--410

ACM Computing Surveys
Volume 30, Number 3es, September, 1998

                    David Basin   Logical framework based program
                                  development  . . . . . . . . . . . . . . 1:1--1:??
                   J. Field and   
                 J. Heering and   
                   T. B. Dinesh   Equations as a uniform framework for
                                  partial evaluation and abstract
                                  interpretation . . . . . . . . . . . . . 2:1--2:??
                  Andrei Klimov   Program specialization vs. program
                                  composition  . . . . . . . . . . . . . . 3:1--3:??
           Michael Leuschel and   
                 B. Martens and   
                  D. de Schreye   Some achievements and prospects in
                                  partial deduction  . . . . . . . . . . . 4:1--4:??
                Torben Mogensen   Inherited limits . . . . . . . . . . . . 5:1--5:??
         Alberto Pettorossi and   
              Maurizio Proietti   Program specialization via algorithmic
                                  unfold/fold transformations  . . . . . . 6:1--6:??
             Akihiko Takano and   
               Zhenjiang Hu and   
                Masato Takeichi   Program transformation in calculational
                                  form . . . . . . . . . . . . . . . . . . 7:1--7:??
            Philip Wickline and   
                  Peter Lee and   
             Frank Pfenning and   
                   Rowan Davies   Modal types as staging specifications
                                  for run-time code generation . . . . . . 8:1--8:??
             Maria Alpuente and   
            Moreno Falaschi and   
                   German Vidal   A unifying view of functional and logic
                                  program specialization . . . . . . . . . 9:1--9:??
           Michele Bugliesi and   
            Anna Ciampolini and   
              Evelina Lamma and   
                    Paola Mello   Optimizing modular logic languages . . . 10:1--10:??
              Sandro Etalle and   
             Maurizio Gabbrieli   Partial evaluation of concurrent
                                  constraint languages . . . . . . . . . . 11:1--11:??
            J. P. Gallagher and   
                      L. Lafave   The role of trace abstractions in
                                  program specialization algorithms  . . . 12:1--12:??
                  John Hatcliff   Foundations for partial evaluation of
                                  functional programs with computational
                                  effects  . . . . . . . . . . . . . . . . 13:1--13:??
                    John Hughes   Type specialization  . . . . . . . . . . 14:1--14:??
                  L. Lafave and   
                J. P. Gallagher   Extending the power of automatic
                                  constraint-based partial evaluators  . . 15:1--15:??
       Konstantinos Sagonas and   
               Michael Leuschel   Extending partial deduction to tabled
                                  execution: some results and open issues  16:1--16:??
             Sandrine Blazy and   
                 Philippe Facon   Partial evaluation for program
                                  comprehension  . . . . . . . . . . . . . 17:1--17:??
               Tristan Cazenave   Synthesis of an efficient tactical
                                  theorem prover for the game of go  . . . 18:1--18:??
                  C. Consel and   
                  L. Hornof and   
                  R. Marlet and   
                  G. Muller and   
                S. Thibault and   
            E.-N. Volanschi and   
                  J. Lawall and   
                 J. Noyé   Tempo: specializing systems applications
                                  and beyond . . . . . . . . . . . . . . . 19:1--19:??
                  C. Consel and   
                  L. Hornof and   
                  R. Marlet and   
                  G. Muller and   
                S. Thibault and   
            E.-N. Volanschi and   
                  J. Lawall and   
                 J. Noyé   Partial evaluation for software
                                  engineering  . . . . . . . . . . . . . . 20:1--20:??
                   Scott Draves   Partial evaluation for media processing  21:1--21:??
              Matthew Dwyer and   
              John Hatcliff and   
                 Muhammad Nanda   Using partial evaluation to enable
                                  verification of concurrent software  . . 22:1--22:??
                 Mark Leone and   
                      Peter Lee   Dynamic specialization in the Fabius
                                  system . . . . . . . . . . . . . . . . . 23:1--23:??
              Oscar Waddell and   
                 R. Kent Dybvig   Visualizing partial evaluation . . . . . 24:1--24:??
            Yuan Chang Liou and   
                   Yih Nen Jeng   A transfinite interpolation method of
                                  grid generation based on multipoints . . 105--113

ACM Computing Surveys
Volume 30, Number 4, December, 1998

                   Peter Wegner   About this issue\ldots . . . . . . . . . 411--411
          Pankaj K. Agarwal and   
                   Micha Sharir   Efficient algorithms for geometric
                                  optimization . . . . . . . . . . . . . . 412--458
                  Roel Wieringa   A survey of structured and
                                  object-oriented software specification
                                  methods and techniques . . . . . . . . . 459--527
             Fabio Crestani and   
              Mounia Lalmas and   
 Cornelis J. Van Rijsbergen and   
                  Iain Campbell   ``Is this document relevant? \ldots
                                  probably'': a survey of probabilistic
                                  models in information retrieval  . . . . 528--552


ACM Computing Surveys
Volume 31, Number 1, March, 1999

          Felix C. Gärtner   Fundamentals of fault-tolerant
                                  distributed computing in asynchronous
                                  environments . . . . . . . . . . . . . . 1--26
                    Mengchi Liu   Deductive database languages: problems
                                  and solutions  . . . . . . . . . . . . . 27--62
            Norman W. Paton and   
              Oscar Díaz   Active database systems  . . . . . . . . 63--103

ACM Computing Surveys
Volume 31, Number 2, June, 1999

                 Kevin L. Mills   Introduction to the Electronic Symposium
                                  on Computer-Supported Cooperative Work   105--115
                      Anonymous   Table of Contents: Electronic Symposium
                                  on Computer-Supported Cooperative Work   116--116
                   Jin Jing and   
      Abdelsalam Sumi Helal and   
               Ahmed Elmagarmid   Client-server computing in mobile
                                  environments . . . . . . . . . . . . . . 117--157
             Betty Salzberg and   
            Vassilis J. Tsotras   Comparison of access methods for
                                  time-evolving data . . . . . . . . . . . 158--221

ACM Computing Surveys
Volume 31, Number 2es, June, 1999

                 Kevin L. Mills   Introduction to the Electronic Symposium
                                  on Computer-Supported Cooperative Work   1:1--1:??
             Steven McCanne and   
                Eric Brewer and   
                 Randy Katz and   
                  Elan Amir and   
             Yatin Chawathe and   
                 Todd Hodes and   
          Ketan Mayer-Patel and   
             Suchitra Raman and   
              Cynthia Romer and   
             Angela Schuett and   
                Andrew Swan and   
              Teck-Lee Tung and   
                  Tina Wong and   
                 Kristin Wright   MASH: enabling scalable multipoint
                                  collaboration  . . . . . . . . . . . . . 2:1--2:??
                    Son Dao and   
                 Eddie Shek and   
             Asha Vellaikal and   
           Richard R. Muntz and   
                Lixia Zhang and   
          Miodrag Potkonjak and   
                   Ouri Wolfson   Semantic multicast: intelligently
                                  sharing collaborative sessions . . . . . 3:1--3:??
                    Ivan Marsic   DISCIPLE: a framework for multimodal
                                  collaboration in heterogeneous
                                  environments . . . . . . . . . . . . . . 4:1--4:??
             Daniel A. Reed and   
                Simon M. Kaplan   Orbit/Virtue: collaboration and
                                  visualization toolkits . . . . . . . . . 5:1--5:??
                   Kevin Martin   Creation and performance analysis of
                                  user representations in collaborative
                                  virtual environments . . . . . . . . . . 6:1--6:??
             Francis Kubala and   
               Sean Colbath and   
                  Daben Liu and   
                   John Makhoul   Rough'n'Ready: a meeting recorder and
                                  browser  . . . . . . . . . . . . . . . . 7:1--7:??
               David Payton and   
                 Mike Daily and   
                   Kevin Martin   Dynamic collaborator discovery in
                                  information intensive environments . . . 8:1--8:??
          Howard D. Wactlar and   
        Michael G. Christel and   
     Alexander G. Hauptmann and   
                    Yihong Gong   Informedia Experience-on-Demand:
                                  capturing, integrating and communicating
                                  experiences across people, time and
                                  space  . . . . . . . . . . . . . . . . . 9:1--9:??
              Michael Wolverton   Task-based information management  . . . 10:1--10:??
            James H. Morris and   
      Christine M. Neuwirth and   
       Susan Harkness Regli and   
          Ravinder Chandhok and   
             Geoffrey C. Wenger   Interface issues in computer support for
                                  asynchronous communication . . . . . . . 11:1--11:??
           Larry S. Jackson and   
                    Ed Grossman   Integration of synchronous and
                                  asynchronous collaboration activities    12:1--12:??
              Jonathan Rees and   
             Sarah Ferguson and   
         Sankar Virdhagriswaran   Consistency management for distributed
                                  collaboration  . . . . . . . . . . . . . 13:1--13:??
             Craig Thompson and   
              Paul Pazandak and   
             Venu Vasudevan and   
               Frank Manola and   
                Mark Palmer and   
                 Gil Hansen and   
                     Tom Bannon   Intermediary Architecture: Interposing
                                  middleware object services between Web
                                  client and server  . . . . . . . . . . . 14:1--14:??
            Laurie Damianos and   
          Lynette Hirschman and   
             Robyn Kozierok and   
              Jeffrey Kurtz and   
           Andrew Greenberg and   
            Kimberley Walls and   
           Sharon Laskowski and   
                   Jean Scholtz   Evaluation for collaborative systems . . 15:1--15:??
             M. Ranganathan and   
             Laurent Andrey and   
            Virginie Schaal and   
          Jean-Philippe Favreau   Re-configurable distributed scripting    16:1--16:??
               Samuel Bayer and   
         Laurie E. Damianos and   
             Robyn Kozierok and   
                    James Mokwa   The MITRE Multi-Modal Logger: its use in
                                  evaluation of collaborative systems  . . 17:1--17:??
           Jeffrey L. Kurtz and   
         Laurie E. Damianos and   
             Robyn Kozierok and   
              Lynette Hirschman   The MITRE map navigation experiment  . . 18:1--18:??

ACM Computing Surveys
Volume 31, Number 3, September, 1999

                  P. Degano and   
                R. Gorrieri and   
    A. Marchetti-Spaccamela and   
                      P. Wegner   Computing Surveys' Electronic Symposium
                                  on the Theory of Computation . . . . . . 223--225
                      Anonymous   Symposium on the Theory of Computation:
                                  Table of Contents  . . . . . . . . . . . 226--226
               Piero Fraternali   Tools and approaches for developing
                                  data-intensive Web applications: a
                                  survey . . . . . . . . . . . . . . . . . 227--263
                 A. K. Jain and   
                M. N. Murty and   
                    P. J. Flynn   Data clustering: a review  . . . . . . . 264--323

ACM Computing Surveys
Volume 31, Number 3es, September, 1999

                  P. Degano and   
                R. Gorrieri and   
    A. Marchetti-Spaccamela and   
                      P. Wegner   Computing surveys' electronic symposium
                                  on the theory of computation . . . . . . 1:1--1:??
              H. Noltemeier and   
                H.-C. Wirth and   
                   S. O. Krumke   Network design and improvement . . . . . 2:1--2:??
          Giuseppe Cattaneo and   
              Giuseppe Italiano   Algorithm engineering  . . . . . . . . . 3:1--3:??
             Susanne Albers and   
               Stefano Leonardi   On-line algorithms . . . . . . . . . . . 4:1--4:??
               Chris Hankin and   
             Pasquale Malacaria   Program analysis games . . . . . . . . . 5:1--5:??
                  Patric Cousot   Directions for research in approximate
                                  system analysis  . . . . . . . . . . . . 6:1--6:??
                 Marco Bernardo   Let's evaluate performance algebraically 7:1--7:??
              Juraj Hromkovi\vc   Some contributions of the study of
                                  abstract communication complexity to
                                  other areas of computer science  . . . . 8:1--8:??
              Hartmut Ehrig and   
              Gabriele Taentzer   Graphical representation and graph
                                  transformation . . . . . . . . . . . . . 9:1--9:??
            Donald Sannella and   
               Andrzei Tarlecki   Algebraic methods for specification and
                                  formal development of programs . . . . . 10:1--10:??
                Dale Miller and   
            Catuscia Palmidessi   Foundational aspects of syntax . . . . . 11:1--11:??
           Dora Giammarresi and   
                Antonio Restivo   Extending formal language hierarchies to
                                  higher dimensions  . . . . . . . . . . . 12:1--12:??
                 Corrado Priami   Operational methods in theoretical
                                  computer science . . . . . . . . . . . . 13:1--13:??
                    Kohei Honda   Semantics study and reality of computing 14:1--14:??
               Rusins Freivalds   How to simulate free will in a
                                  computational device . . . . . . . . . . 15:1--15:??
                Jiri Wiedermann   Simulating the mind: a gauntlet thrown
                                  to computer science  . . . . . . . . . . 16:1--16:??

ACM Computing Surveys
Volume 31, Number 4, December, 1999

               Helen Ashman and   
      Rosemary Michelle Simpson   Computing Surveys' Electronic Symposium
                                  on Hypertext and Hypermedia: Editorial   325--334
              Grigoris Antoniou   A tutorial on default logics . . . . . . 337--359
                  Sami Iren and   
               Paul D. Amer and   
              Phillip T. Conrad   The transport layer: tutorial and survey 360--404
              Yu-Kwong Kwok and   
                   Ishfaq Ahmad   Static scheduling algorithms for
                                  allocating directed task graphs to
                                  multiprocessors  . . . . . . . . . . . . 406--471

ACM Computing Surveys
Volume 31, Number 4es, December, 1999

               Helen Ashman and   
      Rosemary Michelle Simpson   Computing Surveys' Electronic Symposium
                                  on Hypertext and Hypermedia: Editorial   1:1--1:??
               Uffe K. Wiil and   
     Peter J. Nürnberg and   
                John J. Leggett   Hypermedia research directions: an
                                  infrastructure perspective . . . . . . . 2:1--2:??
              Andrew E. Treloar   Applying hypertext and hypermedia to
                                  scholarly journals enables both product
                                  and process innovation . . . . . . . . . 3:1--3:??
            Douglas Tudhope and   
                Daniel Cunliffe   Semantically indexed hypermedia: linking
                                  information disciplines  . . . . . . . . 4:1--4:??
               Jon M. Kleinberg   Hubs, authorities, and communities . . . 5:1--5:??
              Sougata Mukherjea   Information visualization for hypermedia
                                  systems  . . . . . . . . . . . . . . . . 6:1--6:??
           Harri Oinas-Kukkonen   Flexible CASE and hypertext  . . . . . . 7:1--7:??
              Gustavo Rossi and   
    Fernando Daniel Lyardet and   
                 Daniel Schwabe   Developing hypermedia applications with
                                  methods and patterns . . . . . . . . . . 8:1--8:??
                Leslie Carr and   
                 Wendy Hall and   
                 David De Roure   The evolution of hypertext link services 9:1--9:??
              Paul H. Lewis and   
                 Wendy Hall and   
             Leslie A. Carr and   
                 David De Roure   The significance of linking  . . . . . . 10:1--10:??
            Siegfried Reich and   
                Leslie Carr and   
             David De Roure and   
                     Wendy Hall   Where have you been from here? Trials in
                                  hypertext systems  . . . . . . . . . . . 11:1--11:??
                Paul De Bra and   
          Peter Brusilovsky and   
               Geert-Jan Houben   Adaptive hypermedia: from systems to
                                  framework  . . . . . . . . . . . . . . . 12:1--12:??
                Wen-Syan Li and   
        K. Selçuk Candan   Integrating content search with
                                  structure analysis for hypermedia
                                  retrieval and management . . . . . . . . 13:1--13:??
      Frank M. Shipman, III and   
          Catherine C. Marshall   Spatial hypertext: an alternative to
                                  navigational and semantic links  . . . . 14:1--14:??
             Richard Bodner and   
                  Mark Chignell   Dynamic hypertext: querying and linking  15:1--15:??
               Richard W. Kopak   Functional link typing in hypertext  . . 16:1--16:??
             Soumen Chakrabarti   Recent results in automatic Web resource
                                  discovery  . . . . . . . . . . . . . . . 17:1--17:??
            Jonathan Furner and   
                David Ellis and   
                  Peter Willett   Inter-linker consistency in the manual
                                  construction of hypertext documents  . . 18:1--18:??
                 Mark Bernstein   Structural patterns and hypertext
                                  rhetoric . . . . . . . . . . . . . . . . 19:1--19:??
            Kenneth M. Anderson   Supporting software engineering with
                                  open hypermedia  . . . . . . . . . . . . 20:1--20:??
               Steven J. DeRose   XML linking  . . . . . . . . . . . . . . 21:1--21:??
               Stephen J. Green   Lexical semantics and automatic
                                  hypertext construction . . . . . . . . . 22:1--22:??
              Lynda Hardman and   
     Jacco van Ossenbruggen and   
             Lloyd Rutledge and   
           Dick C. A. Bulterman   Hypermedia: the link with time . . . . . 23:1--23:??
                   Fabio Vitali   Versioning hypermedia  . . . . . . . . . 24:1--24:??
              Steve Benford and   
                 Ian Taylor and   
           David Brailsford and   
             Boriana Koleva and   
                Mike Craven and   
                Mike Fraser and   
               Gail Reynard and   
               Chris Greenhalgh   Three dimensional visualization of the
                                  World Wide Web . . . . . . . . . . . . . 25:1--25:??
           Megan Quentin-Baxter   Quantitative evidence for differences
                                  between learners making use of passive
                                  hypermedia learning environments . . . . 26:1--26:??
             Ross Wilkinson and   
                Alan F. Smeaton   Automatic link generation  . . . . . . . 27:1--27:??
                  Hugh C. Davis   Hypertext link integrity . . . . . . . . 28:1--28:??
             Michael Bieber and   
                    Joonhee Yoo   Hypermedia: a design philosophy  . . . . 29:1--29:??
            David F. Brailsford   Separable hyperstructure and delayed
                                  link binding . . . . . . . . . . . . . . 30:1--30:??
               Fabio Vitali and   
                 Michael Bieber   Hypermedia on the Web: what will it
                                  take?  . . . . . . . . . . . . . . . . . 31:1--31:??
             Michael Bieber and   
       Harri Oinas-Kukkonen and   
             V. Balasubramanian   Hypertext functionality  . . . . . . . . 32:1--32:??
            Theodor Holm Nelson   Xanalogical structure, needed now more
                                  than ever: parallel documents, deep
                                  links to content, deep versioning, and
                                  deep re-use  . . . . . . . . . . . . . . 33:1--33:??
                  Janet Verbyla   Unlinking the link . . . . . . . . . . . 34:1--34:??
            Robert Cailliau and   
                   Helen Ashman   Hypertext in the Web --- a history . . . 35:1--35:??
                Andries van Dam   Education: the unfinished revolution . . 36:1--36:??
            Theodor Holm Nelson   The unfinished revolution and Xanadu . . 37:1--37:??
          Douglas Engelbart and   
                 Jeff Ruilifson   Bootstrapping our collective
                                  intelligence . . . . . . . . . . . . . . 38:1--38:??


