Table of contents for issues of ACM Computing Surveys

Last update: Mon Mar 25 11:56:50 MDT 2024                Valid HTML 3.2!

Volume 1, Number 1, March, 1969
Volume 1, Number 2, June, 1969
Volume 1, Number 3, September, 1969
Volume 1, Number 4, December, 1969
Volume 2, Number 1, March, 1970
Volume 2, Number 2, June, 1970
Volume 2, Number 3, September, 1970
Volume 2, Number 4, December, 1970
Volume 3, Number 1, March, 1971
Volume 3, Number 2, June, 1971
Volume 3, Number 3, September, 1971
Volume 3, Number 4, December, 1971
Volume 4, Number 1, March, 1972
Volume 4, Number 2, June, 1972
Volume 4, Number 3, September, 1972
Volume 4, Number 4, December, 1972
Volume 5, Number 1, March, 1973
Volume 5, Number 2, June, 1973
Volume 5, Number 3, September, 1973
Volume 5, Number 4, December, 1973
Volume 6, Number 1, March, 1974
Volume 6, Number 2, June, 1974
Volume 6, Number 3, September, 1974
Volume 6, Number 4, December, 1974
Volume 7, Number 1, March, 1975
Volume 7, Number 2, June, 1975
Volume 7, Number 3, September, 1975
Volume 7, Number 4, December, 1975
Volume 8, Number 1, March, 1976
Volume 8, Number 2, June, 1976
Volume 8, Number 3, September, 1976
Volume 8, Number 4, December, 1976
Volume 9, Number 1, March, 1977
Volume 9, Number 2, June, 1977
Volume 9, Number 3, September, 1977
Volume 9, Number 4, December, 1977
Volume 10, Number 1, March, 1978
Volume 10, Number 2, June, 1978
Volume 10, Number 3, September, 1978
Volume 10, Number 4, December, 1978
Volume 11, Number 1, March, 1979
Volume 11, Number 2, June, 1979
Volume 11, Number 3, September, 1979
Volume 11, Number 4, December, 1979
Volume 12, Number 1, March, 1980
Volume 12, Number 2, June, 1980
Volume 12, Number 3, September, 1980
Volume 12, Number 4, December, 1980
Volume 13, Number 1, March, 1981
Volume 13, Number 2, June, 1981
Volume 13, Number 3, September, 1981
Volume 13, Number 4, December, 1981
Volume 14, Number 1, March, 1982
Volume 14, Number 2, June, 1982
Volume 14, Number 3, September, 1982
Volume 14, Number 4, December, 1982
Volume 15, Number 1, March, 1983
Volume 15, Number 2, June, 1983
Volume 15, Number 3, September, 1983
Volume 15, Number 4, December, 1983
Volume 16, Number 1, March, 1984
Volume 16, Number 2, June, 1984
Volume 16, Number 3, September, 1984
Volume 16, Number 4, December, 1984
Volume 17, Number 1, March, 1985
Volume 17, Number 2, June, 1985
Volume 17, Number 3, September, 1985
Volume 17, Number 4, December, 1985
Volume 18, Number 1, March, 1986
Volume 18, Number 2, June, 1986
Volume 18, Number 3, September, 1986
Volume 18, Number 4, December, 1986
Volume 19, Number 1, March, 1987
Volume 19, Number 2, June, 1987
Volume 19, Number 3, September, 1987
Volume 19, Number 4, December, 1987
Volume 20, Number 1, March, 1988
Volume 20, Number 2, June, 1988
Volume 20, Number 3, September, 1988
Volume 20, Number 4, December, 1988
Volume 21, Number 1, March, 1989
Volume 21, Number 2, June, 1989
Volume 21, Number 3, September, 1989
Volume 21, Number 4, December, 1989
Volume 22, Number 1, March, 1990
Volume 22, Number 2, June, 1990
Volume 22, Number 3, September, 1990
Volume 22, Number 4, December, 1990
Volume 23, Number 1, March, 1991
Volume 23, Number 2, June, 1991
Volume 23, Number 3, September, 1991
Volume 23, Number 4, December, 1991
Volume 24, Number 1, March, 1992
Volume 24, Number 2, June, 1992
Volume 24, Number 3, September, 1992
Volume 24, Number 4, December, 1992
Volume 25, Number 1, March, 1993
Volume 25, Number 2, June, 1993
Volume 25, Number 3, September, 1993
Volume 25, Number 4, December, 1993
Volume 26, Number 1, March, 1994
Volume 26, Number 2, June, 1994
Volume 26, Number 3, September, 1994
Volume 26, Number 4, December, 1994
Volume 27, Number 1, March, 1995
Volume 27, Number 2, June, 1995
Volume 27, Number 3, September, 1995
Volume 27, Number 4, December, 1995
Volume 28, Number 1, March, 1996
Volume 28, Number 2, June, 1996
Volume 28, Number 3, September, 1996
Volume 28, Number 4, December, 1996
Volume 28, Number 4es, December, 1996
Volume 29, Number 1, March, 1997
Volume 29, Number 2, June, 1997
Volume 29, Number 3, September, 1997
Volume 29, Number 4, December, 1997
Volume 30, Number 1, March, 1998
Volume 30, Number 2, June, 1998
Volume 30, Number 3, September, 1998
Volume 30, Number 3es, September, 1998
Volume 30, Number 4, December, 1998
Volume 31, Number 1, March, 1999
Volume 31, Number 2, June, 1999
Volume 31, Number 2es, June, 1999
Volume 31, Number 3, September, 1999
Volume 31, Number 3es, September, 1999