ACM Computing Surveys
Volume 32, Number 1, March, 2000

                 P. Bellini and   
               R. Mattolini and   
                        P. Nesi   Temporal logics for real-time system
                                  specification  . . . . . . . . . . . . . 12--42
            Wilhelm Hasselbring   Programming languages and systems for
                                  prototyping concurrent applications  . . 43--79
                  Palash Sarkar   A brief history of cellular automata . . 80--107

ACM Computing Surveys
Volume 32, Number 1es, March, 2000

               Mohamed E. Fayad   Introduction to the Computing Surveys'
                                  Electronic Symposium on Object-Oriented
                                  Application Frameworks . . . . . . . . . 1:1--1:??
             Davide Brugali and   
                   Katia Sycara   Frameworks and pattern languages: an
                                  intriguing relationship  . . . . . . . . 2:1--2:??
                  Jan Bosch and   
                Peter Molin and   
           Michael Mattsson and   
              PerOlof Bengtsson   Object-oriented framework-based software
                                  development: problems and experiences    3:1--3:??
           Mohamed E. Fayad and   
                  David S. Hamu   Enterprise frameworks: guidelines for
                                  selection  . . . . . . . . . . . . . . . 4:1--4:??
           Dirk Bäumer and   
              Guido Gryczan and   
                 Rolf Knoll and   
          Carola Lilienthal and   
                Dirk Riehle and   
         Heinz Züllighoven   Domain-driven framework layering in
                                  large systems  . . . . . . . . . . . . . 5:1--5:??
              Wolfgang Pree and   
                  Kai Koskimies   Framelets --- small and loosely coupled
                                  frameworks . . . . . . . . . . . . . . . 6:1--6:??
                Yingwu Wang and   
                Dilip Patel and   
                Graham King and   
                  Ian Court and   
              Geoff Staples and   
               Maraget Ross and   
                  Mohamad Fayad   On built-in test reuse in
                                  object-oriented framework design . . . . 7:1--7:??
           Görel Hedin and   
 Jòrgen Lindskov Knudsen   On the role of language constructs for
                                  framework design . . . . . . . . . . . . 8:1--8:??
             James E. Carey and   
               Brent A. Carlson   Deferring design decisions in an
                                  application framework  . . . . . . . . . 9:1--9:??
                Dirk Riehle and   
           Roger Brudermann and   
               Thomas Gross and   
            Kai-Uwe Mätzel   Pattern density and role modeling of an
                                  object transport service . . . . . . . . 10:1--10:??
               Mehmet Aksit and   
       Francesco Marcelloni and   
             Bedir Tekinerdogan   Developing object-oriented frameworks
                                  using domain models  . . . . . . . . . . 11:1--11:??
            Giancarlo Succi and   
             Andrea Valerio and   
            Tullio Vernazza and   
           Massimo Fenaroli and   
               Paolo Predonzani   Framework extraction with domain
                                  analysis . . . . . . . . . . . . . . . . 12:1--12:??
                 Pierre Roy and   
                 Anne Liret and   
         François Pachet   The framework approach for constraint
                                  satisfaction . . . . . . . . . . . . . . 13:1--13:??
             Neelam Soundarajan   Documenting framework behavior . . . . . 14:1--14:??
                Greg Butler and   
           Rudolf K. Keller and   
                    Hafedh Mili   A framework for framework documentation  15:1--15:??
  António Rito Silva and   
       Francisco Assis Rosa and   
        Teresa Gonçalves   Framework description using
                                  concern-specific design patterns
                                  composition  . . . . . . . . . . . . . . 16:1--16:??
            Garry Froehlich and   
            H. James Hoover and   
               Paul G. Sorenson   Choosing an object-oriented domain
                                  framework  . . . . . . . . . . . . . . . 17:1--17:??
                Jagdish Bansiya   Evaluating framework architecture
                                  structural stability . . . . . . . . . . 18:1--18:??
             Zakaria Maamar and   
                 Bernard Moulin   An overview of software agent-oriented
                                  frameworks . . . . . . . . . . . . . . . 19:1--19:??
       Elizabeth A. Kendall and   
       P. V. Murali Krishna and   
               C. B. Suresh and   
             Chira G. V. Pathak   An application framework for intelligent
                                  and mobile agents  . . . . . . . . . . . 20:1--20:??
             Davide Brugali and   
                   Katia Sycara   Towards agent oriented application
                                  frameworks . . . . . . . . . . . . . . . 21:1--21:??
        Beno\^\it Garbinato and   
               Rachid Guerraoui   An open framework for reliable
                                  distributed computing  . . . . . . . . . 22:1--22:??
            John Michaloski and   
               Sushil Birla and   
               C. Jerry Yen and   
               Richard Igou and   
                 George Weinert   An open system framework for
                                  component-based CNC machines . . . . . . 23:1--23:??
              Lidia Fuentes and   
          Josée M. Troya   Towards an open multimedia service
                                  framework  . . . . . . . . . . . . . . . 24:1--24:??
                 Verlyn Johnson   The San Francisco Project: Business
                                  process components and infrastructure    25:1--25:??
       Riccardo Capobianchi and   
      Alberto Coen-Porisini and   
             Dino Mandrioli and   
                Angelo Morzenti   A framework architecture for supervision
                                  and control systems  . . . . . . . . . . 26:1--26:??
               Gerti Kappel and   
       Stefan Rausch-Schott and   
          Werner Retschitzegger   A framework for workflow management
                                  systems based on objects, rules and
                                  roles  . . . . . . . . . . . . . . . . . 27:1--27:??
               Michael Koch and   
               Jürgen Koch   Application of frameworks in groupware
                                  --- the Iris group editor environment    28:1--28:??
              Partha Pratim Pal   A Framework for Isolating Connection
                                  Exception Management . . . . . . . . . . 29:1--29:10
              Partha pratim Pal   A framework for isolating connection
                                  exception management . . . . . . . . . . 29:1--29:??
              Gustavo Rossi and   
          Alejandra Garrido and   
                 Daniel Schwabe   Navigating between objects. Lessons from
                                  an object-oriented framework perspective 30:1--30:??
   J.-M. Jézéquel   An object-oriented framework for data
                                  parallelism  . . . . . . . . . . . . . . 31:1--31:??
                   Raman Kannan   PAcceptor and SConnector frameworks:
                                  combining concurrency and communication  32:1--32:??
            Jürgen Buchner   HotDoc: a framework for compound
                                  documents  . . . . . . . . . . . . . . . 33:1--33:??
              Serge Demeyer and   
              Koen De Hondt and   
               Patrick Steyaert   Consistent framework documentation with
                                  computed links and framework contracts   34:1--34:??
                Peter T. Whelan   Experiences and issues with SEMATECH's
                                  CIM framework  . . . . . . . . . . . . . 35:1--35:??
              Raja Harinath and   
         Jaideep Srivastava and   
             Jim Richardson and   
                   Mark Foresti   Experiences with an object oriented
                                  framework for distributed control
                                  applications . . . . . . . . . . . . . . 36:1--36:??
              Ehab Al-Shaer and   
              Mohamed Fayed and   
            Hussein Abdel-Wahab   Adaptive object-oriented filtering
                                  framework for event management
                                  applications . . . . . . . . . . . . . . 37:1--37:??
              Volker Luckas and   
               Ralf Dörner   Experience form the future --- using
                                  object-orientation concepts for $3$D
                                  visualization and validation of
                                  industrial scenarios . . . . . . . . . . 38:1--38:??
         Douglas C. Schmidt and   
                    James C. Hu   Developing flexible and high-performance
                                  Web servers with frameworks and patterns 39:1--39:??
                 Ezra Ebner and   
              Weiguang Shao and   
                   Wei-Tek Tsai   The five-module framework for Internet
                                  application development  . . . . . . . . 40:1--40:??
Constantinos A. Constantinides and   
                 Atef Bader and   
            Tzilla H. Elrad and   
                P. Netinant and   
               Mohamed E. Fayad   Designing an aspect-oriented framework
                                  in an object-oriented environment  . . . 41:1--41:??

ACM Computing Surveys
Volume 32, Number 2, June, 2000

               Carlos A. Coello   An updated survey of GA-based
                                  multiobjective optimization techniques   109--143
              Mei Kobayashi and   
                  Koichi Takeda   Information retrieval on the Web . . . . 144--173
       Steven P. Vanderwiel and   
                 David J. Lilja   Data prefetch mechanisms . . . . . . . . 174--199

ACM Computing Surveys
Volume 32, Number 3, September, 2000

                   Helen Ashman   Electronic document addressing: dealing
                                  with change  . . . . . . . . . . . . . . 201--212
              Iffat H. Kazi and   
             Howard H. Chen and   
           Berdenia Stanley and   
                 David J. Lilja   Techniques for obtaining high
                                  performance in Java programs . . . . . . 213--240
     Dejan S. Miloji\vci\'c and   
               Fred Douglis and   
           Yves Paindaveine and   
            Richard Wheeler and   
                  Songnian Zhou   Process migration  . . . . . . . . . . . 241--299
            Eleanor Rieffel and   
                 Wolfgang Polak   An introduction to quantum computing for
                                  non-physicists . . . . . . . . . . . . . 300--335

ACM Computing Surveys
Volume 32, Number 4, December, 2000

Carlos Iván Chesñevar and   
     Ana Gabriela Maguitman and   
           Ronald Prescott Loui   Logical models of argument . . . . . . . 337--383
           David M. Hilbert and   
              David F. Redmiles   Extracting usability information from
                                  user interface events  . . . . . . . . . 384--421
                Donald Kossmann   The state of the art in distributed
                                  query processing . . . . . . . . . . . . 422--469


ACM Computing Surveys
Volume 33, Number 1, March, 2001

            Russell Greiner and   
           Christian Darken and   
                N. Iwan Santoso   Efficient reasoning  . . . . . . . . . . 1--30
                Gonzalo Navarro   A guided tour to approximate string
                                  matching . . . . . . . . . . . . . . . . 31--88
                  Karsten Weihe   A software engineering perspective on
                                  algorithmics . . . . . . . . . . . . . . 89--134

ACM Computing Surveys
Volume 33, Number 2, June, 2001

           Pierpaolo Degano and   
                 Corrado Priami   Enhanced operational semantics: a tool
                                  for describing and analyzing concurrent
                                  systems  . . . . . . . . . . . . . . . . 135--176
             Bev Littlewood and   
                Peter Popov and   
               Lorenzo Strigini   Modeling software design diversity: a
                                  review . . . . . . . . . . . . . . . . . 177--208
           Jeffrey Scott Vitter   External memory algorithms and data
                                  structures: dealing with massive data    209--271

ACM Computing Surveys
Volume 33, Number 3, September, 2001

        Edgar Chávez and   
            Gonzalo Navarro and   
        Ricardo Baeza-Yates and   
José Luis Marroquín   Searching in metric spaces . . . . . . . 273--321
        Christian Böhm and   
           Stefan Berchtold and   
                 Daniel A. Keim   Searching in high-dimensional spaces:
                                  Index structures for improving the
                                  performance of multimedia databases  . . 322--373
             Evgeny Dantsin and   
               Thomas Eiter and   
              Georg Gottlob and   
                Andrei Voronkov   Complexity and expressive power of logic
                                  programming  . . . . . . . . . . . . . . 374--425

ACM Computing Surveys
Volume 33, Number 4, December, 2001

        Gregory V. Chockler and   
                Idit Keidar and   
                Roman Vitenberg   Group communication specifications: a
                                  comprehensive study  . . . . . . . . . . 427--469
            Melody Y. Ivory and   
                Marti A. Hearst   The state of the art in automating
                                  usability evaluation of user interfaces  470--516
           Pieter H. Hartel and   
                     Luc Moreau   Formalizing the safety of Java, the Java
                                  Virtual Machine, and Java card . . . . . 517--558


ACM Computing Surveys
Volume 34, Number 1, March, 2002

            Fabrizio Sebastiani   Machine learning in automated text
                                  categorization . . . . . . . . . . . . . 1--47
                 Weiyi Meng and   
                 Clement Yu and   
                   King-Lup Liu   Building efficient and effective
                                  metasearch engines . . . . . . . . . . . 48--89
              Michael F. McTear   Spoken dialogue technology: enabling the
                                  conversational user interface  . . . . . 90--169

ACM Computing Surveys
Volume 34, Number 2, June, 2002

          Katherine Compton and   
                    Scott Hauck   Reconfigurable computing: a survey of
                                  systems and software . . . . . . . . . . 171--210
              Sylvain Petitjean   A survey of methods for recovering
                                  quadrics in triangle meshes  . . . . . . 211--262
         Valeria Cardellini and   
       Emiliano Casalicchio and   
          Michele Colajanni and   
                   Philip S. Yu   The state of the art in locally
                                  distributed Web-server systems . . . . . 263--311

ACM Computing Surveys
Volume 34, Number 3, September, 2002

          Josep Díaz and   
                Jordi Petit and   
                    Maria Serna   A survey of graph layout problems  . . . 313--356
                   Hala Elaarag   Improving TCP performance over mobile
                                  networks . . . . . . . . . . . . . . . . 357--374
    E. N. (Mootaz) Elnozahy and   
             Lorenzo Alvisi and   
                Yi-Min Wang and   
               David B. Johnson   A survey of rollback-recovery protocols
                                  in message-passing systems . . . . . . . 375--408

ACM Computing Surveys
Volume 34, Number 4, December, 2002

              Yuri Leontiev and   
         M. Tamer Özsu and   
                  Duane Szafron   On type systems for object-oriented
                                  database programming languages . . . . . 409--449
                   G. Denys and   
                F. Piessens and   
                    F. Matthijs   A survey of customizability in operating
                                  systems research . . . . . . . . . . . . 450--468
            Devanshu Dhyani and   
               Wee Keong Ng and   
             Sourav S. Bhowmick   A survey of Web metrics  . . . . . . . . 469--503
                Jörg Rothe   Some facets of complexity theory and
                                  cryptography: a five-lecture tutorial    504--549
          Pankaj K. Agarwal and   
         Leonidas J. Guibas and   
       Herbert Edelsbrunner and   
              Jeff Erickson and   
              Michael Isard and   
           Sariel Har-Peled and   
           John Hershberger and   
           Christian Jensen and   
              Lydia Kavraki and   
              Patrice Koehl and   
                   Ming Lin and   
             Dinesh Manocha and   
           Dimitris Metaxas and   
              Brian Mirtich and   
                David Mount and   
           S. Muthukrishnan and   
                 Dinesh Pai and   
               Elisha Sacks and   
              Jack Snoeyink and   
               Subhash Suri and   
                  Ouri Wolefson   Algorithmic issues in modeling motion    550--572


ACM Computing Surveys
Volume 35, Number 1, March, 2003

              Jason Dedrick and   
            Vijay Gurbaxani and   
             Kenneth L. Kraemer   Information technology and economic
                                  performance: a critical review of the
                                  empirical evidence . . . . . . . . . . . 1--28
               Theo Ungerer and   
              Borut Robi\vc and   
                   Jurij \vSilc   A survey of processors with explicit
                                  multithreading . . . . . . . . . . . . . 29--63
           William R. Scott and   
               Gerhard Roth and   
    Jean-François Rivest   View planning for automated
                                  three-dimensional object reconstruction
                                  and inspection . . . . . . . . . . . . . 64--96

ACM Computing Surveys
Volume 35, Number 2, June, 2003

                    John Aycock   A brief history of just-in-time  . . . . 97--113
        Patrick Th. Eugster and   
           Pascal A. Felber and   
           Rachid Guerraoui and   
           Anne-Marie Kermarrec   The many faces of publish/subscribe  . . 114--131
        William N. Robinson and   
       Suzanne D. Pawlowski and   
               Vecheslav Volkov   Requirements interaction management  . . 132--190
              Sandeep Purao and   
                Vijay Vaishnavi   Product metrics for object-oriented
                                  systems  . . . . . . . . . . . . . . . . 191--221

ACM Computing Surveys
Volume 35, Number 3, September, 2003

Árpád Beszédes and   
              Rudolf Ferenc and   
      Tibor Gyimóthy and   
        André Dolenc and   
                Konsta Karsisto   Survey of code-size reduction methods    223--267
             Christian Blum and   
                    Andrea Roli   Metaheuristics in combinatorial
                                  optimization: Overview and conceptual
                                  comparison . . . . . . . . . . . . . . . 268--308
             Sandro Rafaeli and   
                David Hutchison   A survey of key management for secure
                                  group communication  . . . . . . . . . . 309--329

ACM Computing Surveys
Volume 35, Number 4, December, 2003

             Utz Westermann and   
                  Wolfgang Klas   An analysis of XML database solutions
                                  for the management of MPEG-7 media
                                  descriptions . . . . . . . . . . . . . . 331--373
           Stefan Podlipnig and   
   Laszlo Böszörmenyi   A survey of Web cache replacement
                                  strategies . . . . . . . . . . . . . . . 374--398
                    W. Zhao and   
               R. Chellappa and   
             P. J. Phillips and   
                   A. Rosenfeld   Face recognition: a literature survey    399--458


ACM Computing Surveys
Volume 36, Number 1, March, 2004

         Wesley M. Johnston and   
           J. R. Paul Hanna and   
              Richard J. Millar   Advances in dataflow programming
                                  languages  . . . . . . . . . . . . . . . 1--34
               M. L. Kherfi and   
                    D. Ziou and   
                    A. Bernardi   Image Retrieval from the World Wide Web:
                                  Issues, Techniques, and Systems  . . . . 35--67
         Mitchell A. Harris and   
             Edward M. Reingold   Line drawing, leap years, and Euclid . . 68--80

ACM Computing Surveys
Volume 36, Number 2, June, 2004

               Cemil Kirbas and   
                   Francis Quek   A review of vessel extraction techniques
                                  and algorithms . . . . . . . . . . . . . 81--121
                  Jacques Cohen   Bioinformatics --- an introduction for
                                  computer scientists  . . . . . . . . . . 122--158
                    Hanan Samet   Object-based and image-based object
                                  representations  . . . . . . . . . . . . 159--217

ACM Computing Surveys
Volume 36, Number 3, September, 2004

             Stefan Pleisch and   
           André Schiper   Approaches to fault-tolerant and
                                  transactional mobile agent
                                  execution---an algorithmic view  . . . . 219--262
               Anna Formica and   
              Michele Missikoff   Inheritance processing and conflicts in
                                  structural generalization hierarchies    263--290
Swaminathan Sivasubramanian and   
           Michal Szymaniak and   
           Guillaume Pierre and   
              Maarten van Steen   Replication for Web hosting systems  . . 291--334

ACM Computing Surveys
Volume 36, Number 4, December, 2004

Stephanos Androutsellis-Theotokis and   
             Diomidis Spinellis   A survey of peer-to-peer content
                                  distribution technologies  . . . . . . . 335--371
       Xavier Défago and   
       André Schiper and   
      Péter Urbán   Total order broadcast and multicast
                                  algorithms: Taxonomy and survey  . . . . 372--421
          Reuven Bar-Yehuda and   
               Keren Bendel and   
                 Ari Freund and   
                    Dror Rawitz   Local ratio: a unified framework for
                                  approximation algorithms. In Memoriam:
                                  Shimon Even 1935--2004 . . . . . . . . . 422--463


ACM Computing Surveys
Volume 37, Number 1, March, 2005

              Rajendra Bose and   
                     James Frew   Lineage retrieval for scientific data
                                  processing: a survey . . . . . . . . . . 1--28
             William Tolone and   
              Gail-Joon Ahn and   
               Tanusree Pai and   
                 Seng-Phil Hong   Access control in collaborative systems  29--41
              Yasushi Saito and   
                   Marc Shapiro   Optimistic replication . . . . . . . . . 42--81

ACM Computing Surveys
Volume 37, Number 2, June, 2005

           Caitlin Kelleher and   
                   Randy Pausch   Lowering the barriers to programming: a
                                  taxonomy of programming environments and
                                  languages for novice programmers . . . . 83--137
                   Eran Gal and   
                   Sivan Toledo   Algorithms and data structures for flash
                                  memories . . . . . . . . . . . . . . . . 138--163
                    Paolo Santi   Topology control in wireless ad hoc and
                                  sensor networks  . . . . . . . . . . . . 164--194

ACM Computing Surveys
Volume 37, Number 3, September, 2005

      Vasanth Venkatachalam and   
                  Michael Franz   Power reduction techniques for
                                  microprocessor systems . . . . . . . . . 195--237
                David E. Taylor   Survey and taxonomy of packet
                                  classification techniques  . . . . . . . 238--275

ACM Computing Surveys
Volume 37, Number 4, December, 2005

           Marco Eichelberg and   
                Thomas Aden and   
        Jörg Riesmeier and   
               Asuman Dogac and   
                Gokce B. Laleci   A survey and analysis of Electronic
                                  Healthcare Record standards  . . . . . . 277--315
              Marjan Mernik and   
                Jan Heering and   
              Anthony M. Sloane   When and how to develop domain-specific
                                  languages  . . . . . . . . . . . . . . . 316--344
            Benjamin Bustos and   
             Daniel A. Keim and   
              Dietmar Saupe and   
             Tobias Schreck and   
              Dejan V. Vrani\'c   Feature-based similarity search in $3$D
                                  object databases . . . . . . . . . . . . 345--387


ACM Computing Surveys
Volume 38, Number 1, March, 2006

         Tobias Bjerregaard and   
              Shankar Mahadevan   A survey of research and practices of
                                  Network-on-Chip  . . . . . . . . . . . . 1:1--1:51
       Deepayan Chakrabarti and   
             Christos Faloutsos   Graph mining: Laws, generators, and
                                  algorithms . . . . . . . . . . . . . . . 2:1--2:69
         Srikumar Venugopal and   
             Rajkumar Buyya and   
         Kotagiri Ramamohanarao   A taxonomy of Data Grids for distributed
                                  data sharing, management, and processing 3:1--3:53

ACM Computing Surveys
Volume 38, Number 2, March, 2006

                Jordi Turmo and   
               Alicia Ageno and   
                  Neus Catal\`a   Adaptive information extraction  . . . . 4:1--4:47
               Aaron Ceglar and   
                John F. Roddick   Association mining . . . . . . . . . . . 5:1--5:42
               Justin Zobel and   
                Alistair Moffat   Inverted files for text search engines   6:1--6:56

ACM Computing Surveys
Volume 38, Number 3, September, 2006

                    Jing Ma and   
           Jeffrey V. Nickerson   Hands-on, simulated, and remote
                                  laboratories: a comparative literature
                                  review . . . . . . . . . . . . . . . . . 7:1--7:24
               Alice Miller and   
         Alastair Donaldson and   
                   Muffy Calder   Symmetry in temporal logic model
                                  checking . . . . . . . . . . . . . . . . 8:1--8:36
               Liqiang Geng and   
             Howard J. Hamilton   Interestingness measures for data
                                  mining: a survey . . . . . . . . . . . . 9:1--9:32
                   Goetz Graefe   Implementing sorting in database systems 10:1--10:37

ACM Computing Surveys
Volume 38, Number 4, December, 2006

               Richard A. Frost   Realization of natural language
                                  interfaces using lazy functional
                                  programming  . . . . . . . . . . . . . . 11:1--11:54
             Lucas Bordeaux and   
             Youssef Hamadi and   
                   Lintao Zhang   Propositional Satisfiability and
                                  Constraint Programming: a comparative
                                  survey . . . . . . . . . . . . . . . . . 12:1--12:54
               Alper Yilmaz and   
                 Omar Javed and   
                   Mubarak Shah   Object tracking: a survey  . . . . . . . 13:1--13:45


ACM Computing Surveys
Volume 39, Number 1, April, 2007

       Johann Van Der Merwe and   
              Dawoud Dawoud and   
               Stephen McDonald   A survey on peer-to-peer key management
                                  for mobile ad hoc networks . . . . . . . 1:1--1:45
            Gonzalo Navarro and   
              Veli Mäkinen   Compressed full-text indexes . . . . . . 2:1--2:61
                   Tao Peng and   
         Christopher Leckie and   
         Kotagiri Ramamohanarao   Survey of network-based defense
                                  mechanisms countering the DoS and DDoS
                                  problems . . . . . . . . . . . . . . . . 3:1--3:42

ACM Computing Surveys
Volume 39, Number 2, July, 2007

           Simon J. Puglisi and   
                W. F. Smyth and   
               Andrew H. Turpin   A taxonomy of suffix array construction
                                  algorithms . . . . . . . . . . . . . . . 4:1--4:31
                 Dong Zheng and   
                    Yan Liu and   
                Jiying Zhao and   
         Abdulmotaleb El Saddik   A survey of RST invariant image
                                  watermarking algorithms  . . . . . . . . 5:1--5:91
               Dagmar Bruss and   
Gábor Erdélyi and   
                  Tim Meyer and   
               Tobias Riege and   
                Jörg Rothe   Quantum cryptography: a survey . . . . . 6:1--6:27

ACM Computing Surveys
Volume 39, Number 3, September, 2007

            Suleyman Uludag and   
              King-Shan Lui and   
            Klara Nahrstedt and   
               Gregory Brewster   Analysis of Topology Aggregation
                                  techniques for QoS routing . . . . . . . 7:1--7:31
                Mark Truran and   
             James Goulding and   
                   Helen Ashman   Autonomous authoring tools for hypertext 8:1--8:30
        Eduardo F. Nakamura and   
     Antonio A. F. Loureiro and   
             Alejandro C. Frery   Information fusion for wireless sensor
                                  networks: Methods, models, and
                                  classifications  . . . . . . . . . . . . 9:1--9:55

ACM Computing Surveys
Volume 39, Number 4, November, 2007

            Akrivi Katifori and   
        Constantin Halatsis and   
            George Lepouras and   
          Costas Vassilakis and   
           Eugenia Giannopoulou   Ontology visualization methods --- a
                                  survey . . . . . . . . . . . . . . . . . 10:1--10:43
            David B. Thomas and   
                  Wayne Luk and   
         Philip H. W. Leong and   
             John D. Villasenor   Gaussian random number generators  . . . 11:1--11:38
     Konstantinos Morfonios and   
            Stratis Konakas and   
           Yannis Ioannidis and   
                Nikolaos Kotsis   ROLAP implementations of the data cube   12:1--12:53


ACM Computing Surveys
Volume 40, Number 1, February, 2008

               Renzo Angles and   
              Claudio Gutierrez   Survey of graph database models  . . . . 1:1--1:39
             Ricardo Fabbri and   
        Luciano Da F. Costa and   
           Julio C. Torelli and   
                Odemir M. Bruno   $2$D Euclidean distance transform
                                  algorithms: a comparative survey . . . . 2:1--2:44
               Raman Ramsin and   
               Richard F. Paige   Process-centered review of object
                                  oriented software development
                                  methodologies  . . . . . . . . . . . . . 3:1--3:89

ACM Computing Surveys
Volume 40, Number 2, April, 2008

                Iwan Vosloo and   
              Derrick G. Kourie   Server-centric Web frameworks: an
                                  overview . . . . . . . . . . . . . . . . 4:1--4:33
             Ritendra Datta and   
               Dhiraj Joshi and   
                     Jia Li and   
                  James Z. Wang   Image retrieval: Ideas, influences, and
                                  trends of the new age  . . . . . . . . . 5:1--5:60
         Vincenzo De Florio and   
                  Chris Blondia   A survey of linguistic structures for
                                  application-level fault tolerance  . . . 6:1--6:37

ACM Computing Surveys
Volume 40, Number 3, August, 2008

        Markus C. Huebscher and   
                Julie A. McCann   A survey of autonomic computing ---
                                  degrees, models, and applications  . . . 7:1--7:28
                     Adam Lopez   Statistical machine translation  . . . . 8:1--8:49
            Peter C. Chapin and   
           Christian Skalka and   
                   X. Sean Wang   Authorization in trust management:
                                  Features and foundations . . . . . . . . 9:1--9:48
            Stefan Miltchev and   
          Jonathan M. Smith and   
        Vassilis Prevelakis and   
          Angelos Keromytis and   
              Sotiris Ioannidis   Decentralized access control in
                                  distributed file systems . . . . . . . . 10:1--10:30

ACM Computing Surveys
Volume 40, Number 4, October, 2008

              Ihab F. Ilyas and   
            George Beskales and   
             Mohamed A. Soliman   A survey of top-$k$ query processing
                                  techniques in relational database
                                  systems  . . . . . . . . . . . . . . . . 11:1--11:58
                S. Biasotti and   
             L. De Floriani and   
              B. Falcidieno and   
                 P. Frosini and   
                  D. Giorgi and   
                   C. Landi and   
                 L. Papaleo and   
                   M. Spagnuolo   Describing shapes by
                                  geometrical-topological properties of
                                  real functions . . . . . . . . . . . . . 12:1--12:87


ACM Computing Surveys
Volume 41, Number 1, December, 2008

            Jens Bleiholder and   
                  Felix Naumann   Data fusion  . . . . . . . . . . . . . . 1:1--1:41
              Andy Cockburn and   
                Amy Karlson and   
           Benjamin B. Bederson   A review of overview+detail, zooming,
                                  and focus+context interfaces . . . . . . 2:1--2:31
           Michael Benedikt and   
                 Christoph Koch   XPath leashed  . . . . . . . . . . . . . 3:1--3:54
           Richard B. Borie and   
             R. Gary Parker and   
                 Craig A. Tovey   Solving problems on recursively
                                  constructed graphs . . . . . . . . . . . 4:1--4:51
             Jose A. Onieva and   
              Jianying Zhou and   
                   Javier Lopez   Multiparty nonrepudiation: a survey  . . 5:1--5:43
            Kate A. Smith-Miles   Cross-disciplinary perspectives on
                                  meta-learning for algorithm selection    6:1--6:25
             Besma R. Abidi and   
             Nash R. Aragam and   
                     Yi Yao and   
                 Mongi A. Abidi   Survey and analysis of multimodal sensor
                                  planning and integration for wide area
                                  surveillance . . . . . . . . . . . . . . 7:1--7:36

ACM Computing Surveys
Volume 41, Number 2, February, 2009

                   Nathan Brown   Chemoinformatics --- an introduction for
                                  computer scientists  . . . . . . . . . . 8:1--8:38
          Robert M. Hierons and   
            Kirill Bogdanov and   
          Jonathan P. Bowen and   
           Rance Cleaveland and   
               John Derrick and   
                Jeremy Dick and   
            Marian Gheorghe and   
                Mark Harman and   
             Kalpesh Kapoor and   
                Paul Krause and   
        Gerald Lüttgen and   
       Anthony J. H. Simons and   
            Sergiy Vilkomir and   
         Martin R. Woodward and   
                  Hussein Zedan   Using formal specifications to support
                                  testing  . . . . . . . . . . . . . . . . 9:1--9:76
                Roberto Navigli   Word sense disambiguation: a survey  . . 10:1--10:69
            Alicia Iriberri and   
                    Gondy Leroy   A life-cycle perspective on online
                                  community success  . . . . . . . . . . . 11:1--11:29
               Xiaoguang Qi and   
               Brian D. Davison   Web page classification: Features and
                                  algorithms . . . . . . . . . . . . . . . 12:1--12:31
             Carlo A. Furia and   
            Matteo Pradella and   
                   Matteo Rossi   Comments on temporal logics for
                                  real-time system specification . . . . . 13:1--13:5

ACM Computing Surveys
Volume 41, Number 3, July, 2009

             Gary H. Sockut and   
            Balakrishna R. Iyer   Online reorganization of databases . . . 14:1--14:136
             Varun Chandola and   
           Arindam Banerjee and   
                    Vipin Kumar   Anomaly detection: a survey  . . . . . . 15:1--15:58
               Carlo Batini and   
           Cinzia Cappiello and   
         Chiara Francalanci and   
                 Andrea Maurino   Methodologies for data quality
                                  assessment and improvement . . . . . . . 16:1--16:52
          Claudio Carpineto and   
        Stanislaw Osi\'nski and   
            Giovanni Romano and   
                    Dawid Weiss   A survey of Web clustering engines . . . 17:1--17:38

ACM Computing Surveys
Volume 41, Number 4, October, 2009

             C. A. R. Hoare and   
                  Jayadev Misra   Preface to special issue on software
                                  verification . . . . . . . . . . . . . . 18:1--18:3
               Jim Woodcock and   
          Peter Gorm Larsen and   
            Juan Bicarregui and   
                John Fitzgerald   Formal methods: Practice and experience  19:1--19:36
              Natarajan Shankar   Automated deduction for verification . . 20:1--20:56
               Ranjit Jhala and   
                 Rupak Majumdar   Software model checking  . . . . . . . . 21:1--21:54
             C. A. R. Hoare and   
              Jayadev Misra and   
            Gary T. Leavens and   
              Natarajan Shankar   The verified software initiative: a
                                  manifesto  . . . . . . . . . . . . . . . 22:1--22:8


ACM Computing Surveys
Volume 42, Number 1, December, 2009

              Kevin Hoffman and   
                 David Zage and   
           Cristina Nita-Rotaru   A survey of attack and defense
                                  techniques for reputation systems  . . . 1:1--1:31
                     Hubie Chen   A rendezvous of logic, complexity, and
                                  algebra  . . . . . . . . . . . . . . . . 2:1--2:32
               Alexis Kirke and   
           Eduardo Reck Miranda   A survey of computer systems for
                                  expressive music performance . . . . . . 3:1--3:41
              James A. Muir and   
           Paul C. Van Oorschot   Internet geolocation: Evasion and
                                  counterevasion . . . . . . . . . . . . . 4:1--4:23
              Matthew Edman and   
              Bülent Yener   On anonymity in an electronic society: a
                                  survey of anonymous communication
                                  systems  . . . . . . . . . . . . . . . . 5:1--5:35

ACM Computing Surveys
Volume 42, Number 2, February, 2010

             Carlo A. Furia and   
             Dino Mandrioli and   
            Angelo Morzenti and   
                   Matteo Rossi   Modeling time in computing: a taxonomy
                                  and a comparative survey . . . . . . . . 6:1--6:59
         Bernhard Haslhofer and   
                  Wolfgang Klas   A survey of techniques for achieving
                                  metadata interoperability  . . . . . . . 7:1--7:37
                  Zhiwen Yu and   
                Yuichi Nakamura   Smart meeting systems: a survey of
                                  state-of-the-art and open issues . . . . 8:1--8:20
               Jaume Abella and   
                    Xavier Vera   Electromigration for microarchitects . . 9:1--9:18

ACM Computing Surveys
Volume 42, Number 3, March, 2010

              Felix Salfner and   
                 Maren Lenk and   
                 Miroslaw Malek   A survey of online failure prediction
                                  methods  . . . . . . . . . . . . . . . . 10:1--10:42
             Yildiray Kabak and   
                   Asuman Dogac   A survey and analysis of electronic
                                  business document standards  . . . . . . 11:1--11:31
              Sergio Ilarri and   
               Eduardo Mena and   
           Arantza Illarramendi   Location-dependent query processing:
                                  Where we are and where we are heading    12:1--12:73

ACM Computing Surveys
Volume 42, Number 4, June, 2010

  João M. P. Cardoso and   
             Pedro C. Diniz and   
               Markus Weinhardt   Compiling for reconfigurable computing:
                                  a survey . . . . . . . . . . . . . . . . 13:1--13:65
        Benjamin C. M. Fung and   
                    Ke Wang and   
                   Rui Chen and   
                   Philip S. Yu   Privacy-preserving data publishing: a
                                  survey of recent developments  . . . . . 14:1--14:53
                    Wen Gao and   
              Yonghong Tian and   
               Tiejun Huang and   
                     Qiang Yang   Vlogging: a survey of videoblogging
                                  technology on the Web  . . . . . . . . . 15:1--15:57


ACM Computing Surveys
Volume 43, Number 1, November, 2010

            Mario Cannataro and   
            Pietro H. Guzzi and   
              Pierangelo Veltri   Protein-to-protein interactions:
                                  Technologies, databases, and algorithms  1:1--1:36
          Sarah M. Diesburg and   
                 An-I Andy Wang   A survey of confidential data storage
                                  and deletion methods . . . . . . . . . . 2:1--2:37
         Nizar R. Mabroukeh and   
                   C. I. Ezeife   A taxonomy of sequential pattern mining
                                  algorithms . . . . . . . . . . . . . . . 3:1--3:41
                Hafedh Mili and   
               Guy Tremblay and   
          Guitta Bou Jaoude and   
       Éric Lefebvre and   
               Lamia Elabed and   
          Ghizlane El Boussaidi   Business process modeling languages:
                                  Sorting through the alphabet soup  . . . 4:1--4:56
                Jinu Kurian and   
                    Kamil Sarac   A survey on the design, applications,
                                  and enhancements of application-layer
                                  overlay networks . . . . . . . . . . . . 5:1--5:34

ACM Computing Surveys
Volume 43, Number 2, January, 2011

         Pimwadee Chaovalit and   
         Aryya Gangopadhyay and   
           George Karabatis and   
                   Zhiyuan Chen   Discrete wavelet transform-based time
                                  series analysis and mining . . . . . . . 6:1--6:37
       Aline Carneiro Viana and   
              Stephane Maag and   
                   Fatiha Zaidi   One step forward: Linking wireless
                                  self-organizing network validation
                                  techniques with formal testing
                                  approaches . . . . . . . . . . . . . . . 7:1--7:36
             Guido Urdaneta and   
           Guillaume Pierre and   
              Maarten Van Steen   A survey of DHT security techniques  . . 8:1--8:49
          Felix C. Freiling and   
           Rachid Guerraoui and   
                 Petr Kuznetsov   The failure detector abstraction . . . . 9:1--9:40
              Simon Parsons and   
  Juan A. Rodriguez-Aguilar and   
                     Mark Klein   Auctions and bidding: a guide for
                                  computer scientists  . . . . . . . . . . 10:1--10:59
               Changhai Nie and   
                  Hareton Leung   A survey of combinatorial testing  . . . 11:1--11:29
                    Wei Jie and   
              Junaid Arshad and   
            Richard Sinnott and   
               Paul Townend and   
                       Zhou Lei   A review of grid authentication and
                                  authorization technologies and support
                                  for federated access control . . . . . . 12:1--12:26

ACM Computing Surveys
Volume 43, Number 3, April, 2011

    Clémence Magnien and   
            Matthieu Latapy and   
            Jean-Loup Guillaume   Impact of random failures and attacks on
                                  Poisson and power-law random networks    13:1--13:31
            Patricia Beatty and   
                   Ian Reay and   
                 Scott Dick and   
                   James Miller   Consumer trust in e-commerce Web sites:
                                  a meta-study . . . . . . . . . . . . . . 14:1--14:46
            Kathleen Mcgill and   
                 Stephen Taylor   Robot algorithms for localization of
                                  multiple emission sources  . . . . . . . 15:1--15:25
             J. K. Aggarwal and   
                     M. S. Ryoo   Human activity analysis: a review  . . . 16:1--16:43
             Sarvnaz Karimi and   
               Falk Scholer and   
                  Andrew Turpin   Machine transliteration survey . . . . . 17:1--17:46
               Roland Ducournau   Implementing statically typed
                                  object-oriented programming languages    18:1--18:48
               Luca Mottola and   
              Gian Pietro Picco   Programming wireless sensor networks:
                                  Fundamental concepts and state of the
                                  art  . . . . . . . . . . . . . . . . . . 19:1--19:51
              Steffen Van Bakel   Strict intersection types for the Lambda
                                  Calculus . . . . . . . . . . . . . . . . 20:1--20:49
               Andrew J. Ko and   
              Robin Abraham and   
             Laura Beckwith and   
             Alan Blackwell and   
           Margaret Burnett and   
               Martin Erwig and   
             Chris Scaffidi and   
            Joseph Lawrance and   
            Henry Lieberman and   
                 Brad Myers and   
           Mary Beth Rosson and   
            Gregg Rothermel and   
                  Mary Shaw and   
               Susan Wiedenbeck   The state of the art in end-user
                                  software engineering . . . . . . . . . . 21:1--21:44
       Elias P. Duarte, Jr. and   
          Roverli P. Ziwich and   
              Luiz C. P. Albini   A survey of comparison-based
                                  system-level diagnosis . . . . . . . . . 22:1--22:56
                     Yuhui Deng   What is the future of disk drives, death
                                  or rebirth?  . . . . . . . . . . . . . . 23:1--23:27