Volume 31, Number 4, December, 1999
Volume 31, Number 4es, December, 1999
Volume 32, Number 1, March, 2000
Volume 32, Number 1es, March, 2000
Volume 32, Number 2, June, 2000
Volume 32, Number 3, September, 2000
Volume 32, Number 4, December, 2000
Volume 33, Number 1, March, 2001
Volume 33, Number 2, June, 2001
Volume 33, Number 3, September, 2001
Volume 33, Number 4, December, 2001
Volume 34, Number 1, March, 2002
Volume 34, Number 2, June, 2002
Volume 34, Number 3, September, 2002
Volume 34, Number 4, December, 2002
Volume 35, Number 1, March, 2003
Volume 35, Number 2, June, 2003
Volume 35, Number 3, September, 2003
Volume 35, Number 4, December, 2003
Volume 36, Number 1, March, 2004
Volume 36, Number 2, June, 2004
Volume 36, Number 3, September, 2004
Volume 36, Number 4, December, 2004
Volume 37, Number 1, March, 2005
Volume 37, Number 2, June, 2005
Volume 37, Number 3, September, 2005
Volume 37, Number 4, December, 2005
Volume 38, Number 1, March, 2006
Volume 38, Number 2, March, 2006
Volume 38, Number 3, September, 2006
Volume 38, Number 4, December, 2006
Volume 39, Number 1, April, 2007
Volume 39, Number 2, July, 2007
Volume 39, Number 3, September, 2007
Volume 39, Number 4, November, 2007
Volume 40, Number 1, February, 2008
Volume 40, Number 2, April, 2008
Volume 40, Number 3, August, 2008
Volume 40, Number 4, October, 2008
Volume 41, Number 1, December, 2008
Volume 41, Number 2, February, 2009
Volume 41, Number 3, July, 2009
Volume 41, Number 4, October, 2009
Volume 42, Number 1, December, 2009
Volume 42, Number 2, February, 2010
Volume 42, Number 3, March, 2010
Volume 42, Number 4, June, 2010
Volume 43, Number 1, November, 2010
Volume 43, Number 2, January, 2011
Volume 43, Number 3, April, 2011
Volume 43, Number 4, October, 2011
Volume 44, Number 1, January, 2012
Volume 44, Number 2, February, 2012
Volume 44, Number 3, June, 2012
Volume 44, Number 4, August, 2012
Volume 45, Number 1, November, 2012
Volume 45, Number 2, February, 2013
Volume 45, Number 3, June, 2013
Volume 45, Number 4, August, 2013
Volume 46, Number 1, October, 2013
Volume 46, Number 2, November, 2013
Volume 46, Number 3, January, 2013
Volume 46, Number 4, March, 2013
Volume 47, Number 1, May, 2014
Volume 47, Number 2, November, 2014
Volume 47, Number 3, April, 2015
Volume 47, Number 4, July, 2015
Volume 48, Number 1, September, 2015
Volume 48, Number 2, November, 2015
Volume 48, Number 3, February, 2016
Volume 48, Number 4, May, 2016
Volume 49, Number 1, July, 2016
Volume 49, Number 2, September, 2016
Volume 49, Number 3, November, 2016
Volume 49, Number 4, February, 2017
Volume 50, Number 1, April, 2017
Volume 50, Number 2, June, 2017
Volume 50, Number 3, October, 2017
Volume 50, Number 4, November, 2017
Volume 50, Number 5, November, 2017
Volume 50, Number 6, January, 2018
Volume 51, Number 1, April, 2018
Volume 51, Number 2, June, 2018
Volume 51, Number 3, July, 2018
Volume 51, Number 4, September, 2018
Volume 51, Number 5, January, 2019
Volume 51, Number 6, February, 2019
Volume 52, Number 1, February, 2019
Volume 52, Number 2, May, 2019
Volume 52, Number 3, July, 2019
Volume 52, Number 4, September, 2019
Volume 52, Number 5, October, 2019
Volume 52, Number 6, January, 2020
Volume 53, Number 1, May, 2020
Volume 53, Number 2, July, 2020
Volume 53, Number 3, July, 2020
Volume 53, Number 4, September, 2020
Volume 53, Number 5, October, 2020
Volume 53, Number 6, February, 2021
Volume 54, Number 1, April, 2021
Volume 54, Number 2, April, 2021
Volume 54, Number 3, June, 2021
Volume 54, Number 4, July, 2021
Volume 54, Number 5, June, 2021
Volume 54, Number 6, July, 2021
Volume 54, Number 7, September, 2022
Volume 54, Number 8, November, 2022
Volume 54, Number 9, December, 2022
Volume 54, Number 10s, January, 2022
Volume 54, Number 11s, January, 2022
Volume 55, Number 1, January, 2023
Volume 55, Number 2, March, 2023
Volume 55, Number 3, April, 2023
Volume 55, Number 4, May, 2023
Volume 55, Number 5, June, 2023
Volume 55, Number 6, July, 2023
Volume 55, Number 7, July, 2023
Volume 55, Number 8, August, 2023
Volume 55, Number 9, September, 2023
Volume 55, Number 10, October, 2023
Volume 55, Number 11, November, 2023
Volume 55, Number 12, December, 2023
Volume 55, Number 13s, December, 2023
Volume 55, Number 14s, December, 2023
Volume 56, Number 1, January, 2024
Volume 56, Number 2, February, 2024
Volume 56, Number 3, March, 2024
Volume 56, Number 4, April, 2024
Volume 56, Number 5, May, 2024
Volume 56, Number 6, June, 2024


ACM Computing Surveys
Volume 1, Number 1, March, 1969

                 Aaron Finerman   An Editorial Note  . . . . . . . . . . . 1--1
                William S. Dorn   Editor's Preview\ldots . . . . . . . . . 2--5
                     Saul Rosen   Electronic Computers: a Historical
                                  Survey . . . . . . . . . . . . . . . . . 7--36
                Robert F. Rosin   Supervisory and Monitor Systems  . . . . 37--54
                    R. L. Glass   An Elementary Discussion of
                                  Compiler/Interpreter Writing . . . . . . 55--77

ACM Computing Surveys
Volume 1, Number 2, June, 1969

                William S. Dorn   Editor's Preview \ldots  . . . . . . . . 81--84
               Lance J. Hoffman   Computers and Privacy: a Survey  . . . . 85--103
                 J. M. McKinney   A Survey of Analytical Time-Sharing
                                  Models . . . . . . . . . . . . . . . . . 105--116
                 George G. Dodd   Elements of Data Management Systems  . . 117--133

ACM Computing Surveys
Volume 1, Number 3, September, 1969

                William S. Dorn   Editor's Preview \ldots  . . . . . . . . 135--138
                   M. V. Wilkes   The Growth of Interest in
                                  Microprogramming: a Literature Survey    139--145
               Azriel Rosenfeld   Picture Processing by Computer . . . . . 147--176
                William S. Dorn   Editor's Postview \ldots . . . . . . . . 177--177

ACM Computing Surveys
Volume 1, Number 4, December, 1969

                William S. Dorn   Editor's Preview \ldots  . . . . . . . . 179--182
                   William Kent   Assembler-Language Macroprogramming: a
                                  Tutorial Oriented Toward the IBM 360 . . 183--196
                Robert F. Rosin   Contemporary Concepts of
                                  Microprogramming and Emulation . . . . . 197--212
                     J. D. Aron   Information Systems in Perspective . . . 213--236


ACM Computing Surveys
Volume 2, Number 1, March, 1970

                William S. Dorn   Editor's Preview \ldots  . . . . . . . . 1--3
                  T. A. Dolotta   Functional Specifications for
                                  Typewriter-Like Time-Sharing Terminals   5--31
                    David Beech   A Structural View of PL/I  . . . . . . . 33--64
             Doron J. Cohen and   
                  C. C. Gotlieb   A List Structure Form of Grammars for
                                  Syntactic Analysis . . . . . . . . . . . 65--82

ACM Computing Surveys
Volume 2, Number 2, June, 1970

                William S. Dorn   Editor's Preview \ldots  . . . . . . . . 83--87
           Sally Yeates Sedelow   The Computer in the Humanities and Fine
                                  Arts . . . . . . . . . . . . . . . . . . 89--110
               H. Hellerman and   
               H. J. Smith, Jr.   Throughput Analysis of Some Idealized
                                  Input, Output, and Compute Overlap
                                  Configurations . . . . . . . . . . . . . 111--118
                     Ned Chapin   Flowcharting With the ANSI Standard: a
                                  Tutorial . . . . . . . . . . . . . . . . 119--146

ACM Computing Surveys
Volume 2, Number 3, September, 1970

                William S. Dorn   Editor's Preview \ldots  . . . . . . . . 147--152
               Peter J. Denning   Virtual Memory . . . . . . . . . . . . . 153--189
               M. H. MacDougall   Computer System Simulation: an
                                  Introduction . . . . . . . . . . . . . . 191--209
                 Cecil L. Smith   Digital Control of Industrial Processes  211--241
                William S. Dorn   Editor's Postview \ldots . . . . . . . . 243--243
            Albert C. Christoph   Letter to the Editor:
                                  ``Assembler-Language Macroprogramming: A
                                  Tutorial Oriented Toward the IBM 360''   243--244
                   William Kent   Letter to the Editor:
                                  ``Assembler-Language Macroprogramming: A
                                  Tutorial Oriented Toward the IBM 360''   244--244
                Robert F. Rosin   Erratum: ``Contemporary Concepts of
                                  Microprogramming and Emulation'' . . . . 244--244

ACM Computing Surveys
Volume 2, Number 4, December, 1970

                Donald E. Knuth   Von Neumann's First Computer Program . . 247--260
                  Lyle B. Smith   A Survey of Interactive Graphical
                                  Systems for Mathematics  . . . . . . . . 261--301


ACM Computing Surveys
Volume 3, Number 1, March, 1971

                 Robin Williams   A Survey of Data Structures for Computer
                                  Graphics Systems . . . . . . . . . . . . 1--21
               Caxton C. Foster   An Unclever Time-Sharing System  . . . . 23--48

ACM Computing Surveys
Volume 3, Number 2, June, 1971

                    C. E. Price   Table Lookup Techniques  . . . . . . . . 49--64
              E. G. Coffman and   
              M. J. Elphick and   
                    A. Shoshani   System Deadlocks . . . . . . . . . . . . 67--78