ACM Computing Surveys
Volume 43, Number 4, October, 2011

              Laurie McLeod and   
           Stephen G. MacDonell   Factors that affect software systems
                                  development project outcomes: a survey
                                  of research  . . . . . . . . . . . . . . 24:1--24:56
          Alsayed Algergawy and   
               Marco Mesiti and   
                Richi Nayak and   
                   Gunter Saake   XML data clustering: an overview . . . . 25:1--25:41
             Anderson Rocha and   
            Walter Scheirer and   
             Terrance Boult and   
              Siome Goldenstein   Vision of the unseen: Current trends and
                                  challenges in digital image and video
                                  forensics  . . . . . . . . . . . . . . . 26:1--26:42
               Sergio Damas and   
        Oscar Cordón and   
 Oscar Ibáñez and   
     Jose Santamaría and   
   Inmaculada Alemán and   
             Miguel Botella and   
               Fernando Navarro   Forensic identification by
                                  computer-aided craniofacial
                                  superimposition: a survey  . . . . . . . 27:1--27:27
              Manuel Wimmer and   
        Andrea Schauerhuber and   
               Gerti Kappel and   
      Werner Retschitzegger and   
          Wieland Schwinger and   
            Elizabeth Kapsammer   A survey on UML-based aspect-oriented
                                  design modeling  . . . . . . . . . . . . 28:1--28:33
           Ferdous A. Sohel and   
           Gour C. Karmakar and   
         Laurence S. Dooley and   
             Mohammed Bennamoun   Geometric distortion measurement for
                                  shape coding: a contemporary review  . . 29:1--29:22
             Torsten Anders and   
             Eduardo R. Miranda   Constraint programming systems for
                                  modeling music theories and composition  30:1--30:38
          Matthew G. Parris and   
          Carthik A. Sharma and   
               Ronald F. Demara   Progress in autonomous fault recovery of
                                  field programmable gate arrays . . . . . 31:1--31:30
                      Bang Wang   Coverage problems in sensor networks: a
                                  survey . . . . . . . . . . . . . . . . . 32:1--32:53
             Davide Falessi and   
           Giovanni Cantone and   
                Rick Kazman and   
              Philippe Kruchten   Decision-making techniques for software
                                  architecture design: a comparative
                                  survey . . . . . . . . . . . . . . . . . 33:1--33:28
      Tomá\vs Skopal and   
                Benjamin Bustos   On nonmetric similarity search problems
                                  in complex domains . . . . . . . . . . . 34:1--34:50
            Robert I. Davis and   
                     Alan Burns   A survey of hard real-time scheduling
                                  for multiprocessor systems . . . . . . . 35:1--35:44
                   Fariba Sadri   Ambient intelligence: a survey . . . . . 36:1--36:66


ACM Computing Surveys
Volume 44, Number 1, January, 2012

          Claudio Carpineto and   
                Giovanni Romano   A Survey of Automatic Query Expansion in
                                  Information Retrieval  . . . . . . . . . 1:1--1:50
                David Zhang and   
               Wangmeng Zuo and   
                       Feng Yue   A Comparative Study of Palmprint
                                  Recognition Algorithms . . . . . . . . . 2:1--2:37
         Hanne Riis Nielson and   
           Flemming Nielson and   
               Henrik Pilegaard   Flow Logic for Process Calculi . . . . . 3:1--3:39
                Songbo Song and   
           Hassnaa Moustafa and   
                   Hossam Afifi   A Survey on Personalized TV and NGN
                                  Services through Context-Awareness . . . 4:1--4:18
       Robert Wójcik and   
              Andrzej Jajszczyk   Flow Oriented Approaches to QoS
                                  Assurance  . . . . . . . . . . . . . . . 5:1--5:37

ACM Computing Surveys
Volume 44, Number 2, February, 2012

               Manuel Egele and   
           Theodoor Scholte and   
                Engin Kirda and   
            Christopher Kruegel   A survey on automated dynamic
                                  malware-analysis techniques and tools    6:1--6:42
             Kevin Crowston and   
               Kangning Wei and   
              James Howison and   
                 Andrea Wiggins   Free\slash Libre open-source software
                                  development: What we know and what we do
                                  not know . . . . . . . . . . . . . . . . 7:1--7:35
              Pedro Antunes and   
          Valeria Herskovic and   
            Sergio F. Ochoa and   
                   Jose A. Pino   Structuring dimensions for collaborative
                                  systems evaluation . . . . . . . . . . . 8:1--8:28
             Godwin Caruana and   
                     Maozhen Li   A survey of emerging approaches to spam
                                  filtering  . . . . . . . . . . . . . . . 9:1--9:27

ACM Computing Surveys
Volume 44, Number 3, June, 2012

                  Jan Midtgaard   Control-flow analysis of functional
                                  programs . . . . . . . . . . . . . . . . 10:1--10:33
           Hossain Shahriar and   
            Mohammad Zulkernine   Mitigating program security
                                  vulnerabilities: Approaches and
                                  challenges . . . . . . . . . . . . . . . 11:1--11:46
                    Josep Silva   A vocabulary of program slicing-based
                                  techniques . . . . . . . . . . . . . . . 12:1--12:41
                Joonho Kong and   
             Sung Woo Chung and   
                  Kevin Skadron   Recent thermal management techniques for
                                  microprocessors  . . . . . . . . . . . . 13:1--13:42
           Syed M. S. Islam and   
         Mohammed Bennamoun and   
             Robyn A. Owens and   
                   Rowan Davies   A review of recent advances in $3$D ear-
                                  and expression-invariant face biometrics 14:1--14:34
           Gianpaolo Cugola and   
             Alessandro Margara   Processing flows of information: From
                                  data stream to complex event processing  15:1--15:62
              John Hatcliff and   
            Gary T. Leavens and   
         K. Rustan M. Leino and   
          Peter Müller and   
              Matthew Parkinson   Behavioral interface specification
                                  languages  . . . . . . . . . . . . . . . 16:1--16:58
                Yves Younan and   
              Wouter Joosen and   
                 Frank Piessens   Runtime countermeasures for code
                                  injection attacks against C and C++
                                  programs . . . . . . . . . . . . . . . . 17:1--17:28

ACM Computing Surveys
Volume 44, Number 4, August, 2012

             Lukasz Budzisz and   
               Johan Garcia and   
             Anna Brunstrom and   
            Ramon Ferrús   A taxonomy and survey of SCTP research   18:1--18:36
              Robert Biddle and   
             Sonia Chiasson and   
             P. C. Van Oorschot   Graphical passwords: Learning from the
                                  first twelve years . . . . . . . . . . . 19:1--19:41
                Wilson Wong and   
                    Wei Liu and   
             Mohammed Bennamoun   Ontology learning from text: a look back
                                  and into the future  . . . . . . . . . . 20:1--20:36
                 Huaiyu Liu and   
                 Mic Bowman and   
                  Francis Chang   Survey of state melding in virtual
                                  worlds . . . . . . . . . . . . . . . . . 21:1--21:25
                   Pedro Gonnet   A review of error estimation in adaptive
                                  quadrature . . . . . . . . . . . . . . . 22:1--22:36
              Cigdem Sengul and   
       Aline Carneiro Viana and   
                  Artur Ziviani   A survey of adaptive services to cope
                                  with dynamics in wireless
                                  self-organizing networks . . . . . . . . 23:1--23:35
           Paolo Bellavista and   
            Antonio Corradi and   
              Mario Fanelli and   
                  Luca Foschini   A survey of context data distribution
                                  for mobile ubiquitous systems  . . . . . 24:1--24:45
                  Meng Wang and   
                Bingbing Ni and   
             Xian-Sheng Hua and   
                  Tat-Seng Chua   Assistive tagging: a survey of
                                  multimedia tagging with human-computer
                                  joint exploration  . . . . . . . . . . . 25:1--25:24
             Luca Cittadini and   
       Giuseppe Di Battista and   
              Massimo Rimondini   On the stability of interdomain routing  26:1--26:40


ACM Computing Surveys
Volume 45, Number 1, November, 2012

                  Dong Zhou and   
                Mark Truran and   
             Tim Brailsford and   
               Vincent Wade and   
                   Helen Ashman   Translation techniques in cross-language
                                  information retrieval  . . . . . . . . . 1:1--1:44
            Simona Bernardi and   
      José Merseguer and   
               Dorina C. Petriu   Dependability modeling and analysis of
                                  software systems specified with UML  . . 2:1--2:48
          Sasikanth Avancha and   
                  Amit Baxi and   
                     David Kotz   Privacy in mobile technology for
                                  personal healthcare  . . . . . . . . . . 3:1--3:54
           Sergey Zhuravlev and   
           Juan Carlos Saez and   
          Sergey Blagodurov and   
         Alexandra Fedorova and   
                  Manuel Prieto   Survey of scheduling techniques for
                                  addressing shared resources in multicore
                                  processors . . . . . . . . . . . . . . . 4:1--4:28
           Anisa Al-Hafeedh and   
          Maxime Crochemore and   
                Lucian Ilie and   
          Evguenia Kopylova and   
                W. F. Smyth and   
            German Tischler and   
                  Munina Yusufu   A comparison of index-based Lempel--Ziv
                                  LZ77 factorization algorithms  . . . . . 5:1--5:17
                Boris Danev and   
             Davide Zanetti and   
                  Srdjan Capkun   On physical-layer identification of
                                  wireless devices . . . . . . . . . . . . 6:1--6:29
                Yi Zhi Zhao and   
               Chunyan Miao and   
                   Maode Ma and   
            Jing Bing Zhang and   
                    Cyril Leung   A survey and projection on medium access
                                  control protocols for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 7:1--7:37
              Glenn I. Hawe and   
              Graham Coates and   
           Duncan T. Wilson and   
                Roger S. Crouch   Agent-based simulation for large-scale
                                  emergency response: a survey of usage
                                  and implementation . . . . . . . . . . . 8:1--8:51
             R. Annie Uthra and   
              S. V. Kasmir Raja   QoS routing in wireless sensor
                                  networks-a survey  . . . . . . . . . . . 9:1--9:12
 João Mendes-Moreira and   
              Carlos Soares and   
Alípio Mário Jorge and   
          Jorge Freire De Sousa   Ensemble approaches for regression: a
                                  survey . . . . . . . . . . . . . . . . . 10:1--10:40
                Mark Harman and   
         S. Afshin Mansouri and   
                 Yuanyuan Zhang   Search-based software engineering:
                                  Trends, techniques and applications  . . 11:1--11:61
            Philippe Esling and   
                    Carlos Agon   Time-series data mining  . . . . . . . . 12:1--12:34

ACM Computing Surveys
Volume 45, Number 2, February, 2013

                Simone Faro and   
                 Thierry Lecroq   The exact online string matching
                                  problem: a review of the most recent
                                  results  . . . . . . . . . . . . . . . . 13:1--13:42
        Angeliki Kritikakou and   
           Francky Catthoor and   
        Vasilios Kelefouras and   
                  Costas Goutis   A systematic approach to classify
                                  design-time global scheduling techniques 14:1--14:30
               Marco Attene and   
              Marcel Campen and   
                   Leif Kobbelt   Polygon mesh repairing: an application
                                  perspective  . . . . . . . . . . . . . . 15:1--15:33
                Susan Lomax and   
                   Sunil Vadera   A survey of cost-sensitive decision tree
                                  induction algorithms . . . . . . . . . . 16:1--16:35
             Michael Pearce and   
           Sherali Zeadally and   
                       Ray Hunt   Virtualization: Issues, security
                                  threats, and solutions . . . . . . . . . 17:1--17:39
Maria Elena Acevedo-Mosqueda and   
Cornelio Yáñez-Márquez and   
 Marco Antonio Acevedo-Mosqueda   Bidirectional Associative Memories:
                                  Different approaches . . . . . . . . . . 18:1--18:30
             Carl H. Mooney and   
                John F. Roddick   Sequential pattern mining --- approaches
                                  and algorithms . . . . . . . . . . . . . 19:1--19:39
               Timo Koskela and   
              Otso Kassinen and   
              Erkki Harjula and   
                Mika Ylianttila   P2P group management systems: a
                                  conceptual analysis  . . . . . . . . . . 20:1--20:25
               Mehdi Saeedi and   
                 Igor L. Markov   Synthesis and optimization of reversible
                                  circuits --- a survey  . . . . . . . . . 21:1--21:34
                Ayman Abaza and   
                  Arun Ross and   
           Christina Hebert and   
       Mary Ann F. Harrison and   
                  Mark S. Nixon   A survey on ear biometrics . . . . . . . 22:1--22:35
     Mohammad Tanvir Parvez and   
               Sabri A. Mahmoud   Offline Arabic handwritten text
                                  recognition: a survey  . . . . . . . . . 23:1--23:35
                  Jukka Suomela   Survey of local algorithms . . . . . . . 24:1--24:40

ACM Computing Surveys
Volume 45, Number 3, June, 2013

  Mohammad Hossein Manshaei and   
                Quanyan Zhu and   
               Tansu Alpcan and   
               Tamer Bacsar and   
             Jean-Pierre Hubaux   Game theory meets network security and
                                  privacy  . . . . . . . . . . . . . . . . 25:1--25:39
              James Stanier and   
                     Des Watson   Intermediate representations in
                                  imperative compilers: a survey . . . . . 26:1--26:27
Seyed Amir Hoseini-Tabatabaei and   
           Alexander Gluhak and   
                Rahim Tafazolli   A survey on smartphone-based systems for
                                  opportunistic user context recognition   27:1--27:51
          Christian Colombo and   
                 Gordon J. Pace   Recovery within long-running
                                  transactions . . . . . . . . . . . . . . 28:1--28:35
            Omer Zilberberg and   
               Shlomo Weiss and   
                   Sivan Toledo   Phase-change memory: an architectural
                                  perspective  . . . . . . . . . . . . . . 29:1--29:33
       João V. Gomes and   
  Pedro R. M. Inácio and   
            Manuela Pereira and   
     Mário M. Freire and   
              Paulo P. Monteiro   Detection and classification of
                                  peer-to-peer traffic: a survey . . . . . 30:1--30:40
             Floarea Serban and   
         Joaquin Vanschoren and   
        Jörg-Uwe Kietz and   
              Abraham Bernstein   A survey of intelligent assistants for
                                  data analysis  . . . . . . . . . . . . . 31:1--31:35
                   Wei Zang and   
                Ann Gordon-Ross   A survey on cache tuning from a
                                  power/energy perspective . . . . . . . . 32:1--32:49
                Tom Bostoen and   
             Sape Mullender and   
                Yolande Berbers   Power-reduction techniques for
                                  data-center storage systems  . . . . . . 33:1--33:38
     John David N. Dionisio and   
       William G. Burns III and   
                Richard Gilbert   $3$D Virtual worlds and the metaverse:
                                  Current status and future possibilities  34:1--34:38
            Matej Crepinsek and   
               Shih-Hsi Liu and   
                  Marjan Mernik   Exploration and exploitation in
                                  evolutionary algorithms: a survey  . . . 35:1--35:33
Leandro Silva Galvão De Carvalho and   
           Edjair De Souza Mota   Survey on application-layer mechanisms
                                  for speech quality adaptation in VoIP    36:1--36:31
             Xavier Grehant and   
           Isabelle Demeure and   
                    Sverre Jarp   A survey of task mapping on production
                                  grids  . . . . . . . . . . . . . . . . . 37:1--37:25
       Abbas Eslami Kiasari and   
               Axel Jantsch and   
                    Zhonghai Lu   Mathematical formalisms for performance
                                  evaluation of networks-on-chip . . . . . 38:1--38:41
              Andrew Newell and   
                  Jing Dong and   
           Cristina Nita-Rotaru   On the practicality of cryptographic
                                  defences against pollution attacks in
                                  wireless network coding  . . . . . . . . 39:1--39:26
    Gábor Pék and   
           Levente Butty'an and   
Boldizsár Bencsáth   A survey of security issues in hardware
                                  virtualization . . . . . . . . . . . . . 40:1--40:34

ACM Computing Surveys
Volume 45, Number 4, August, 2013

             Lilian Bossuet and   
              Michael Grand and   
               Lubos Gaspar and   
             Viktor Fischer and   
                    Guy Gogniat   Architectures of flexible symmetric key
                                  crypto engines --- a survey: From
                                  hardware coprocessor to
                                  multi-crypto-processor system on chip    41:1--41:32
           Christine Parent and   
       Stefano Spaccapietra and   
               Chiara Renso and   
          Gennady Andrienko and   
          Natalia Andrienko and   
              Vania Bogorny and   
        Maria Luisa Damiani and   
     Aris Gkoulalas-Divanis and   
                Jose Macedo and   
              Nikos Pelekis and   
         Yannis Theodoridis and   
                    Zhixian Yan   Semantic trajectories modeling and
                                  analysis . . . . . . . . . . . . . . . . 42:1--42:32
                 Jierui Xie and   
             Stephen Kelley and   
          Boleslaw K. Szymanski   Overlapping community detection in
                                  networks: The state-of-the-art and
                                  comparative study  . . . . . . . . . . . 43:1--43:35
                 Jiajun Liu and   
                   Zi Huang and   
                Hongyun Cai and   
              Heng Tao Shen and   
              Chong Wah Ngo and   
                       Wei Wang   Near-duplicate video retrieval: Current
                                  research and future trends . . . . . . . 44:1--44:23
Rafael A. Rodríguez-Gómez and   
Gabriel Maciá-Fernández and   
    Pedro García-Teodoro   Survey and taxonomy of botnet research
                                  through life-cycle . . . . . . . . . . . 45:1--45:33
               Anirban Basu and   
              Simon Fleming and   
              James Stanier and   
            Stephen Naicken and   
                Ian Wakeman and   
               Vijay K. Gurbani   The state of peer-to-peer network
                                  simulators . . . . . . . . . . . . . . . 46:1--46:25
            Wanita Sherchan and   
                Surya Nepal and   
                   Cecile Paris   A survey of trust in social networks . . 47:1--47:33
       Rajshekar Kalayappan and   
              Smruti R. Sarangi   A survey of checker architectures  . . . 48:1--48:34
                 Jian Chang and   
Krishna K. Venkatasubramanian and   
             Andrew G. West and   
                      Insup Lee   Analyzing and defending against
                                  Web-based malware  . . . . . . . . . . . 49:1--49:35
                Anne Benoit and   
Ümit V. Çatalyürek and   
                Yves Robert and   
                     Erik Saule   A survey of pipelined workflow
                                  scheduling: Models and algorithms  . . . 50:1--50:36
              Arnaud Hubaux and   
             Thein Than Tun and   
                Patrick Heymans   Separation of concerns in feature
                                  diagram languages: a systematic survey   51:1--51:23
      Engineer Bainomugisha and   
    Andoni Lombide Carreton and   
             Tom van Cutsem and   
            Stijn Mostinckx and   
             Wolfgang de Meuter   A survey on reactive programming . . . . 52:1--52:34
      Kelly Androutsopoulos and   
                David Clark and   
                Mark Harman and   
                Jens Krinke and   
                 Laurence Tratt   State-based model slicing: a survey  . . 53:1--53:36
              Daniel Lazaro and   
        Joan Manuel Marques and   
                Josep Jorba and   
              Xavier Vilajosana   Decentralized resource discovery
                                  mechanisms for distributed computing in
                                  peer-to-peer environments  . . . . . . . 54:1--54:54
                 Levi Shaul and   
                   Doron Tauber   Critical success factors in enterprise
                                  resource planning systems: Review of the
                                  last decade  . . . . . . . . . . . . . . 55:1--55:39


ACM Computing Surveys
Volume 46, Number 1, October, 2013

          Kyriakos Kritikos and   
            Barbara Pernici and   
          Pierluigi Plebani and   
           Cinzia Cappiello and   
              Marco Comuzzi and   
           Salima Benrernou and   
              Ivona Brandic and   
      Attila Kertész and   
             Michael Parkin and   
                   Manuel Carro   A survey on service quality description  1:1--1:??
             Sibel Yenikaya and   
       Gökhan Yenikaya and   
               Ekrem Düven   Keeping the vehicle on the road: a
                                  survey on on-road lane detection systems 2:1--2:??
         Damian A. Tamburri and   
              Patricia Lago and   
                 Hans van Vliet   Organizational social structures for
                                  software engineering . . . . . . . . . . 3:1--3:??
            Kevin A. Roundy and   
               Barton P. Miller   Binary-code obfuscations in prevalent
                                  packer tools . . . . . . . . . . . . . . 4:1--4:??
            Rocco de Nicola and   
              Diego Latella and   
             Michele Loreti and   
                  Mieke Massink   A uniform definition of stochastic
                                  process calculi  . . . . . . . . . . . . 5:1--5:??
            Flavio Esposito and   
              Ibrahim Matta and   
                Vatche Ishakian   Slice embedding solutions for
                                  distributed service architectures  . . . 6:1--6:??
       Aluizio F. R. Araujo and   
           Renata L. M. E. Rego   Self-organizing maps with a time-varying
                                  structure  . . . . . . . . . . . . . . . 7:1--7:??
            Martin Radetzki and   
              Chaochao Feng and   
               Xueqian Zhao and   
                   Axel Jantsch   Methods for fault tolerance in
                                  networks-on-chip . . . . . . . . . . . . 8:1--8:??
               Amir Yahyavi and   
                  Bettina Kemme   Peer-to-peer architectures for massively
                                  multiplayer online games: a survey . . . 9:1--9:??
                  Xin Zhang and   
              Yee-Hong Yang and   
               Zhiguang Han and   
                   Hui Wang and   
                       Chao Gao   Object class detection: a survey . . . . 10:1--10:??
                Sherif Sakr and   
                   Anna Liu and   
               Ayman G. Fayoumi   The family of MapReduce and large-scale
                                  data processing systems  . . . . . . . . 11:1--11:??
              Talal H. Noor and   
              Quan Z. Sheng and   
           Sherali Zeadally and   
                        Jian Yu   Trust management of services in cloud
                                  environments: obstacles and solutions    12:1--12:??
          Jonathan A. Silva and   
            Elaine R. Faria and   
          Rodrigo C. Barros and   
        Eduardo R. Hruschka and   
André C. P. L. F. de Carvalho and   
               João Gama   Data stream clustering: a survey . . . . 13:1--13:??
Kanthaiah Sivapragasam Vijayalayan and   
              Aaron Harwood and   
           Shanika Karunasekera   Distributed scheduling schemes for
                                  wireless mesh networks: a survey . . . . 14:1--14:??