ACM Computing Surveys
Volume 3, Number 3, September, 1971

            Henry C. Lucas, Jr.   Performance Evaluation and Monitoring    79--91
            Andries van Dam and   
                  David E. Rice   On-line Text Editing: a Survey . . . . . 93--114
               Henry F. Ledgard   Ten Mini-Languages: a Study of Topical
                                  Issues in Programming Languages  . . . . 115--146

ACM Computing Surveys
Volume 3, Number 4, December, 1971

                   W. A. Martin   Sorting  . . . . . . . . . . . . . . . . 147--174
               Peter J. Denning   Third Generation Computer Systems  . . . 175--216


ACM Computing Surveys
Volume 4, Number 1, March, 1972

               Peter J. Denning   A Note on Paging Drum Efficiency . . . . 1--3
                   Peter Wegner   The Vienna Definition Language . . . . . 5--63

ACM Computing Surveys
Volume 4, Number 2, June, 1972

             W. R. Schucany and   
             Paul D. Minton and   
        B. Stanley Shannon, Jr.   A Survey of Statistical Packages . . . . 65--79
              J. Nievergelt and   
                   J. C. Farrar   What Machines Can and Cannot Do  . . . . 81--96
             Bernard Elspas and   
             Karl N. Levitt and   
       Richard J. Waldinger and   
                Abraham Waksman   An Assessment of Techniques for Proving
                                  Program Correctness  . . . . . . . . . . 97--147

ACM Computing Surveys
Volume 4, Number 3, September, 1972

                  Eric A. Weiss   An Appreciation  . . . . . . . . . . . . 147--147
               Leon Presser and   
                  John R. White   Linkers and Loaders  . . . . . . . . . . 149--167
             C. A. R. Hoare and   
               D. C. S. Allison   Incomputability  . . . . . . . . . . . . 169--178
                Richard C. Holt   Some Deadlock Properties of Computer
                                  Systems  . . . . . . . . . . . . . . . . 179--196

ACM Computing Surveys
Volume 4, Number 4, December, 1972

              Byron W. Stutzman   Data Communication Control Procedures    197--220
                Bruce H. Barnes   A Programmer's View of Automata  . . . . 221--239
         Theodore C. Willoughby   Staffing the MIS Function  . . . . . . . 241--259


ACM Computing Surveys
Volume 5, Number 1, March, 1973

            Elliott I. Organick   Editorial Policy \ldots  . . . . . . . . 1--3
              J. J. Horning and   
                     B. Randell   Process Structuring  . . . . . . . . . . 5--30
                     J. L. Baer   A Survey of Some Theoretical Aspects of
                                  Multiprocessing  . . . . . . . . . . . . 31--80

ACM Computing Surveys
Volume 5, Number 2, June, 1973

               Azriel Rosenfeld   Progress in Picture Processing: 1969--71 81--108
               Udo W. Pooch and   
                      Al Nieder   A Survey of Indexing Techniques for
                                  Sparse Matrices  . . . . . . . . . . . . 109--133

ACM Computing Surveys
Volume 5, Number 3, September, 1973

               William W. White   A Status Report on Computing Algorithms
                                  for Mathematical Programming . . . . . . 135--166
               J. Daniel Couger   Evolution of Business System Analysis
                                  Techniques . . . . . . . . . . . . . . . 167--198

ACM Computing Surveys
Volume 5, Number 4, December, 1973

                 E. M. Timmreck   Computer Selection Methodology . . . . . 200--222
              Per Brinch Hansen   Concurrent Programming Concepts  . . . . 223--245


ACM Computing Surveys
Volume 6, Number 1, March, 1974

         Ivan E. Sutherland and   
          Robert F. Sproull and   
           Robert A. Schumacker   A Characterization of Ten Hidden-Surface
                                  Algorithms . . . . . . . . . . . . . . . 1--55
                Herbert Freeman   Computer Processing of Line-Drawing
                                  Images . . . . . . . . . . . . . . . . . 57--97

ACM Computing Surveys
Volume 6, Number 2, June, 1974

                  A. V. Aho and   
                  S. C. Johnson   LR Parsing . . . . . . . . . . . . . . . 99--124
                   Udo W. Pooch   Translation of Decision Tables . . . . . 125--151

ACM Computing Surveys
Volume 6, Number 3, September, 1974

           Daniel G. Bobrow and   
                Bertram Raphael   New Programming Languages for Artificial
                                  Intelligence Research  . . . . . . . . . 153--174
            Dennis G. Severance   Identifier Search Mechanisms: a Survey
                                  and Generalized Model  . . . . . . . . . 175--194
                  J. Nievergelt   Binary Search Trees and File
                                  Organisation . . . . . . . . . . . . . . 195--207

ACM Computing Surveys
Volume 6, Number 4, December, 1974

               Peter J. Denning   Guest Editor's Overview \ldots . . . . . 209--211
                    P. J. Brown   Programming and Documenting Software
                                  Projects . . . . . . . . . . . . . . . . 213--220
                     J. M. Yohe   An Overview of Programming Practices . . 221--245
                  Niklaus Wirth   On the Composition of Well-Structured
                                  Programs . . . . . . . . . . . . . . . . 247--259
                Donald E. Knuth   Structured Programming with go to
                                  Statements . . . . . . . . . . . . . . . 261--301
         Brian W. Kernighan and   
                  P. J. Plauger   Programming Style: Examples and
                                  Counterexamples  . . . . . . . . . . . . 303--319
                   Udo W. Pooch   Corrigendum: ``Translation of Decision
                                  Tables'' . . . . . . . . . . . . . . . . 321--321


ACM Computing Surveys
Volume 7, Number 1, March, 1975

            Elliott I. Organick   Editor's Overview  . . . . . . . . . . . 1--1
               W. D. Maurer and   
                    T. G. Lewis   Hash Table Methods . . . . . . . . . . . 5--19
                   Leon Presser   Multiprogramming Coordination  . . . . . 21--44
               Calvin N. Mooers   Computer Software and Copyright  . . . . 45--72

ACM Computing Surveys
Volume 7, Number 2, June, 1975

              John W. Boyse and   
                  David R. Warn   A Straightforward Model for Computer
                                  Performance Prediction . . . . . . . . . 73--93
                  Ira W. Cotton   Microeconomics and the Market for
                                  Computer Services  . . . . . . . . . . . 95--111

ACM Computing Surveys
Volume 7, Number 3, September, 1975

                    J. C. Huang   An Approach to Program Testing . . . . . 113--128
       Stephen R. Kimbleton and   
           G. Michael Schneider   Computer Communication Networks:
                                  Approaches, Objectives, and Performance
                                  Considerations . . . . . . . . . . . . . 129--173

ACM Computing Surveys
Volume 7, Number 4, December, 1975

            Elliott I. Organick   Editorial Policy Update  . . . . . . . . 173--173
                 Suhas S. Patil   Guest Editor's Note \ldots . . . . . . . 175--175
               Robert M. Keller   Look-Ahead Processors  . . . . . . . . . 177--195
         George A. Anderson and   
              E. Douglas Jensen   Computer Interconnection Structures:
                                  Taxonomy, Characteristics, and Examples  197--213
         Kenneth J. Thurber and   
                   Leon D. Wald   Associative and Parallel Processors  . . 215--255
            Elliott I. Organick   Editor's Note  . . . . . . . . . . . . . 257--257
                   Leon Presser   Corrigendum: ``Multiprogramming
                                  Coordination'' . . . . . . . . . . . . . 257--257


ACM Computing Surveys
Volume 8, Number 1, March, 1976

                   E. H. Sibley   Guest Editor's Introduction: The
                                  Development of Data-Base Technology  . . 1--5
               James P. Fry and   
                Edgar H. Sibley   Evolution of Data-Base Management
                                  Systems  . . . . . . . . . . . . . . . . 7--42
           Donald D. Chamberlin   Relational Data-Base Management Systems  43--66
           Robert W. Taylor and   
               Randall L. Frank   CODASYL Data-Base Management Systems . . 67--103
          D. C. Tsichritzis and   
                F. H. Lochovsky   Hierarchical Data-Base Management: a
                                  Survey . . . . . . . . . . . . . . . . . 105--123
            Ann S. Michaels and   
           Benjamin Mittman and   
              C. Robert Carlson   A Comparison of the Relational and
                                  CODASYL Approaches to Data-Base
                                  Management . . . . . . . . . . . . . . . 125--151

ACM Computing Surveys
Volume 8, Number 2, June, 1976

            Elliott I. Organick   Editorial Overview . . . . . . . . . . . 153--153
            Andrew S. Tanenbaum   A Tutorial on Algol 68 . . . . . . . . . 155--190
           Michael Marcotty and   
           Henry F. Ledgard and   
             Gregor V. Bochmann   A Sampler of Formal Definitions  . . . . 191--276
                S. S. Reddi and   
                  E. A. Feustel   A Conceptual Framework for Computer
                                  Architecture . . . . . . . . . . . . . . 277--300

ACM Computing Surveys
Volume 8, Number 3, September, 1976

                 Raymond T. Yeh   Guest Editorial \ldots . . . . . . . . . 301--303
           Lloyd D. Fosdick and   
              Leon J. Osterweil   Data Flow Analysis in Software
                                  Reliability  . . . . . . . . . . . . . . 305--330
          Sidney L. Hantler and   
                  James C. King   An Introduction to Proving the
                                  Correctness of Programs  . . . . . . . . 331--353

ACM Computing Surveys
Volume 8, Number 4, December, 1976

                 Raymond T. Yeh   Guest Editorial \ldots . . . . . . . . . 355--357
               Peter J. Denning   Fault Tolerant Operating Systems . . . . 359--389
                       H. Hecht   Fault-Tolerant Software for Real-Time
                                  Applications . . . . . . . . . . . . . . 391--407
             Theodore A. Linden   Operating System Structures to Support
                                  Security and Reliable Software . . . . . 409--445


ACM Computing Surveys
Volume 9, Number 1, March, 1977

                   Tse-Yun Feng   Guest Editorial: an Overview of Parallel
                                  Processors and Processing  . . . . . . . 1--2
                  S. S. Yau and   
                     H. S. Fung   Associative Processor Architecture --- a
                                  Survey . . . . . . . . . . . . . . . . . 3--27
                  David J. Kuck   A Survey of Parallel Machine
                                  Organization and Programming . . . . . . 29--59
          C. V. Ramamoorthy and   
                       H. F. Li   Pipeline Architecture  . . . . . . . . . 61--102
          Philip H. Enslow, Jr.   Multiprocessor Organization --- a Survey 103--129