ACM Computing Surveys
Volume 46, Number 2, November, 2013

                 Soumya Sen and   
            Carlee Joe-Wong and   
                 Sangtae Ha and   
                    Mung Chiang   A survey of smart data pricing: Past
                                  proposals, current plans, and future
                                  trends . . . . . . . . . . . . . . . . . 15:1--15:??
       Anne-Marie Kermarrec and   
            Peter Triantafillou   XL peer-to-peer pub/sub systems  . . . . 16:1--16:??
        Pablo Samuel Castro and   
               Daqing Zhang and   
                  Chao Chen and   
                 Shijian Li and   
                       Gang Pan   From taxi GPS traces to social and
                                  community dynamics: a survey . . . . . . 17:1--17:??
                   Qiong Wu and   
                   Chunyan Miao   Curiosity: From psychology to
                                  computation  . . . . . . . . . . . . . . 18:1--18:??
Ádám Csapó and   
    György Wersényi   Overview of auditory representations in
                                  human-machine interfaces . . . . . . . . 19:1--19:??
             Wojciech Mazurczyk   VoIP steganography and its detection ---
                                  a survey . . . . . . . . . . . . . . . . 20:1--20:??
                   Peter Gammie   Synchronous digital circuits as
                                  functional programs  . . . . . . . . . . 21:1--21:??
             Subir K. Ghosh and   
              Partha P. Goswami   Unsolved problems in visibility graphs
                                  of points, segments, and polygons  . . . 22:1--22:??
          Rebekka S. Renner and   
      Boris M. Velichkovsky and   
                Jens R. Helmert   The perception of egocentric distances
                                  in virtual environments --- a review . . 23:1--23:??
              Karim Barkati and   
                Pierre Jouvelot   Synchronous programming in audio
                                  processing: a lookup table oscillator
                                  case study . . . . . . . . . . . . . . . 24:1--24:??
                 Zheng Yang and   
                  Zimu Zhou and   
                     Yunhao Liu   From RSSI to CSI: Indoor localization
                                  via channel response . . . . . . . . . . 25:1--25:??
Ricardo Wandré Dias Pedro and   
  Fátima L. S. Nunes and   
            Ariane Machado-Lima   Using grammars for pattern recognition
                                  in images: a systematic review . . . . . 26:1--26:??
      Orlando R. E. Pereira and   
        Joel J. P. C. Rodrigues   Survey and analysis of current mobile
                                  learning applications and technologies   27:1--27:??
             Israel Herraiz and   
           Daniel Rodriguez and   
            Gregorio Robles and   
     Jesus M. Gonzalez-Barahona   The evolution of the laws of software
                                  evolution: a discussion based on a
                                  systematic literature review . . . . . . 28:1--28:??
            Roberto Vezzani and   
            Davide Baltieri and   
                 Rita Cucchiara   People reidentification in surveillance
                                  and forensics: a survey  . . . . . . . . 29:1--29:??

ACM Computing Surveys
Volume 46, Number 3, January, 2013

             Violeta Medina and   
      Juan Manuel García   A survey of migration mechanisms of
                                  virtual machines . . . . . . . . . . . . 30:1--30:??
                    Feng Li and   
              Beng Chin Ooi and   
         M. Tamer Özsu and   
                         Sai Wu   Distributed data management using
                                  MapReduce  . . . . . . . . . . . . . . . 31:1--31:??
            Andrea Bellucci and   
            Alessio Malizia and   
                   Ignacio Aedo   Light on horizontal interactive
                                  surfaces: Input space for tabletop
                                  computing  . . . . . . . . . . . . . . . 32:1--32:??
            Andreas Bulling and   
                 Ulf Blanke and   
                  Bernt Schiele   A tutorial on human activity recognition
                                  using body-worn inertial sensors . . . . 33:1--33:??
             Carlo A. Furia and   
             Bertrand Meyer and   
                  Sergey Velder   Loop invariants: Analysis,
                                  classification, and examples . . . . . . 34:1--34:??
                     Bin Li and   
               Steven C. H. Hoi   Online portfolio selection: a survey . . 35:1--35:??
                 Dongzhe Ma and   
               Jianhua Feng and   
                    Guoliang Li   A survey of address translation
                                  technologies for flash memories  . . . . 36:1--36:??
        Mardé Helbig and   
         Andries P. Engelbrecht   Benchmarks for dynamic multi-objective
                                  optimisation algorithms  . . . . . . . . 37:1--37:??
                    Tao Mei and   
                   Yong Rui and   
                 Shipeng Li and   
                        Qi Tian   Multimedia search reranking: a
                                  literature survey  . . . . . . . . . . . 38:1--38:??
              Peter Fontana and   
               Rance Cleaveland   A menagerie of timed automata  . . . . . 40:1--40:??
             Arlind Kopliku and   
      Karen Pinel-Sauvagnat and   
               Mohand Boughanem   Aggregated search: a new information
                                  retrieval paradigm . . . . . . . . . . . 41:1--41:??
     Marta R. Costa-Juss\`a and   
           Mireia Farrús   Statistical machine translation
                                  enhancements through linguistic levels:
                                  a survey . . . . . . . . . . . . . . . . 42:1--42:??

ACM Computing Surveys
Volume 46, Number 4, March, 2013

Natalia Díaz Rodríguez and   
       M. P. Cuéllar and   
               Johan Lilius and   
    Miguel Delgado Calvo-Flores   A survey on ontologies for human
                                  behavior recognition . . . . . . . . . . 43:1--43:??
              Martin Hirzel and   
        Robert Soulé and   
            Scott Schneider and   
                Bugra Gedik and   
                   Robert Grimm   A catalog of stream processing
                                  optimizations  . . . . . . . . . . . . . 46:1--46:??
        Anne-Cecile Orgerie and   
    Marcos Dias de Assuncao and   
                Laurent Lefevre   A survey on techniques for improving the
                                  energy efficiency of large-scale
                                  distributed systems  . . . . . . . . . . 47:1--47:??
                  C. M. Krishna   Fault-tolerant scheduling in homogeneous
                                  real-time systems  . . . . . . . . . . . 48:1--48:??
 Héctor Pérez and   
     J. Javier Gutiérrez   A survey on standards for real-time
                                  distribution middleware  . . . . . . . . 49:1--49:??
                Gonzalo Navarro   Spaces, Trees, and Colors: The
                                  algorithmic landscape of document
                                  retrieval on sequences . . . . . . . . . 52:1--52:??
             Michael Henson and   
                 Stephen Taylor   Memory encryption: a survey of existing
                                  techniques . . . . . . . . . . . . . . . 53:1--53:??
            Robert Mitchell and   
                   Ing-Ray Chen   A survey of intrusion detection
                                  techniques for cyber-physical systems    55:1--55:??


ACM Computing Surveys
Volume 47, Number 1, May, 2014

              Yao-Yi Chiang and   
                Stefan Leyk and   
              Craig A. Knoblock   A Survey of Digital Map Processing
                                  Techniques . . . . . . . . . . . . . . . 1:1--1:??
             Thomas Winkler and   
                Bernhard Rinner   Security and Privacy Protection in
                                  Visual Sensor Networks: a Survey . . . . 2:1--2:??
                    Yue Shi and   
              Martha Larson and   
                  Alan Hanjalic   Collaborative Filtering beyond the
                                  User-Item Matrix: a Survey of the State
                                  of the Art and Future Challenges . . . . 3:1--3:??
           Catherine Howard and   
               Markus Stumptner   A Survey of Directed
                                  Entity-Relation--Based First-Order
                                  Probabilistic Languages  . . . . . . . . 4:1--4:??
        Adel Nadjaran Toosi and   
       Rodrigo N. Calheiros and   
                 Rajkumar Buyya   Interconnected Cloud Computing
                                  Environments: Challenges, Taxonomy, and
                                  Survey . . . . . . . . . . . . . . . . . 7:1--7:??
              Ming Ki Chong and   
             Rene Mayrhofer and   
                 Hans Gellersen   A Survey of User Interaction for
                                  Spontaneous Device Association . . . . . 8:1--8:??
            Pierre A. Akiki and   
          Arosha K. Bandara and   
                       Yijun Yu   Adaptive Model-Driven User Interface
                                  Development Systems  . . . . . . . . . . 9:1--9:??
             Charu Aggarwal and   
                Karthik Subbian   Evolutionary Network Analysis: a Survey  10:1--10:??
          João Paulo and   
            José Pereira   A Survey and Classification of Storage
                                  Deduplication Systems  . . . . . . . . . 11:1--11:??
                 You-Chiun Wang   Mobile Sensor Networks: System Hardware
                                  and Dispatch Software  . . . . . . . . . 12:1--12:??
        Alessandra De Paola and   
             Marco Ortolani and   
             Giuseppe Lo Re and   
          Giuseppe Anastasi and   
                   Sajal K. Das   Intelligent Management Systems for
                                  Energy Efficiency in Buildings: a Survey 13:1--13:??
               Joanne Treurniet   A Taxonomy and Survey of Microscopic
                                  Mobility Models from the Mobile
                                  Networking Domain  . . . . . . . . . . . 14:1--14:??

ACM Computing Surveys
Volume 47, Number 2, November, 2014

             Ricardo Campos and   
             Gaël Dias and   
     Alípio M. Jorge and   
                    Adam Jatowt   Survey of Temporal Information Retrieval
                                  and Related Applications . . . . . . . . 15:1--15:??
           Roswitha Gostner and   
            Bianca Baldacci and   
          Melissa J. Morine and   
                 Corrado Priami   Graphical Modeling Tools for Systems
                                  Biology  . . . . . . . . . . . . . . . . 16:1--16:??
            Alexander Thomasian   Analysis of Fork/Join and Related
                                  Queueing Systems . . . . . . . . . . . . 17:1--17:??
       Christoph Bösch and   
              Pieter Hartel and   
              Willem Jonker and   
                  Andreas Peter   A Survey of Provably Secure Searchable
                                  Encryption . . . . . . . . . . . . . . . 18:1--18:??
              Sparsh Mittal and   
              Jeffrey S. Vetter   A Survey of Methods for Analyzing and
                                  Improving GPU Energy Efficiency  . . . . 19:1--19:??
        Shahbaz Akhtar Abid and   
             Mazliza Othman and   
                     Nadir Shah   A Survey on DHT-Based Routing for
                                  Large-Scale Mobile Ad Hoc Networks . . . 20:1--20:??
                   Dong Qiu and   
                   Bixin Li and   
                 Shunhui Ji and   
                  Hareton Leung   Regression Testing of Web Service: a
                                  Systematic Mapping Study . . . . . . . . 21:1--21:??
         Azzedine Boukerche and   
           Amir Darehshoorzadeh   Opportunistic Routing in Wireless
                                  Networks: Models, Algorithms, and
                                  Classifications  . . . . . . . . . . . . 22:1--22:??
                Aron Laszka and   
            Mark Felegyhazi and   
                Levente Buttyan   A Survey of Interdependent Information
                                  Security Games . . . . . . . . . . . . . 23:1--23:??
              Andrew Newell and   
                 Hongyi Yao and   
                 Alex Ryker and   
                  Tracey Ho and   
           Cristina Nita-Rotaru   Node-Capture Resilient Key Establishment
                                  in Sensor Networks: Design Space and New
                                  Protocols  . . . . . . . . . . . . . . . 24:1--24:??
        Francesco Calabrese and   
              Laura Ferrari and   
             Vincent D. Blondel   Urban Sensing Using Mobile Phone Network
                                  Data: a Survey of Research . . . . . . . 25:1--25:??
            Geoffray Bonnin and   
                Dietmar Jannach   Automated Generation of Music Playlists:
                                  Survey and Experiments . . . . . . . . . 26:1--26:??
  Nachikethas A. Jagadeesan and   
         Bhaskar Krishnamachari   Software-Defined Networking Paradigms in
                                  Wireless Networks: a Survey  . . . . . . 27:1--27:??
           Emanuela Marasco and   
                      Arun Ross   A Survey on Antispoofing Schemes for
                                  Fingerprint Recognition Systems  . . . . 28:1--28:??
                    Pujan Ziaie   A Model for Context in the Design of
                                  Open Production Communities  . . . . . . 29:1--29:??
                Fanxin Kong and   
                        Xue Liu   A Survey on Green-Energy-Aware Power
                                  Management for Datacenters . . . . . . . 30:1--30:??
              Andy Cockburn and   
                Carl Gutwin and   
                 Joey Scarr and   
               Sylvain Malacria   Supporting Novice to Expert Transitions
                                  in User Interfaces . . . . . . . . . . . 31:1--31:??
          Jose Caceres-Cruz and   
                  Pol Arias and   
           Daniel Guimarans and   
               Daniel Riera and   
                  Angel A. Juan   Rich Vehicle Routing Problem: Survey . . 32:1--32:??
              Toni Mastelic and   
             Ariel Oleksiak and   
            Holger Claussen and   
              Ivona Brandic and   
          Jean-Marc Pierson and   
        Athanasios V. Vasilakos   Cloud Computing: Survey on Energy
                                  Efficiency . . . . . . . . . . . . . . . 33:1--33:??
                     Xin Li and   
                  S. S. Iyengar   On Computing Mapping of $3$D Objects: a
                                  Survey . . . . . . . . . . . . . . . . . 34:1--34:??
             Daniel Borrajo and   
Anna Roubícková and   
                    Ivan Serina   Progress in Case-Based Planning  . . . . 35:1--35:??
               Xiaowei Zhou and   
                   Can Yang and   
                Hongyu Zhao and   
                    Weichuan Yu   Low-Rank Modeling and Its Applications
                                  in Image Analysis  . . . . . . . . . . . 36:1--36:??
               Felix Siegle and   
          Tanya Vladimirova and   
       Jòrgen Ilstad and   
                      Omar Emam   Mitigation of Radiation Effects in
                                  SRAM-Based FPGAs for Space Applications  37:1--37:??

ACM Computing Surveys
Volume 47, Number 3, April, 2015

       Dimitrios Rodopoulos and   
            Georgia Psychou and   
           Mohamed M. Sabry and   
           Francky Catthoor and   
       Antonis Papanikolaou and   
          Dimitrios Soudris and   
             Tobias G. Noll and   
                  David Atienza   Classification Framework for Analysis
                                  and Modeling of Physically Induced
                                  Reliability Violations . . . . . . . . . 38:1--38:??
   Muhammad Tayyab Chaudhry and   
             Teck Chaw Ling and   
               Atif Manzoor and   
          Syed Asad Hussain and   
                    Jongwon Kim   Thermal-Aware Scheduling in Green Data
                                  Centers  . . . . . . . . . . . . . . . . 39:1--39:??
                Johan Fabry and   
             Tom Dinkelaker and   
        Jacques Noyé and   
             Éric Tanter   A Taxonomy of Domain-Specific Aspect
                                  Languages  . . . . . . . . . . . . . . . 40:1--40:??
                  Arpan Roy and   
             Santonu Sarkar and   
         Rajeshwari Ganesan and   
                   Geetika Goel   Secure the Cloud: From the Perspective
                                  of a Service-Oriented Organization . . . 41:1--41:??
        Robbert Van Renesse and   
               Deniz Altinbuken   Paxos Made Moderately Complex  . . . . . 42:1--42:??
          Sidney K. D'Mello and   
                Jacqueline Kory   A Review and Meta-Analysis of Multimodal
                                  Affect Detection Systems . . . . . . . . 43:1--43:??
               Adrien Maglo and   
    Guillaume Lavoué and   
             Florent Dupont and   
          Céline Hudelot   $3$D Mesh Compression: Survey,
                                  Comparisons, and Emerging Trends . . . . 44:1--44:??
           Yago Díez and   
               Ferran Roure and   
        Xavier Lladó and   
                  Joaquim Salvi   A Qualitative Review on $3$D Coarse
                                  Registration Methods . . . . . . . . . . 45:1--45:??
             Carmelo Ardito and   
                Paolo Buono and   
  Maria Francesca Costabile and   
               Giuseppe Desolda   Interaction with Large Displays: a
                                  Survey . . . . . . . . . . . . . . . . . 46:1--46:??
             Veljko Pejovic and   
                 Mirco Musolesi   Anticipatory Mobile Computing: a Survey
                                  of the State of the Art and Research
                                  Challenges . . . . . . . . . . . . . . . 47:1--47:??
                 Olga Zoidi and   
          Eftychia Fotiadou and   
           Nikos Nikolaidis and   
                  Ioannis Pitas   Graph-Based Label Propagation in Digital
                                  Media: a Review  . . . . . . . . . . . . 48:1--48:??
               Nidhi Tiwari and   
             Santonu Sarkar and   
               Umesh Bellur and   
                 Maria Indrawan   Classification Framework of MapReduce
                                  Scheduling Algorithms  . . . . . . . . . 49:1--49:??
            Steffen Wendzel and   
           Sebastian Zander and   
           Bernhard Fechner and   
               Christian Herdin   Pattern-Based Survey and Categorization
                                  of Network Covert Channel Techniques . . 50:1--50:??
       Ahmad Fadzil M. Hani and   
    Irving Vitra Paputungan and   
             Mohd Fadzil Hassan   Renegotiation in Service Level Agreement
                                  Management for a Cloud-Based System  . . 51:1--51:??
                 Eva Gibaja and   
       Sebastián Ventura   A Tutorial on Multilabel Learning  . . . 52:1--52:??
             Aggeliki Sgora and   
      Dimitrios J. Vergados and   
          Dimitrios D. Vergados   A Survey of TDMA Scheduling Schemes in
                                  Wireless Multihop Networks . . . . . . . 53:1--53:??
                 Zheng Yang and   
                 Chenshu Wu and   
                  Zimu Zhou and   
              Xinglin Zhang and   
                    Xu Wang and   
                     Yunhao Liu   Mobility Increases Localizability: a
                                  Survey on Wireless Indoor Localization
                                  using Inertial Sensors . . . . . . . . . 54:1--54:??

ACM Computing Surveys
Volume 47, Number 4, July, 2015

  Emmanouil Vasilomanolakis and   
         Shankar Karuppayah and   
   Max Mühlhäuser and   
                Mathias Fischer   Taxonomy and Survey of Collaborative
                                  Intrusion Detection  . . . . . . . . . . 55:1--55:??
             Sarvnaz Karimi and   
                  Chen Wang and   
    Alejandro Metke-Jimenez and   
                  Raj Gaire and   
                   Cecile Paris   Text and Data Mining Techniques in
                                  Adverse Drug Reaction Detection  . . . . 56:1--56:??
                    Shu Shi and   
                 Cheng-Hsin Hsu   A Survey of Interactive Remote Rendering
                                  Systems  . . . . . . . . . . . . . . . . 57:1--57:??
                   Sufatrio and   
           Darell J. J. Tan and   
              Tong-Wei Chua and   
           Vrizlynn L. L. Thing   Securing Android: a Survey, Taxonomy,
                                  and Challenges . . . . . . . . . . . . . 58:1--58:??
Diarmuid Ó Coileáin and   
                 Donal O'Mahony   Accounting and Accountability in Content
                                  Distribution Architectures: a Survey . . 59:1--59:??
     B. R. de Araújo and   
            Daniel S. Lopes and   
               Pauline Jepp and   
           Joaquim A. Jorge and   
                   Brian Wyvill   A Survey on Implicit Surface
                                  Polygonization . . . . . . . . . . . . . 60:1--60:??
       Anirban Mukhopadhyay and   
              Ujjwal Maulik and   
      Sanghamitra Bandyopadhyay   A Survey of Multiobjective Evolutionary
                                  Clustering . . . . . . . . . . . . . . . 61:1--61:??
            Mattias De Wael and   
                Stefan Marr and   
            Bruno De Fraine and   
             Tom Van Cutsem and   
             Wolfgang De Meuter   Partitioned Global Address Space
                                  Languages  . . . . . . . . . . . . . . . 62:1--62:??
               Zhi-Hui Zhan and   
              Xiao-Fang Liu and   
              Yue-Jiao Gong and   
                  Jun Zhang and   
       Henry Shu-Hung Chung and   
                         Yun Li   Cloud Computing Resource Scheduling and
                                  a Survey of Its Evolutionary Approaches  63:1--63:??
 Fahimeh Alizadeh Moghaddam and   
              Patricia Lago and   
                   Paola Grosso   Energy-Efficient Networking Solutions in
                                  Cloud-Based Environments: a Systematic
                                  Literature Review  . . . . . . . . . . . 64:1--64:??
              Mehdi Sookhak and   
              Abdullah Gani and   
             Hamid Talebian and   
            Adnan Akhunzada and   
              Samee U. Khan and   
             Rajkumar Buyya and   
               Albert Y. Zomaya   Remote Data Auditing in Cloud Computing
                                  Environments: a Survey, Taxonomy, and
                                  Open Issues  . . . . . . . . . . . . . . 65:1--65:??
       Andrzej Kamisi\'nski and   
               Piotr Cholda and   
              Andrzej Jajszczyk   Assessing the Structural Complexity of
                                  Computer and Communication Networks  . . 66:1--66:??
             Muhammad Imran and   
            Carlos Castillo and   
              Fernando Diaz and   
                   Sarah Vieweg   Processing Social Media Messages in Mass
                                  Emergency: a Survey  . . . . . . . . . . 67:1--67:??
                  Wei Huang and   
             Afshar Ganjali and   
              Beom Heyn Kim and   
                  Sukwon Oh and   
                      David Lie   The State of Public
                                  Infrastructure-as-a-Service Cloud
                                  Security . . . . . . . . . . . . . . . . 68:1--68:??
              Sparsh Mittal and   
              Jeffrey S. Vetter   A Survey of CPU--GPU Heterogeneous
                                  Computing Techniques . . . . . . . . . . 69:1--69:??
                 Tianyin Xu and   
                  Yuanyuan Zhou   Systems Approaches to Tackling
                                  Configuration Errors: a Survey . . . . . 70:1--70:??


ACM Computing Surveys
Volume 48, Number 1, September, 2015

                Guozhu Meng and   
                   Yang Liu and   
                  Jie Zhang and   
          Alexander Pokluda and   
                  Raouf Boutaba   Collaborative Security: a Survey and
                                  Taxonomy . . . . . . . . . . . . . . . . 1:1--1:??
         Claudio A. Ardagna and   
                Rasool Asal and   
            Ernesto Damiani and   
                  Quang Hieu Vu   From Security to Assurance in the Cloud:
                                  a Survey . . . . . . . . . . . . . . . . 2:1--2:??
              Stefan Mitsch and   
       André Platzer and   
      Werner Retschitzegger and   
              Wieland Schwinger   Logic-Based Modeling Approaches for
                                  Qualitative and Hybrid Reasoning in
                                  Dynamic Spatial Systems  . . . . . . . . 3:1--3:??
       Olumuyiwa Ibidunmoye and   
Francisco Hernández-Rodriguez and   
                   Erik Elmroth   Performance Anomaly Detection and
                                  Bottleneck Identification  . . . . . . . 4:1--4:??
             Bisan Alsalibi and   
             Ibrahim Venkat and   
          K. G. Subramanian and   
      Syaheerah Lebai Lutfi and   
              Philippe De Wilde   The Impact of Bio-Inspired Approaches
                                  Toward the Advancement of Face
                                  Recognition  . . . . . . . . . . . . . . 5:1--5:??
            Muhammad Naveed and   
                Erman Ayday and   
           Ellen W. Clayton and   
             Jacques Fellay and   
             Carl A. Gunter and   
         Jean-Pierre Hubaux and   
           Bradley A. Malin and   
                  Xiaofeng Wang   Privacy in the Genomic Era . . . . . . . 6:1--6:??
                    Bin Guo and   
                   Zhu Wang and   
                  Zhiwen Yu and   
                    Yu Wang and   
                Neil Y. Yen and   
                Runhe Huang and   
                   Xingshe Zhou   Mobile Crowd Sensing and Computing: The
                                  Review of an Emerging Human-Powered
                                  Sensing Paradigm . . . . . . . . . . . . 7:1--7:??
              Patricia Ruiz and   
                  Pascal Bouvry   Survey on Broadcast Algorithms for
                                  Mobile Ad Hoc Networks . . . . . . . . . 8:1--8:??
              Hyejeong Hong and   
                  Jaeil Lim and   
                Hyunyul Lim and   
                    Sungho Kang   Lifetime Reliability Enhancement of
                                  Microprocessors: Mitigating the Impact
                                  of Negative Bias Temperature Instability 9:1--9:??
               Erick Bauman and   
             Gbadebo Ayoade and   
                   Zhiqiang Lin   A Survey on Hypervisor-Based Monitoring:
                                  Approaches, Applications, and Evolutions 10:1--10:??
Zoltán Ádám Mann   Allocation of Virtual Machines in Cloud
                                  Data Centers --- A Survey of Problem
                                  Models and Optimization Algorithms . . . 11:1--11:??
      Aleksandar Milenkoski and   
               Marco Vieira and   
              Samuel Kounev and   
           Alberto Avritzer and   
                 Bryan D. Payne   Evaluating Computer Intrusion Detection
                                  Systems: a Survey of Common Practices    12:1--12:??
                Bingdong Li and   
                 Jinlong Li and   
                    Ke Tang and   
                        Xin Yao   Many-Objective Evolutionary Algorithms:
                                  a Survey . . . . . . . . . . . . . . . . 13:1--13:??
          Klaus Schoeffmann and   
          Marco A. Hudelist and   
                   Jochen Huber   Video Interaction Tools: a Survey of
                                  Recent Work  . . . . . . . . . . . . . . 14:1--14:??
            Matthew Edwards and   
               Awais Rashid and   
                    Paul Rayson   A Systematic Survey of Online Data
                                  Mining Technology Intended for Law
                                  Enforcement  . . . . . . . . . . . . . . 15:1--15:??
              Benoit Baudry and   
               Martin Monperrus   The Multiple Facets of Software
                                  Diversity: Recent Developments in Year
                                  2000 and Beyond  . . . . . . . . . . . . 16:1--16:??

ACM Computing Surveys
Volume 48, Number 2, November, 2015

                 Yunji Chen and   
               Shijin Zhang and   
                     Qi Guo and   
                    Ling Li and   
                 Ruiyang Wu and   
                   Tianshi Chen   Deterministic Replay: a Survey . . . . . 17:1--17:47
   Claus Ballegaard Nielsen and   
          Peter Gorm Larsen and   
            John Fitzgerald and   
               Jim Woodcock and   
                    Jan Peleska   Systems of Systems Engineering: Basic
                                  Concepts, Model-Based Techniques, and
                                  Research Directions  . . . . . . . . . . 18:1--18:41
             Brijesh Dongol and   
                   John Derrick   Verifying Linearisability: a Comparative
                                  Survey . . . . . . . . . . . . . . . . . 19:1--19:43
           Naveed Ul Hassan and   
                 Aqsa Naeem and   
       Muhammad Adeel Pasha and   
               Tariq Jadoon and   
                      Chau Yuen   Indoor Positioning Using Visible LED
                                  Lights: a Survey . . . . . . . . . . . . 20:1--20:32
            Eduardo Velloso and   
            Dominik Schmidt and   
            Jason Alexander and   
             Hans Gellersen and   
                Andreas Bulling   The Feet in Human--Computer Interaction:
                                  a Survey of Foot-Based Interaction . . . 21:1--21:35
             Tarandeep Kaur and   
                Inderveer Chana   Energy Efficiency Techniques in Cloud
                                  Computing: a Survey and Taxonomy . . . . 22:1--22:46
               Mingming Guo and   
                  Xinyu Jin and   
              Niki Pissinou and   
         Sebastian Zanlongo and   
            Bogdan Carbunar and   
                  S. S. Iyengar   In-Network Trajectory Privacy
                                  Preservation . . . . . . . . . . . . . . 23:1--23:29
        Vittorio P. Illiano and   
                   Emil C. Lupu   Detecting Malicious Data Injections in
                                  Wireless Sensor Networks: a Survey . . . 24:1--24:33
         Robert Ryan McCune and   
               Tim Weninger and   
                     Greg Madey   Thinking Like a Vertex: a Survey of
                                  Vertex-Centric Frameworks for
                                  Large-Scale Distributed Graph Processing 25:1--25:39
             Jeroen Delvaux and   
               Roel Peeters and   
                    Dawu Gu and   
             Ingrid Verbauwhede   A Survey on Lightweight Entity
                                  Authentication with Strong PUFs  . . . . 26:1--26:42
             Jones Granatyr and   
          Vanderson Botelho and   
        Otto Robert Lessing and   
Edson Emílio Scalabrin and   
        Jean-Paul Barth\`es and   
      Fabrício Enembreck   Trust and Reputation Models for
                                  Multiagent Systems . . . . . . . . . . . 27:1--27:42
                Jin-Hee Cho and   
                 Kevin Chan and   
                    Sibel Adali   A Survey on Trust Modeling . . . . . . . 28:1--28:40
               Mukesh Saini and   
       Abdulhameed Alelaiwi and   
         Abdulmotaleb El Saddik   How Close are We to Realizing a
                                  Pragmatic VANET Solution? A Meta-Survey  29:1--29:40
               Roy Shilkrot and   
               Jochen Huber and   
        Jürgen Steimle and   
        Suranga Nanayakkara and   
                    Pattie Maes   Digital Digits: a Comprehensive Survey
                                  of Finger Augmentation Devices . . . . . 30:1--30:29
        Ramon Hugo De Souza and   
Mário Antônio Ribeiro Dantas   Mapping QoE through QoS in an Approach
                                  to DDB Architectures: Research Analysis
                                  and Conceptualization  . . . . . . . . . 31:1--31:41
           Giovani Gracioli and   
             Ahmed Alhammad and   
             Renato Mancuso and   
Antônio Augusto Fröhlich and   
             Rodolfo Pellizzoni   A Survey on Cache Management Mechanisms
                                  for Real-Time Embedded Systems . . . . . 32:1--32:36

ACM Computing Surveys
Volume 48, Number 3, February, 2016

        Angel Lagares Lemos and   
             Florian Daniel and   
             Boualem Benatallah   Web Service Composition: a Survey of
                                  Techniques and Tools . . . . . . . . . . 33:1--33:??
            Asma Benmansour and   
      Abdelhamid Bouchachia and   
                 Mohammed Feham   Multioccupant Activity Recognition in
                                  Pervasive Smart Home Environments  . . . 34:1--34:??
            Eleni Koutrouli and   
          Aphrodite Tsalgatidou   Reputation Systems Evaluation Survey . . 35:1--35:??
             Simone Brienza and   
          Sena Efsun Cebeci and   
    Seyed Saeid Masoumzadeh and   
             Helmut Hlavacs and   
    Öznur Özkasap and   
              Giuseppe Anastasi   A Survey on Energy Efficiency in P2P
                                  Systems: File Distribution, Content
                                  Streaming, and Epidemics . . . . . . . . 36:1--36:??
            Ryan Heartfield and   
                  George Loukas   A Taxonomy of Attacks and a Survey of
                                  Defence Mechanisms for Semantic Social
                                  Engineering Attacks  . . . . . . . . . . 37:1--37:??
                Andrea Hess and   
          Karin Anna Hummel and   
      Wilfried N. Gansterer and   
             Günter Haring   Data-driven Human Mobility Modeling: a
                                  Survey and Engineering Guidance for
                                  Mobile Networking  . . . . . . . . . . . 38:1--38:??
    Mohammad Ashraful Hoque and   
            Matti Siekkinen and   
          Kashif Nizam Khan and   
                    Yu Xiao and   
                   Sasu Tarkoma   Modeling, Profiling, and Debugging the
                                  Energy Consumption of Mobile Devices . . 39:1--39:??
               John Narayan and   
          Sandeep K. Shukla and   
              T. Charles Clancy   A Survey of Automatic Protocol Reverse
                                  Engineering Tools  . . . . . . . . . . . 40:1--40:??
              Elaheh Momeni and   
              Claire Cardie and   
           Nicholas Diakopoulos   A Survey on Assessment and Ranking
                                  Methodologies for User-Generated Content
                                  on the Web . . . . . . . . . . . . . . . 41:1--41:??
              Sukhpal Singh and   
                Inderveer Chana   QoS-Aware Autonomic Resource Management
                                  in Cloud Computing: a Systematic Review  42:1--42:??
           Funmilade Faniyi and   
                   Rami Bahsoon   A Systematic Review of Service Level
                                  Management in the Cloud  . . . . . . . . 43:1--43:??
            Roberto Natella and   
          Domenico Cotroneo and   
            Henrique S. Madeira   Assessing Dependability with Software
                                  Fault Injection: a Survey  . . . . . . . 44:1--44:??
                  Sparsh Mittal   A Survey of Techniques for Architecting
                                  and Managing Asymmetric Multicore
                                  Processors . . . . . . . . . . . . . . . 45:1--45:??
          Daniele Sgandurra and   
                      Emil Lupu   Evolution of Attacks, Threat Models, and
                                  Solutions for Virtualized Systems  . . . 46:1--46:??
              Gildas Avoine and   
          Antonin Beaujeant and   
     Julio Hernandez-Castro and   
                Louis Demay and   
                Philippe Teuwen   A Survey of Security and Privacy Issues
                                  in ePassport Protocols . . . . . . . . . 47:1--47:??
     Maria Carla Calzarossa and   
              Luisa Massari and   
                Daniele Tessera   Workload Characterization: a Survey
                                  Revisited  . . . . . . . . . . . . . . . 48:1--48:??

ACM Computing Surveys
Volume 48, Number 4, May, 2016

                     Yi Ren and   
                   Ling Liu and   
                   Qi Zhang and   
                  Qingbo Wu and   
                Jianbo Guan and   
                Jinzhu Kong and   
                Huadong Dai and   
                    Lisong Shao   Shared-Memory Optimizations for
                                  Inter-Virtual-Machine Communication  . . 49:1--49:??
               Barsha Mitra and   
               Shamik Sural and   
             Jaideep Vaidya and   
           Vijayalakshmi Atluri   A Survey of Role Mining  . . . . . . . . 50:1--50:??
       Claudio M. De Farias and   
                     Wei Li and   
  Flávia C. Delicato and   
                Luci Pirmez and   
           Albert Y. Zomaya and   
             Paulo F. Pires and   
        José N. De Souza   A Systematic Review of Shared Sensor
                                  Networks . . . . . . . . . . . . . . . . 51:1--51:??
               Marco Crocco and   
             Marco Cristani and   
              Andrea Trucco and   
                Vittorio Murino   Audio Surveillance: a Systematic Review  52:1--52:??
         Halgurd S. Maghdid and   
        Ihsan Alshahib Lami and   
        Kayhan Zrar Ghafoor and   
                   Jaime Lloret   Seamless Outdoors-Indoors Localization
                                  Solutions on Smartphones: Implementation
                                  and Challenges . . . . . . . . . . . . . 53:1--53:??
                  Sparsh Mittal   A Survey of Architectural Techniques for
                                  Managing Process Variation . . . . . . . 54:1--54:??
        Bernd Carsten Stahl and   
             Job Timmermans and   
       Brent Daniel Mittelstadt   The Ethics of Computing: a Survey of the
                                  Computing-Oriented Literature  . . . . . 55:1--55:??
               Niall Murray and   
                  Brian Lee and   
              Yuansong Qiao and   
           Gabriel-Miro Muntean   Olfaction-Enhanced Multimedia: a Survey
                                  of Application Domains, Displays, and
                                  Research Challenges  . . . . . . . . . . 56:1--56:??
           Niklas Palaghias and   
Seyed Amir Hoseinitabatabaei and   
               Michele Nati and   
           Alexander Gluhak and   
                 Klaus Moessner   A Survey on Mobile Social Signal
                                  Processing . . . . . . . . . . . . . . . 57:1--57:??
          David C. Harrison and   
         Winston K. G. Seah and   
                  Ramesh Rayudu   Rare Event Detection and Propagation in
                                  Wireless Sensor Networks . . . . . . . . 58:1--58:??
           Sebastian Werner and   
           Javier Navaridas and   
             Mikel Luján   A Survey on Design Approaches to
                                  Circumvent Permanent Faults in
                                  Networks-on-Chip . . . . . . . . . . . . 59:1--59:??
                   Liang Hu and   
                 Xilong Che and   
                  Si-Qing Zheng   A Closer Look at GPGPU . . . . . . . . . 60:1--60:??
             Marco Platania and   
           Daniel Obenshain and   
            Thomas Tantillo and   
                  Yair Amir and   
                    Neeraj Suri   On Choosing Server- or Client-Side
                                  Solutions for BFT  . . . . . . . . . . . 61:1--61:??
                  Sparsh Mittal   A Survey of Techniques for Approximate
                                  Computing  . . . . . . . . . . . . . . . 62:1--62:??
Edans Flavius De Oliveira Sandes and   
         Azzedine Boukerche and   
Alba Cristina Magalhaes Alves De Melo   Parallel Optimal Pairwise Biological
                                  Sequence Comparison: Algorithms,
                                  Platforms, and Classification  . . . . . 63:1--63:??
            Desmond Schmidt and   
              Kenneth Radke and   
              Seyit Camtepe and   
                 Ernest Foo and   
                     Michal Ren   A Survey and Analysis of the GNSS
                                  Spoofing Threat and Countermeasures  . . 64:1--64:??
             Juan Caballero and   
                   Zhiqiang Lin   Type Inference on Executables  . . . . . 65:1--65:??