ACM Computing Surveys
Volume 9, Number 2, June, 1977

               Peter J. Denning   About This Issue \ldots  . . . . . . . . 131--131
               Peter J. Denning   Editorial Policy . . . . . . . . . . . . 133--135
               Robert Sedgewick   Permutation Generation Methods . . . . . 137--164
                  Roy Levin and   
               Peter J. Denning   Surveyor's Forum: an Amplification on
                                  Hydra's Capabilities . . . . . . . . . . 165--165
                  James Donahue   Surveyor's Forum: a Criticism of Sampler 166--167
           Michael Marcotty and   
               Henry F. Ledgard   Surveyor's Forum: a Criticism of Sampler 167--168
           Michael Marcotty and   
           Henry F. Ledgard and   
             Gregor V. Bochmann   Corrigendum: ``A Sampler of Formal
                                  Definitions''  . . . . . . . . . . . . . 168--168

ACM Computing Surveys
Volume 9, Number 3, September, 1977

               Peter J. Denning   About This Issue \ldots  . . . . . . . . 171--172
         Mario J. Gonzalez, Jr.   Deterministic Processor Scheduling . . . 173--204
              Lester Lipsky and   
                   J. D. Church   Applications of a Queueing Network Model
                                  for a Computer System  . . . . . . . . . 205--221
              James L. Peterson   Petri Nets . . . . . . . . . . . . . . . 223--252
                   J. K. Iliffe   Surveyor's Forum: an Error Recovery  . . 253--254
                 Jack B. Dennis   Surveyor's Forum: An Error Recovery  . . 254--254
               Peter J. Denning   Surveyor's Forum: an Error Recovery  . . 254--255
            Andrew S. Tanenbaum   Corrigenda: ``A Tutorial on Algol 68''   255--256

ACM Computing Surveys
Volume 9, Number 4, December, 1977

               Peter J. Denning   About This Issue \ldots  . . . . . . . . 257--257
            D. G. Severance and   
                   J. V. Carlis   A Practical Approach to Selecting Record
                                  Access Paths . . . . . . . . . . . . . . 259--272
    William M. Taggart, Jr. and   
                Marvin O. Tharp   A Survey of Information Requirements
                                  Analysis Techniques  . . . . . . . . . . 273--290
                    Bruce Weide   A Survey of Analysis Techniques for
                                  Discrete Algorithms  . . . . . . . . . . 291--313
               Robert Sedgewick   Corrigenda: ``Permutation Generation
                                  Methods''  . . . . . . . . . . . . . . . 314--314
              Thomas W. Parsons   Surveyor's Forum: a Forgotten Generation
                                  of Permutations  . . . . . . . . . . . . 315--315
                I. R. MacCallum   Surveyor's Forum: a Forgotten Generation
                                  of Permutations  . . . . . . . . . . . . 316--317


ACM Computing Surveys
Volume 10, Number 1, March, 1978

               Peter J. Denning   About This Issue \ldots  . . . . . . . . 1--2
            Ann Fitzsimmons and   
                       Tom Love   A Review and Evaluation of Software
                                  Science  . . . . . . . . . . . . . . . . 3--18
           John Leslie King and   
              Edward L. Schrems   Cost-Benefit Analysis in Information
                                  Systems Development and Operation  . . . 19--34
                 Erik Sandewall   Programming in an Interactive
                                  Environment: the ``\sc Lisp'' Experience 35--71
              Ronald J. Srodawa   Positive Experiences with a
                                  Multiprocessing System . . . . . . . . . 73--82
        Montgomery Phister, Jr.   Surveyor's Forum: Putting Costs Through
                                  Effectively  . . . . . . . . . . . . . . 83--83
              Lester Lipsky and   
                James D. Church   Surveyor's Forum: Putting Costs Through
                                  Effectively: Author's Reply  . . . . . . 83--84
              H. J. Genrich and   
              P. S. Thiagarajan   Surveyor's Forum: Net Progress . . . . . 84--85
                 James Peterson   Surveyor's Forum: Net Progress: Author's
                                  Reply  . . . . . . . . . . . . . . . . . 85--85

ACM Computing Surveys
Volume 10, Number 2, June, 1978

               Peter J. Denning   About This Issue \ldots  . . . . . . . . 87--87
               Peter J. Denning   Editorial Policy . . . . . . . . . . . . 89--92
                N. C. Davis and   
                  S. E. Goodman   The Soviet Bloc's Unified System of
                                  Computers  . . . . . . . . . . . . . . . 93--122
                 B. Randell and   
                  P. A. Lee and   
                P. C. Treleaven   Reliability Issues in Computing System
                                  Design . . . . . . . . . . . . . . . . . 123--165
         Joost S. M. Verhofstad   Recovery Techniques for Database Systems 167--195
            Marvin V. Zelkowitz   Perspectives in Software Engineering . . 197--216
                  Nathan Relles   Surveyor's Forum: Devising the Rhetoric
                                  of Rhetorical Devices  . . . . . . . . . 217--217