ACM Computing Surveys
Volume 49, Number 1, July, 2016

               Junaid Shuja and   
              Abdullah Gani and   
               Kashif Bilal and   
        Atta Ur Rehman Khan and   
           Sajjad A. Madani and   
              Samee U. Khan and   
               Albert Y. Zomaya   A Survey of Mobile Device
                                  Virtualization: Taxonomy and State of
                                  the Art  . . . . . . . . . . . . . . . . 1:1--1:??
       Muhammad Raisul Alam and   
            Marc St-Hilaire and   
                    Thomas Kunz   Computational Methods for Residential
                                  Energy Cost Optimization in Smart Grids:
                                  a Survey . . . . . . . . . . . . . . . . 2:1--2:??
           Hans Hüttel and   
                Ivan Lanese and   
       Vasco T. Vasconcelos and   
         Luís Caires and   
              Marco Carbone and   
Pierre-Malo Deniélou and   
          Dimitris Mostrous and   
              Luca Padovani and   
      António Ravara and   
              Emilio Tuosto and   
         Hugo Torres Vieira and   
            Gianluigi Zavattaro   Foundations of Session Types and
                                  Behavioural Contracts  . . . . . . . . . 3:1--3:??
    Sebastian Schrittwieser and   
       Stefan Katzenbeisser and   
            Johannes Kinder and   
           Georg Merzdovnik and   
                   Edgar Weippl   Protecting Software through Obfuscation:
                                  Can It Keep Pace with Progress in Code
                                  Analysis?  . . . . . . . . . . . . . . . 4:1--4:??
                    Buke Ao and   
               Yongcai Wang and   
                      Lu Yu and   
          Richard R. Brooks and   
                  S. S. Iyengar   On Precision Bound of Distributed
                                  Fault-Tolerant Sensor Fusion Algorithms  5:1--5:??
                 Junbin Liu and   
           Sridha Sridharan and   
                 Clinton Fookes   Recent Advances in Camera Planning for
                                  Large Area Surveillance: a Comprehensive
                                  Review . . . . . . . . . . . . . . . . . 6:1--6:??
               Suleman Khan and   
              Abdullah Gani and   
 Ainuddin Wahid Abdul Wahab and   
      Mustapha Aminu Bagiwa and   
            Muhammad Shiraz and   
              Samee U. Khan and   
             Rajkumar Buyya and   
               Albert Y. Zomaya   Cloud Log Forensics: Foundations, State
                                  of the Art, and Future Directions  . . . 7:1--7:??
       Dada Emmanuel Gbenga and   
          Effirul Ikhwan Ramlan   Understanding the Limitations of
                                  Particle Swarm Algorithm for Dynamic
                                  Optimization Tasks: a Survey Towards the
                                  Singularity of PSO for Swarm Robotic
                                  Applications . . . . . . . . . . . . . . 8:1--8:??
                  Xiang Zuo and   
              Adriana Iamnitchi   A Survey of Socially Aware Peer-to-Peer
                                  Systems  . . . . . . . . . . . . . . . . 9:1--9:??
               Wenjun Jiang and   
                Guojun Wang and   
    Md Zakirul Alam Bhuiyan and   
                         Jie Wu   Understanding Graph-Based Trust
                                  Evaluation in Online Social Networks:
                                  Methodologies and Challenges . . . . . . 10:1--10:??
   Fabrício A. Silva and   
         Azzedine Boukerche and   
    Thais R. M. Braga Silva and   
            Linnyer B. Ruiz and   
          Eduardo Cerqueira and   
         Antonio A. F. Loureiro   Vehicular Networks: a New Challenge for
                                  Content-Delivery-Based Applications  . . 11:1--11:??
                 Ruogu Fang and   
           Samira Pouyanfar and   
                 Yimin Yang and   
             Shu-Ching Chen and   
                  S. S. Iyengar   Computational Health Informatics in the
                                  Big Data Age: a Survey . . . . . . . . . 12:1--12:??
                   Jun Tang and   
                   Yong Cui and   
                      Qi Li and   
                    Kui Ren and   
             Jiangchuan Liu and   
                 Rajkumar Buyya   Ensuring Security and Privacy
                                  Preservation for Cloud Data Services . . 13:1--13:??
                  Xirong Li and   
           Tiberio Uricchio and   
            Lamberto Ballan and   
              Marco Bertini and   
           Cees G. M. Snoek and   
              Alberto Del Bimbo   Socializing the Semantic Gap: a
                                  Comparative Survey on Image Tag
                                  Assignment, Refinement, and Retrieval    14:1--14:??
    Nadia Felix F. Da Silva and   
         Luiz F. S. Coletta and   
            Eduardo R. Hruschka   A Survey and Comparative Study of Tweet
                                  Sentiment Analysis via Semi-Supervised
                                  Learning . . . . . . . . . . . . . . . . 15:1--15:??
             Durgesh Samant and   
                   Umesh Bellur   Handling Boot Storms in Virtualized Data
                                  Centers --- A Survey . . . . . . . . . . 16:1--16:??
              Kaveh Hassani and   
                   Won-Sook Lee   Visualizing Natural Language
                                  Descriptions: a Survey . . . . . . . . . 17:1--17:??
                 Ovidiu Dan and   
               Brian D. Davison   Measuring and Predicting Search Engine
                                  Users' Satisfaction  . . . . . . . . . . 18:1--18:??
               Paolo Viotti and   
                Marko Vukoli\'c   Consistency in Non-Transactional
                                  Distributed Storage Systems  . . . . . . 19:1--19:??
               Junbin Liang and   
               Jiannong Cao and   
                    Rui Liu and   
                         Tao Li   Distributed Intelligent MEMS: a Survey
                                  and a Real-Time Programming Framework    20:1--20:??
              Salman Khwaja and   
              Mohammad Alshayeb   Survey On Software Design-Pattern
                                  Specification Languages  . . . . . . . . 21:1--21:??

ACM Computing Surveys
Volume 49, Number 2, September, 2016

           Alvaro Estebanez and   
            Diego R. Llanos and   
      Arturo Gonzalez-Escribano   A Survey on Thread-Level Speculation
                                  Techniques . . . . . . . . . . . . . . . 22:1--22:??
              Brent Carrara and   
                 Carlisle Adams   Out-of-Band Covert Channels --- A Survey 23:1--23:??
      Ruggero Donida Labati and   
            Angelo Genovese and   
       Enrique Muñoz and   
             Vincenzo Piuri and   
               Fabio Scotti and   
                Gianluca Sforza   Biometric Recognition in Automated
                                  Border Control: a Survey . . . . . . . . 24:1--24:??
                 Jiang Xiao and   
                  Zimu Zhou and   
                  Youwen Yi and   
                   Lionel M. Ni   A Survey on Wireless Indoor Localization
                                  from the Device Perspective  . . . . . . 25:1--25:??
        Panagiotis Kokkinos and   
         Dimitris Kalogeras and   
                 Anna Levin and   
           Emmanouel Varvarigos   Survey: Live Migration and Disaster
                                  Recovery over Long-Distance Networks . . 26:1--26:??
              Emanuel Onica and   
              Pascal Felber and   
             Hugues Mercier and   
              Etienne Rivi\`ere   Confidentiality-Preserving
                                  Publish/Subscribe: a Survey  . . . . . . 27:1--27:??
        Anastasia Giachanou and   
                 Fabio Crestani   Like It or Not: a Survey of Twitter
                                  Sentiment Analysis Methods . . . . . . . 28:1--28:??
                Vini Kanvar and   
                Uday P. Khedker   Heap Abstractions for Static Analysis    29:1--29:??
      Éfren L. Souza and   
        Eduardo F. Nakamura and   
               Richard W. Pazzi   Target Tracking for Sensor Networks: a
                                  Survey . . . . . . . . . . . . . . . . . 30:1--30:??
               Paula Branco and   
          Luís Torgo and   
                Rita P. Ribeiro   A Survey of Predictive Modeling on
                                  Imbalanced Domains . . . . . . . . . . . 31:1--31:??
            Mashael Alsabah and   
                   Ian Goldberg   Performance and Security Improvements
                                  for Tor: a Survey  . . . . . . . . . . . 32:1--32:??
              Shadi Khalifa and   
             Yehia Elshater and   
      Kiran Sundaravarathan and   
                Aparna Bhat and   
             Patrick Martin and   
                 Fahim Imam and   
                   Dan Rope and   
             Mike Mcroberts and   
                 Craig Statchuk   The Six Pillars for Building Big Data
                                  Analytics Ecosystems . . . . . . . . . . 33:1--33:??
                  Sparsh Mittal   A Survey of Recent Prefetching
                                  Techniques for Processor Caches  . . . . 35:1--35:??
           Christoph Kofler and   
              Martha Larson and   
                  Alan Hanjalic   User Intent in Multimedia Search: a
                                  Survey of the State of the Art and
                                  Future Challenges  . . . . . . . . . . . 36:1--36:??
            Efthalia Karydi and   
        Konstantinos Margaritis   Parallel and Distributed Collaborative
                                  Filtering: a Survey  . . . . . . . . . . 37:1--37:??
                    Meng Xu and   
               Chengyu Song and   
                    Yang Ji and   
              Ming-Wei Shih and   
                 Kangjie Lu and   
                 Cong Zheng and   
                 Ruian Duan and   
              Yeongjin Jang and   
            Byoungyoung Lee and   
             Chenxiong Qian and   
                 Sangho Lee and   
                     Taesoo Kim   Toward Engineering a Secure Android
                                  Ecosystem: a Survey of Existing
                                  Techniques . . . . . . . . . . . . . . . 38:1--38:??
       Emerson M. A. Xavier and   
Francisco J. Ariza-López and   
Manuel A. Ureña-Cámara   A Survey of Measures and Methods for
                                  Matching Geospatial Vector Datasets  . . 39:1--39:??
              Tahir Maqsood and   
               Osman Khalid and   
              Rizwana Irfan and   
           Sajjad A. Madani and   
                  Samee U. Khan   Scalability Issues in Online Social
                                  Networks . . . . . . . . . . . . . . . . 40:1--40:??

ACM Computing Surveys
Volume 49, Number 3, November, 2016

          Robert A. Bridges and   
                 Neena Imam and   
               Tiffany M. Mintz   Understanding GPU Power: a Survey of
                                  Profiling, Modeling, and Simulation
                                  Methods  . . . . . . . . . . . . . . . . 41:1--41:??
               Jiliang Tang and   
                   Yi Chang and   
             Charu Aggarwal and   
                       Huan Liu   A Survey of Signed Network Mining in
                                  Social Media . . . . . . . . . . . . . . 42:1--42:??
               Jorge Blasco and   
             Thomas M. Chen and   
              Juan Tapiador and   
              Pedro Peris-Lopez   A Survey of Wearable Biometric
                                  Recognition Systems  . . . . . . . . . . 43:1--43:??
               Roman Trobec and   
      Radivoje Vasiljevi\'c and   
           Milo Tomasevi\'c and   
       Veljko Milutinovi\'c and   
              Ramon Beivide and   
                   Mateo Valero   Interconnection Networks in Petascale
                                  Computer Systems: a Survey . . . . . . . 44:1--44:??
              Jasmeet Singh and   
                   Vishal Gupta   Text Stemming: Approaches, Applications,
                                  and Challenges . . . . . . . . . . . . . 45:1--45:??
           Riccardo Coppola and   
               Maurizio Morisio   Connected Car: Technologies, Issues,
                                  Future Trends  . . . . . . . . . . . . . 46:1--46:??
                 Keewon Cho and   
               Wooheon Kang and   
               Hyungjun Cho and   
              Changwook Lee and   
                    Sungho Kang   A Survey of Repair Analysis Algorithms
                                  for Memories . . . . . . . . . . . . . . 47:1--47:??
          Mateus L. Ribeiro and   
   Henrique Manoel Lederman and   
               Simone Elias and   
      FÁtima L. S. Nunes   Techniques and Devices Used in Palpation
                                  Simulation with Haptic Feedback  . . . . 48:1--48:??
                Ilia Pietri and   
              Rizos Sakellariou   Mapping Virtual Machines onto Physical
                                  Machines in Cloud Computing: a Survey    49:1--49:??
                    Rui Shu and   
                Peipei Wang and   
      Sigmund A. Gorski III and   
             Benjamin Andow and   
            Adwait Nadkarni and   
             Luke Deshotels and   
               Jason Gionta and   
               William Enck and   
                     Xiaohui Gu   A Study of Security Isolation Techniques 50:1--50:??
     Rodrigo Vieira Steiner and   
                      Emil Lupu   Attestation in Wireless Sensor Networks:
                                  a Survey . . . . . . . . . . . . . . . . 51:1--51:??
      Pedro Henriques Abreu and   
       Miriam Seoane Santos and   
     Miguel Henriques Abreu and   
              Bruno Andrade and   
            Daniel Castro Silva   Predicting Breast Cancer Recurrence
                                  Using Machine Learning Techniques: a
                                  Systematic Review  . . . . . . . . . . . 52:1--52:??
      Jamshaid Sarwar Malik and   
                   Ahmed Hemani   Gaussian Random Number Generation: a
                                  Survey on Hardware Architectures . . . . 53:1--53:??
            Johann Brault-Baron   Hypergraph Acyclicity Revisited  . . . . 54:1--54:??
             Bradley Reaves and   
             Jasmine Bowers and   
  Sigmund Albert Gorski III and   
              Olabode Anise and   
              Rahul Bobhate and   
                Raymond Cho and   
               Hiranava Das and   
           Sharique Hussain and   
          Hamza Karachiwala and   
               Nolen Scaife and   
               Byron Wright and   
               Kevin Butler and   
               William Enck and   
                Patrick Traynor   *droid: Assessment and Evaluation of
                                  Android Application Analysis Tools . . . 55:1--55:??
              Aldeida Aleti and   
                    Irene Moser   A Systematic Literature Review of
                                  Adaptive Parameter Control Methods for
                                  Evolutionary Algorithms  . . . . . . . . 56:1--56:??
                     Tuo Li and   
        Jude Angelo Ambrose and   
               Roshan Ragel and   
               Sri Parameswaran   Processor Design for Soft Errors:
                                  Challenges and State of the Art  . . . . 57:1--57:??
       Gabriel Martins Dias and   
             Boris Bellalta and   
                 Simon Oechsner   A Survey About Prediction-Based Data
                                  Reduction in Wireless Sensor Networks    58:1--58:??
            Joseph Gardiner and   
               Shishir Nagaraja   On the Security of Machine Learning in
                                  Malware C&C Detection: a Survey . . . . . 59:1--59:??

ACM Computing Surveys
Volume 49, Number 4, February, 2017

              Gilles Bailly and   
             Eric Lecolinet and   
                 Laurence Nigay   Visual Menu Techniques . . . . . . . . . 60:1--60:??
                Sven Kiljan and   
               Koen Simoens and   
              Danny De Cock and   
          Marko Van Eekelen and   
                 Harald Vranken   A Survey of Authentication and
                                  Communications Security in Online
                                  Banking  . . . . . . . . . . . . . . . . 61:1--61:??
           Marcus Pendleton and   
      Richard Garcia-Lebron and   
                Jin-Hee Cho and   
                    Shouhuai Xu   A Survey on Systems Security Metrics . . 62:1--62:??
          Ilche Georgievski and   
                   Marco Aiello   Automated Planning for Ubiquitous
                                  Computing  . . . . . . . . . . . . . . . 63:1--63:??
            Matthias Diener and   
         Eduardo H. M. Cruz and   
          Marco A. Z. Alves and   
      Philippe O. A. Navaux and   
                   Israel Koren   Affinity-Based Thread and Data Mapping
                                  in Shared Memory Systems . . . . . . . . 64:1--64:??
              Daniel Servos and   
               Sylvia L. Osborn   Current Research and Open Problems in
                                  Attribute-Based Access Control . . . . . 65:1--65:??
              Chee Sun Liew and   
        Malcolm P. Atkinson and   
             Michelle Galea and   
               Tan Fong Ang and   
                Paul Martin and   
             Jano I. Van Hemert   Scientific Workflows: Moving Across
                                  Paradigms  . . . . . . . . . . . . . . . 66:1--66:??
         Maximilian Capraro and   
                    Dirk Riehle   Inner Source Definition, Benefits, and
                                  Challenges . . . . . . . . . . . . . . . 67:1--67:??
     Mohammad Hanif Jhaveri and   
                Orcun Cetin and   
 Carlos Gañán and   
                Tyler Moore and   
               Michel Van Eeten   Abuse Reporting and the Fight Against
                                  Cybercrime . . . . . . . . . . . . . . . 68:1--68:??
Víctor Martínez and   
            Fernando Berzal and   
             Juan-Carlos Cubero   A Survey of Link Prediction in Complex
                                  Networks . . . . . . . . . . . . . . . . 69:1--69:??
                 Chii Chang and   
    Satish Narayana Srirama and   
                 Rajkumar Buyya   Mobile Cloud Business Process Management
                                  System for the Internet of Things: a
                                  Survey . . . . . . . . . . . . . . . . . 70:1--70:??
  Peratham Wiriyathammabhum and   
       Douglas Summers-Stay and   
    Cornelia Fermüller and   
              Yiannis Aloimonos   Computer Vision and Natural Language
                                  Processing: Recent Approaches in
                                  Multimedia and Robotics  . . . . . . . . 71:1--71:??
                   G. Pavai and   
                   T. V. Geetha   A Survey on Crossover Operators  . . . . 72:1--72:??
         Azzedine Boukerche and   
          Alexander Magnano and   
                   Noura Aljeri   Mobile IP Handover for Vehicular
                                  Networks: Methods, Models, and
                                  Classifications  . . . . . . . . . . . . 73:1--73:??
              Youngjoo Shin and   
              Dongyoung Koo and   
                    Junbeom Hur   A Survey of Secure Data Deduplication
                                  Schemes for Cloud Storage Systems  . . . 74:1--74:??
              Nour Abura'ed and   
           Faisal Shah Khan and   
                 Harish Bhaskar   Advances in the Quantum Theoretical
                                  Approach to Image Processing
                                  Applications . . . . . . . . . . . . . . 75:1--75:??
               Kimberly Tam and   
              Ali Feizollah and   
           Nor Badrul Anuar and   
               Rosli Salleh and   
              Lorenzo Cavallaro   The Evolution of Android Malware and
                                  Android Analysis Techniques  . . . . . . 76:1--76:??


ACM Computing Surveys
Volume 50, Number 1, April, 2017

                     Tao Li and   
                   Ning Xie and   
               Chunqiu Zeng and   
                 Wubai Zhou and   
                   Li Zheng and   
                 Yexi Jiang and   
                 Yimin Yang and   
                 Hsin-Yu Ha and   
                    Wei Xue and   
                  Yue Huang and   
             Shu-Ching Chen and   
         Jainendra Navlakha and   
                  S. S. Iyengar   Data-Driven Techniques in Disaster
                                  Information Management . . . . . . . . . 1:1--1:??
           Marcello La Rosa and   
    Wil M. P. Van Der Aalst and   
               Marlon Dumas and   
              Fredrik P. Milani   Business Process Variability Modeling: a
                                  Survey . . . . . . . . . . . . . . . . . 2:1--2:??
              Marwa Salayma and   
             Ahmed Al-Dubai and   
              Imed Romdhani and   
                 Youssef Nasser   Wireless Body Area Network (WBAN): a
                                  Survey on Reliability, Fault Tolerance,
                                  and Technologies Coexistence . . . . . . 3:1--3:??
              Sayantan Nath and   
             Sonali Agarwal and   
                   G. N. Pandey   Evaluation of Knowledge Gaps in
                                  Mathematical Applications of Thermal
                                  Image Processing Techniques for Fire
                                  Prevention . . . . . . . . . . . . . . . 4:1--4:??
                    Ting Su and   
                      Ke Wu and   
                Weikai Miao and   
                 Geguang Pu and   
                  Jifeng He and   
                Yuting Chen and   
                    Zhendong Su   A Survey on Data-Flow Testing  . . . . . 5:1--5:??
         Arnab Kumar Biswas and   
               Dipak Ghosal and   
               Shishir Nagaraja   A Survey of Timing Channels and
                                  Countermeasures  . . . . . . . . . . . . 6:1--6:??
                Frank Dylla and   
                Jae Hee Lee and   
           Till Mossakowski and   
           Thomas Schneider and   
    André Van Delden and   
          Jasper Van De Ven and   
                Diedrich Wolter   A Survey of Qualitative Spatial and
                                  Temporal Calculi: Algebraic and
                                  Computational Properties . . . . . . . . 7:1--7:??
    Raghavendra Ramachandra and   
                Christoph Busch   Presentation Attack Detection Methods
                                  for Face Recognition Systems: a
                                  Comprehensive Survey . . . . . . . . . . 8:1--8:??
                 Britta Meixner   Hypervideos and Interactive Multimedia
                                  Presentations  . . . . . . . . . . . . . 9:1--9:??
               Admela Jukan and   
           Xavi Masip-Bruin and   
                      Nina Amla   Smart Computing and Sensing Technologies
                                  for Animal Welfare: a Systematic Review  10:1--10:??
                Lianhua Chi and   
                   Xingquan Zhu   Hashing Techniques: a Survey and
                                  Taxonomy . . . . . . . . . . . . . . . . 11:1--11:36
           Milena Tsvetkova and   
               Taha Yasseri and   
              Eric T. Meyer and   
         J. Brian Pickering and   
               Vegard Engen and   
               Paul Walland and   
         Marika Lüders and   
Asbjòrn Fòlstad and   
                  George Bravos   Understanding Human-Machine Networks: a
                                  Cross-Disciplinary Survey  . . . . . . . 12:1--12:??
          Stefano Calzavara and   
           Riccardo Focardi and   
            Marco Squarcina and   
                 Mauro Tempesta   Surviving the Web: a Journey into Web
                                  Session Security . . . . . . . . . . . . 13:1--13:??
            Rabih Bashroush and   
             Muhammad Garba and   
               Rick Rabiser and   
                Iris Groher and   
               Goetz Botterweck   CASE Tool Support for Variability
                                  Management in Software Product Lines . . 14:1--14:??
     Amparo Soler-Dominguez and   
              Angel A. Juan and   
                  Renatas Kizys   A Survey on Financial Applications of
                                  Metaheuristics . . . . . . . . . . . . . 15:1--15:??
               Nathan Burow and   
              Scott A. Carr and   
                Joseph Nash and   
                 Per Larsen and   
              Michael Franz and   
          Stefan Brunthaler and   
                  Mathias Payer   Control-Flow Integrity: Precision,
                                  Security, and Performance  . . . . . . . 16:1--16:??