ACM Computing Surveys
Volume 10, Number 3, September, 1978

                G. Scott Graham   Guest Editor's Overview\ldots Queuing
                                  Network Models of Computer System
                                  Performance  . . . . . . . . . . . . . . 219--224
           Peter J. Denning and   
               Jeffrey P. Buzen   The Operational Analysis of Queueing
                                  Network Models . . . . . . . . . . . . . 225--261
               Clifford A. Rose   A Measurement Procedure for Queueing
                                  Network Models of Computer Systems . . . 263--280
             K. Mani Chandy and   
               Charles H. Sauer   Approximate Methods for Analyzing
                                  Queueing Network Models of Computing
                                  Systems  . . . . . . . . . . . . . . . . 281--317
               Jeffrey P. Buzen   A Queueing Network Model of MVS  . . . . 319--331
                        Y. Bard   The VM/370 Performance Predictor . . . . 333--342
                     J. W. Wong   Queueing Network Modeling of Computer
                                  Communication Networks . . . . . . . . . 343--351
               Richard R. Muntz   Queueing Networks: a Critique of the
                                  State of the Art and Directions for the
                                  Future . . . . . . . . . . . . . . . . . 353--359
                  John Gaschnig   Surveyor's Forum: Experimental Analysis
                                  Discretely Done  . . . . . . . . . . . . 361--361
                 Bruce W. Weide   Surveyor's Forum: Experimental Analysis
                                  Discretely Done: Author's Reply  . . . . 361--362

ACM Computing Surveys
Volume 10, Number 4, December, 1978

               Peter J. Denning   About This Issue \ldots  . . . . . . . . 363--364
          William M. Newman and   
                Andries van Dam   Recent Efforts Towards Graphics
                                  Standardization  . . . . . . . . . . . . 365--380
          James C. Michener and   
                Andries van Dam   Functional Overview of the Core System
                                  with Glossary  . . . . . . . . . . . . . 381--387
         R. Daniel Bergeron and   
              Peter R. Bono and   
                 James D. Foley   Graphics Programming Using the Core
                                  System . . . . . . . . . . . . . . . . . 389--443
          James C. Michener and   
                 James D. Foley   Some Major Issues in the Design of the
                                  Core Graphics System . . . . . . . . . . 445--463
             Ingrid Carlbom and   
                Joseph Paciorek   Planar Geometric Projections and Viewing
                                  Transformations  . . . . . . . . . . . . 465--502
                Paul B. Moranda   Surveyor's Forum: Is Software Science
                                  Hard?  . . . . . . . . . . . . . . . . . 503--504
                    T. P. Baker   Surveyor's Forum: Is Software Science
                                  Hard?  . . . . . . . . . . . . . . . . . 504--504
            Ann Fitzsimmons and   
                       Tom Love   Surveyor's Forum: Is Software Science
                                  Hard?  . . . . . . . . . . . . . . . . . 504--505
            Richard M. Stallman   Surveyor's Forum: Structured Editing
                                  with a Lisp  . . . . . . . . . . . . . . 505--507
                 Erik Sandewall   Surveyor's Forum: Structured Editing
                                  with a \sc Lisp  . . . . . . . . . . . . 507--508
          C. V. Ramamoorthy and   
                       H. F. Li   Corrigenda: ``Pipeline Architecture''    508--508


ACM Computing Surveys
Volume 11, Number 1, March, 1979

               Peter J. Denning   About This Issue \ldots  . . . . . . . . 1--1
                    Dan Bernard   Management Issues in Cooperative
                                  Computing  . . . . . . . . . . . . . . . 3--17
           Norman I. Badler and   
             Stephen W. Smoliar   Digital Representations of Human
                                  Movement . . . . . . . . . . . . . . . . 19--38
               Subrata Dasgupta   The Organization of Microprogram Stores  39--65
               Edward A. Bender   Surveyor's Forum: a Recurrent Problem    67--68
                 Bruce W. Weide   Surveyor's Forum: a Recurrent Problem    68--68
               Irving K. Wendel   Surveyor's Forum: The Real Costs of
                                  Software . . . . . . . . . . . . . . . . 68--68
               Marvin Zelkowitz   Surveyor's Forum: The Real Costs of
                                  Software . . . . . . . . . . . . . . . . 69--69
                  Yonathan Bard   Surveyor's Forum: Stochastic or
                                  Operational? . . . . . . . . . . . . . . 69--70
           Jeffrey P. Buzen and   
               Peter J. Denning   Surveyor's Forum: Stochastic or
                                  Operational? . . . . . . . . . . . . . . 70--70
               Jeffrey P. Buzen   Surveyor's Forum: a Predictable Problem  71--72
               Richard R. Muntz   Surveyor's Forum: a Predictable Problem  72--72

ACM Computing Surveys
Volume 11, Number 2, June, 1979

                 Adele Goldberg   About This Issue \ldots  . . . . . . . . 73--74
                 Adele Goldberg   Editorial Policy . . . . . . . . . . . . 75--78
                  Jacques Cohen   Non-De\-ter\-min\-is\-tic Algorithms . . 79--94
        Francisco Walter Molina   A Survey of Resource Directive
                                  Decomposition in Mathematical
                                  Programming  . . . . . . . . . . . . . . 95--104
             Lynn J. McKell and   
            James V. Hansen and   
              Lester E. Heitger   Charging for Computing Resources . . . . 105--120
                  Douglas Comer   Ubiquitous B-Tree  . . . . . . . . . . . 121--137
                George Nagy and   
                   Sharad Wagle   Geographic Data Processing . . . . . . . 139--181