ACM Computing Surveys
Volume 50, Number 2, June, 2017

              Faiz ul Muram and   
                   Huy Tran and   
                       Uwe Zdun   Systematic Review of Software Behavioral
                                  Model Consistency Checking . . . . . . . 17:1--17:??
      Quinten David Soetens and   
              Romain Robbes and   
                  Serge Demeyer   Changes as First-Class Citizens: a
                                  Research Perspective on Modern Software
                                  Tooling  . . . . . . . . . . . . . . . . 18:1--18:??
                 Joan Boyar and   
          Lene M. Favrholdt and   
           Christian Kudahl and   
              Kim S. Larsen and   
            Jesper W. Mikkelsen   Online Algorithms with Advice: a Survey  19:1--19:??
        Anastasia Ioannidou and   
        Elisavet Chatzilari and   
        Spiros Nikolopoulos and   
           Ioannis Kompatsiaris   Deep Learning Advances in Computer
                                  Vision with $3$D Data: a Survey  . . . . 20:1--20:??
              Ahmed Hussein and   
       Mohamed Medhat Gaber and   
                 Eyad Elyan and   
                 Chrisina Jayne   Imitation Learning: a Survey of Learning
                                  Methods  . . . . . . . . . . . . . . . . 21:1--21:??
        Joachim Gudmundsson and   
                 Michael Horton   Spatio-Temporal Analysis of Team Sports  22:1--22:??
        Heitor Murilo Gomes and   
          Jean Paul Barddal and   
  Fabrício Enembreck and   
                   Albert Bifet   A Survey on Ensemble Learning for Data
                                  Stream Classification  . . . . . . . . . 23:1--23:??
           Amit Kumar Singh and   
          Piotr Dziurzanski and   
    Hashan Roshantha Mendis and   
       Leandro Soares Indrusiak   A Survey and Comparative Study of Hard
                                  and Soft Real-Time Dynamic Resource
                                  Allocation Strategies for Multi-\slash
                                  Many-Core Systems  . . . . . . . . . . . 24:1--24:??
              Ali Yadollahi and   
  Ameneh Gholipour Shahraki and   
                Osmar R. Zaiane   Current State of Text Sentiment Analysis
                                  from Opinion to Emotion Mining . . . . . 25:1--25:??
            Denis Weerasiri and   
          Moshe Chai Barukh and   
         Boualem Benatallah and   
              Quan Z. Sheng and   
                   Rajiv Ranjan   A Taxonomy and Survey of Cloud Resource
                                  Orchestration Techniques . . . . . . . . 26:1--26:??
                  Sparsh Mittal   A Survey of Techniques for Cache
                                  Partitioning in Multicore Processors . . 27:1--27:??
               Hanjiang Luo and   
                 Kaishun Wu and   
              Rukhsana Ruby and   
                  Feng Hong and   
               Zhongwen Guo and   
                   Lionel M. Ni   Simulation and Experimentation Platforms
                                  for Underwater Acoustic Sensor Networks:
                                  Advancements and Challenges  . . . . . . 28:1--28:??
              Rafaqut Kazmi and   
        Dayang N. A. Jawawi and   
            Radziah Mohamad and   
                    Imran Ghani   Effective Regression Test Case
                                  Selection: a Systematic Literature
                                  Review . . . . . . . . . . . . . . . . . 29:1--29:??
                Cuong T. Do and   
             Nguyen H. Tran and   
            Choongseon Hong and   
         Charles A. Kamhoua and   
             Kevin A. Kwiat and   
                Erik Blasch and   
                Shaolei Ren and   
              Niki Pissinou and   
    Sundaraja Sitharama Iyengar   Game Theory for Cyber Security and
                                  Privacy  . . . . . . . . . . . . . . . . 30:1--30:??
         Mohamed Amine Kafi and   
           Jalel Ben Othman and   
                 Nadjib Badache   A Survey on Reliability Protocols in
                                  Wireless Sensor Networks . . . . . . . . 31:1--31:??

ACM Computing Surveys
Volume 50, Number 3, October, 2017

             Charith Perera and   
                Yongrui Qin and   
          Julio C. Estrella and   
    Stephan Reiff-Marganiec and   
        Athanasios V. Vasilakos   Fog Computing for Sustainable Smart
                                  Cities: a Survey . . . . . . . . . . . . 32:1--32:??
        Baligh M. Al-Helali and   
               Sabri A. Mahmoud   Arabic Online Handwriting Recognition
                                  (AOHR): a Survey . . . . . . . . . . . . 33:1--33:??
          Kok-Lim Alvin Yau and   
               Junaid Qadir and   
             Hooi Ling Khoo and   
              Mee Hong Ling and   
              Peter Komisarczuk   A Survey on Reinforcement Learning
                                  Models and Algorithms for Traffic Signal
                                  Control  . . . . . . . . . . . . . . . . 34:1--34:??
              Cheol-Ho Hong and   
                Ivor Spence and   
      Dimitrios S. Nikolopoulos   GPU Virtualization and Scheduling
                                  Methods: a Comprehensive Survey  . . . . 35:1--35:??
        Muhammad Murad Khan and   
            Roliana Ibrahim and   
                    Imran Ghani   Cross Domain Recommender Systems: a
                                  Systematic Literature Review . . . . . . 36:1--36:??
            Kenneth O'brien and   
                Ilia Pietri and   
                 Ravi Reddy and   
         Alexey Lastovetsky and   
              Rizos Sakellariou   A Survey of Power and Energy Predictive
                                  Models in HPC Systems and Applications   37:1--37:??
    Astrid Rheinländer and   
                  Ulf Leser and   
                   Goetz Graefe   Optimization of Complex Dataflows with
                                  User-Defined Functions . . . . . . . . . 38:1--38:??
           Ahmad Barforoush and   
            Hossein Shirazi and   
                   Hojjat Emami   A New Classification Framework to
                                  Evaluate the Entity Profiling on the
                                  Web: Past, Present and Future  . . . . . 39:1--39:??
              Geong Sen Poh and   
               Ji-Jian Chin and   
              Wei-Chuen Yau and   
     Kim-Kwang Raymond Choo and   
        Moesfa Soeheila Mohamad   Searchable Symmetric Encryption: Designs
                                  and Challenges . . . . . . . . . . . . . 40:1--40:??
                 Yanfang Ye and   
                     Tao Li and   
             Donald Adjeroh and   
           S. Sitharama Iyengar   A Survey on Malware Detection Using Data
                                  Mining Techniques  . . . . . . . . . . . 41:1--41:??
        Jeroen J. A. Keiren and   
              Peter Fontana and   
               Rance Cleaveland   Corrections to ``A Menagerie of Timed
                                  Automata'' . . . . . . . . . . . . . . . 42:1--42:??
                   Longbing Cao   Data Science: a Comprehensive Overview   43:1--43:??
        Alessandro Acquisti and   
              Idris Adjerid and   
           Rebecca Balebako and   
          Laura Brandimarte and   
        Lorrie Faith Cranor and   
          Saranga Komanduri and   
        Pedro Giovanni Leon and   
               Norman Sadeh and   
             Florian Schaub and   
              Manya Sleeper and   
                  Yang Wang and   
                  Shomir Wilson   Nudges for Privacy and Security:
                                  Understanding and Assisting Users'
                                  Choices Online . . . . . . . . . . . . . 44:1--44:??
                     Tao Li and   
               Chunqiu Zeng and   
                 Yexi Jiang and   
                 Wubai Zhou and   
                 Liang Tang and   
                  Zheng Liu and   
                      Yue Huang   Data-Driven Techniques in Computing
                                  System Management  . . . . . . . . . . . 45:1--45:??
                  Pat Morin and   
            Wolfgang Mulzer and   
                   Tommy Reddad   Encoding Arguments . . . . . . . . . . . 46:1--46:??

ACM Computing Surveys
Volume 50, Number 4, November, 2017

                     Tim Storer   Bridging the Chasm: a Survey of Software
                                  Engineering Practice in Scientific
                                  Programming  . . . . . . . . . . . . . . 47:1--47:??
             Jones Granatyr and   
              Nardine Osman and   
           João Dias and   
Maria Augusta Silveira Netto Nunes and   
            Judith Masthoff and   
  Fabrício Enembreck and   
        Otto Robert Lessing and   
              Carles Sierra and   
            Ana Maria Paiva and   
  Edson Emílio Scalabrin   The Need for Affective Trust Applied to
                                  Trust and Reputation Models  . . . . . . 48:1--48:??
              Kiranbir Kaur and   
         DR. Sandeep Sharma and   
     DR. Karanjeet Singh Kahlon   Interoperability and Portability
                                  Approaches in Inter-Connected Clouds: a
                                  Review . . . . . . . . . . . . . . . . . 49:1--49:??
            Georgia Psychou and   
       Dimitrios Rodopoulos and   
           Mohamed M. Sabry and   
             Tobias Gemmeke and   
              David Atienza and   
             Tobias G. Noll and   
               Francky Catthoor   Classification of Resilience Techniques
                                  Against Functional Errors at Higher
                                  Abstraction Layers of Digital Systems    50:1--50:??
              Laure Soulier and   
                   Lynda Tamine   On the Collaboration Support in
                                  Information Retrieval  . . . . . . . . . 51:1--51:??
         Andreas Schoknecht and   
                 Tom Thaler and   
               Peter Fettke and   
           Andreas Oberweis and   
                      Ralf Laue   Similarity of Business Process Models
                                  --- A State-of-the-Art Analysis  . . . . 52:1--52:??
              Michael Stein and   
            Mathias Fischer and   
         Immanuel Schweizer and   
       Max Mühlhäuser   A Classification of Locality in Network
                                  Research . . . . . . . . . . . . . . . . 53:1--53:??
         Tanmoy Chakraborty and   
              Ayushi Dalmia and   
          Animesh Mukherjee and   
                  Niloy Ganguly   Metrics for Community Analysis: a Survey 54:1--54:??
           Nguyen Khoi Tran and   
              Quan Z. Sheng and   
         Muhammad Ali Babar and   
                       Lina Yao   Searching the Web of Things: State of
                                  the Art, Challenges, and Solutions . . . 55:1--55:??
  Seyed Mohammad Ghaffarian and   
           Hamid Reza Shahriari   Software Vulnerability Analysis and
                                  Discovery Using Machine-Learning and
                                  Data-Mining Techniques: a Survey . . . . 56:1--56:??
             Zain Bin Tariq and   
       Dost Muhammad Cheema and   
      Muhammad Zahir Kamran and   
              Ijaz Haider Naqvi   Non-GPS Positioning Systems: a Survey    57:1--57:??
              Yangdong Deng and   
                   Yufei Ni and   
                 Zonghui Li and   
                   Shuai Mu and   
                   Wenjun Zhang   Toward Real-Time Ray Tracing: a Survey
                                  on Hardware Acceleration and
                                  Microarchitecture Techniques . . . . . . 58:1--58:??
               Kwangwon Sun and   
                   Sukyoung Ryu   Analysis of JavaScript Programs:
                                  Challenges and Research Trends . . . . . 59:1--59:??
           Rafael Caballero and   
       Adrián Riesco and   
                    Josep Silva   A Survey of Algorithmic Debugging  . . . 60:1--60:??
            Padma Jayaraman and   
          Ranjani Parthasarathi   A Survey on Post-Silicon Functional
                                  Validation for Multicore Architectures   61:1--61:??

ACM Computing Surveys
Volume 50, Number 5, November, 2017

         Azzedine Boukerche and   
      Abdul Jabbar Siddiqui and   
             Abdelhamid Mammeri   Automated Vehicle Detection and
                                  Classification: Models, Methods, and
                                  Techniques . . . . . . . . . . . . . . . 62:1--62:??
             Changtao Zhong and   
                Nishanth Sastry   Systems Applications of Social Networks  63:1--63:??
                 Radim Baca and   
Michal Krátký and   
      Irena Holubová and   
      Martin Necaský and   
        Tomás Skopal and   
             Martin Svoboda and   
                    Sherif Sakr   Structural XML Query Processing  . . . . 64:1--64:??
              Pallavi Bagga and   
                     Rahul Hans   Mobile Agents System Security: a
                                  Systematic Survey  . . . . . . . . . . . 65:1--65:??
            Esben Andreasen and   
                 Liang Gong and   
       Anders Mòller and   
             Michael Pradel and   
           Marija Selakovic and   
                Koushik Sen and   
      Cristian-Alexandru Staicu   A Survey of Dynamic Analysis and Test
                                  Generation for JavaScript  . . . . . . . 66:1--66:??
               Niall Murray and   
       Oluwakemi A. Ademoye and   
          Gheorghita Ghinea and   
           Gabriel-Miro Muntean   A Tutorial for Olfaction-Based
                                  Multisensorial Media Application Design
                                  and Evaluation . . . . . . . . . . . . . 67:1--67:??
               Renzo Angles and   
             Marcelo Arenas and   
       Pablo Barceló and   
                Aidan Hogan and   
               Juan Reutter and   
                  Domagoj Vrgoc   Foundations of Modern Query Languages
                                  for Graph Databases  . . . . . . . . . . 68:1--68:??
           Dorien Herremans and   
            Ching-Hua Chuan and   
                    Elaine Chew   A Functional Taxonomy of Music
                                  Generation Systems . . . . . . . . . . . 69:1--69:??
        Oscar Pulido-Prieto and   
Ulises Juárez-Martínez   A Survey of Naturalistic Programming
                                  Technologies . . . . . . . . . . . . . . 70:1--70:??
             Elias Alevizos and   
     Anastasios Skarlatidis and   
          Alexander Artikis and   
             Georgios Paliouras   Probabilistic Complex Event Recognition:
                                  a Survey . . . . . . . . . . . . . . . . 71:1--71:??
     Francisco Martinez-Gil and   
              Miguel Lozano and   
Ignacio García-Fernández and   
      Fernando Fernández   Modeling, Evaluation, and Scale on
                                  Artificial Pedestrians: a Literature
                                  Review . . . . . . . . . . . . . . . . . 72:1--72:??
               Aditya Joshi and   
      Pushpak Bhattacharyya and   
                 Mark J. Carman   Automatic Sarcasm Detection: a Survey    73:1--73:??
      Pablo González and   
     Alberto Castaño and   
           Nitesh V. Chawla and   
       Juan José Del Coz   A Review on Quantification Learning  . . 74:1--74:??
       Jordi Mongay Batalla and   
       Athanasios Vasilakos and   
               Mariusz Gajewski   Secure Smart Homes: Opportunities and
                                  Challenges . . . . . . . . . . . . . . . 75:1--75:??
              Frank De Boer and   
            Vlad Serbanescu and   
         Reiner Hähnle and   
             Ludovic Henrio and   
             Justine Rochas and   
          Crystal Chang Din and   
        Einar Broch Johnsen and   
             Marjan Sirjani and   
          Ehsan Khamespanah and   
       Kiko Fernandez-Reyes and   
            Albert Mingkun Yang   A Survey of Active Object Languages  . . 76:1--76:??
               Stefan Laube and   
              Rainer Böhme   Strategic Aspects of Cyber Risk
                                  Information Sharing  . . . . . . . . . . 77:1--77:??

ACM Computing Surveys
Volume 50, Number 6, January, 2018

Eduardo Felipe Zambom Santana and   
           Ana Paula Chaves and   
       Marco Aurelio Gerosa and   
                  Fabio Kon and   
             Dejan S. Milojicic   Software Platforms for Smart Cities:
                                  Concepts, Requirements, Challenges, and
                                  a Unified Reference Architecture . . . . 78:1--78:??
                Onur Tunali and   
                  Mustafa Altun   A Survey of Fault-Tolerance Algorithms
                                  for Reconfigurable Nano-Crossbar Arrays  79:1--79:??
                  Irina Tal and   
           Gabriel-Miro Muntean   Towards Reasoning Vehicles: a Survey of
                                  Fuzzy Logic-Based Solutions in Vehicular
                                  Networks . . . . . . . . . . . . . . . . 80:1--80:??
                Xuanhua Shi and   
               Zhigao Zheng and   
              Yongluan Zhou and   
                    Hai Jin and   
                  Ligang He and   
                     Bo Liu and   
                Qiang-Sheng Hua   Graph Processing on GPUs: a Survey . . . 81:1--81:??
                 Alan Burns and   
                Robert I. Davis   A Survey of Research into Mixed
                                  Criticality Systems  . . . . . . . . . . 82:1--82:??
              Paulo Martins and   
               Leonel Sousa and   
                  Artur Mariano   A Survey on Fully Homomorphic
                                  Encryption: an Engineering Perspective   83:1--83:??
   Alejandro Torreño and   
               Eva Onaindia and   
     Antonín Komenda and   
                  Michal Stolba   Cooperative Multi-Agent Planning: a
                                  Survey . . . . . . . . . . . . . . . . . 84:1--84:??
              Pranjul Yadav and   
          Michael Steinbach and   
                Vipin Kumar and   
                   Gyorgy Simon   Mining Electronic Health Records (EHRs):
                                  a Survey . . . . . . . . . . . . . . . . 85:1--85:??
              Tempestt Neal and   
     Kalaivani Sundararajan and   
               Aneez Fatima and   
                 Yiming Yan and   
              Yingfei Xiang and   
                  Damon Woodard   Surveying Stylometry Techniques and
                                  Applications . . . . . . . . . . . . . . 86:1--86:??
             Artem Voronkov and   
        Leonardo Horn Iwaya and   
       Leonardo A. Martucci and   
                Stefan Lindskog   Systematic Literature Review on
                                  Usability of Firewall Configuration  . . 87:1--87:??
           Elif Bilge Kavun and   
        Hristina Mihajloska and   
            Tolga Yalçin   A Survey on Authenticated
                                  Encryption--ASIC Designer's Perspective  88:1--88:??
           Sebastian Werner and   
           Javier Navaridas and   
             Mikel Luján   A Survey on Optical Network-on-Chip
                                  Architectures  . . . . . . . . . . . . . 89:1--89:??
            Danial Hooshyar and   
             Moslem Yousefi and   
                   Heuiseok Lim   Data-Driven Approaches to Game Player
                                  Modeling: a Systematic Literature Review 90:1--90:??
             Yaser Mansouri and   
        Adel Nadjaran Toosi and   
                 Rajkumar Buyya   Data Storage Management in Cloud
                                  Environments: Taxonomy, Survey, and
                                  Future Directions  . . . . . . . . . . . 91:1--91:??
           Prakash Shrestha and   
                  Nitesh Saxena   An Offensive and Defensive Exposition of
                                  Wearable Computing . . . . . . . . . . . 92:1--92:??
           Niels Van Berkel and   
            Denzil Ferreira and   
              Vassilis Kostakos   The Experience Sampling Method on Mobile
                                  Devices  . . . . . . . . . . . . . . . . 93:1--93:??
                 Jundong Li and   
                Kewei Cheng and   
                Suhang Wang and   
            Fred Morstatter and   
          Robert P. Trevino and   
               Jiliang Tang and   
                       Huan Liu   Feature Selection: a Data Perspective    94:1--94:??
               Viivi Uurtio and   
    João M. Monteiro and   
                Jaz Kandola and   
          John Shawe-Taylor and   
    Delmiro Fernandez-Reyes and   
                     Juho Rousu   A Tutorial on Canonical Correlation
                                  Methods  . . . . . . . . . . . . . . . . 95:1--95:??
            Richard Skarbez and   
   Frederick P. Brooks, Jr. and   
                Mary C. Whitton   A Survey of Presence and Related
                                  Concepts . . . . . . . . . . . . . . . . 96:1--96:??
                 Suining He and   
                   Kang G. Shin   Geomagnetism for Smartphone-Based Indoor
                                  Localization: Challenges, Advances, and
                                  Comparisons  . . . . . . . . . . . . . . 97:1--97:??
               Jhonny Mertz and   
                   Ingrid Nunes   Understanding Application-Level Caching
                                  in Web Applications: a Comprehensive
                                  Introduction and Survey of
                                  State-of-the-Art Approaches  . . . . . . 98:1--98:??