ACM Computing Surveys
Volume 11, Number 3, September, 1979

                 Adele Goldberg   About This Issue \ldots  . . . . . . . . 183--183
                        Won Kim   Relational Database Systems  . . . . . . 187--211
                     A. G. Dale   Database Management Systems Development
                                  in the USSR  . . . . . . . . . . . . . . 213--226
         Dorothy E. Denning and   
               Peter J. Denning   Data Security  . . . . . . . . . . . . . 227--249
                Siba N. Mohanty   Models and Measurements for Quality
                                  Assessment of Software . . . . . . . . . 251--275
                Robert Fenichel   Surveyor's Forum: Heads I Win, Tails You
                                  Lose . . . . . . . . . . . . . . . . . . 277--277
               Stuart H. Zweben   Surveyor's Forum: Heads I Win, Tails You
                                  Lose . . . . . . . . . . . . . . . . . . 277--278
                  H. Christiaen   Surveyor's Forum: Projecting Problems    278--279
                 Ingrid Carlbom   Surveyor's Forum: Projecting Problems    279--280
             Ingrid Carlbom and   
                Joseph Paciorek   Corrigenda: ``Geometric Projection and
                                  Viewing Transformations''  . . . . . . . 280--280

ACM Computing Surveys
Volume 11, Number 4, December, 1979

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 281--281
               Peter J. Denning   Editor's Overview --- Special Section on
                                  Data Encryption  . . . . . . . . . . . . 283--283
                 Abraham Lempel   Cryptology in Transition . . . . . . . . 285--303
            Gustavus J. Simmons   Symmetric and Asymmetric Encryption  . . 305--330
            Gerald J. Popek and   
               Charles S. Kline   Encryption and Secure Computer Networks  331--356
          Herbert S. Bright and   
              Richard L. Enison   Quasi-Random Number Sequences from a
                                  Long-Period TLP Generator with Remarks
                                  on Application to Cryptography . . . . . 357--370
             Gary H. Sockut and   
             Robert P. Goldberg   Database Reorganization --- Principles
                                  and Practice . . . . . . . . . . . . . . 371--395
          Jon Louis Bentley and   
             Jerome H. Friedman   Data Structures for Range Searching  . . 397--409
               David S. Alberts   Surveyor's Forum: a Question of
                                  Transition . . . . . . . . . . . . . . . 411--411
            Marvin V. Zelkowitz   Surveyor's Forum: a Question of
                                  Transition . . . . . . . . . . . . . . . 411--412
                  Douglas Comer   Surveyor's Forum: The Tree Branches  . . 412--412
                Maylun Buck-Lew   Surveyor's Forum: a Dance Prelude  . . . 412--413


ACM Computing Surveys
Volume 12, Number 1, March, 1980

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 1--2
              Fred J. Maryanski   Backend Database Systems . . . . . . . . 3--25
          Clarence A. Ellis and   
                   Gary J. Nutt   Office Information Systems and Computer
                                  Science  . . . . . . . . . . . . . . . . 27--60
                      Rob Kling   Social Analyses of Computing:
                                  Theoretical Perspectives in Recent
                                  Empirical Research . . . . . . . . . . . 61--110
                E. B. Fernandez   Surveyor's Forum: Related Information    111--112
                        Won Kim   Surveyor's Forum: Related Information    112--112
                Oris D. Friesen   Surveyor's Forum: Related Information    112--113

ACM Computing Surveys
Volume 12, Number 2, June, 1980

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 115--116
              Adele J. Goldberg   Editorial Policy . . . . . . . . . . . . 117--120
             Anita K. Jones and   
                  Peter Schwarz   Experience Using Multiprocessor Systems
                                  --- a Status Report  . . . . . . . . . . 121--165
                     C. K. Wong   Minimizing Expected Head Movement in
                                  One-Dimensional and Two-Dimensional Mass
                                  Storage Systems  . . . . . . . . . . . . 167--178
             Toby J. Teorey and   
                   James P. Fry   The Logical Record Access Approach to
                                  Database Design  . . . . . . . . . . . . 179--211
               Lee D. Erman and   
       Frederick Hayes-Roth and   
           Victor R. Lesser and   
                   D. Raj Reddy   The Hearsay-II Speech-Understanding
                                  System: Integrating Knowledge to Resolve
                                  Uncertainty  . . . . . . . . . . . . . . 213--253
                   Stanley Dunn   Surveyor's Forum: Working on
                                  Interpretations  . . . . . . . . . . . . 255--255
                   Siba Mohanty   Surveyor's Forum: Working on
                                  Interpretations  . . . . . . . . . . . . 256--256

ACM Computing Surveys
Volume 12, Number 3, September, 1980

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 257--258
                  Stanley Habib   Special Section on Microprogramming  . . 259--259
             David Landskov and   
             Scott Davidson and   
              Bruce Shriver and   
             Patrick W. Mallett   Local Microcode Compaction Techniques    261--294
               Subrata Dasgupta   Some Aspects of High-Level
                                  Microprogramming . . . . . . . . . . . . 295--323
                Wesley A. Clark   From Electron Mobility to Logical
                                  Structure: a View of Integrated Circuits 325--356
                  Walter Wilson   Surveyor's Forum: Determining a Search   357--358
                  Jacques Cohen   Surveyor's Forum: Determining a Search   358--358

ACM Computing Surveys
Volume 12, Number 4, December, 1980

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 359--360
                C. S. Wetherell   Probabilistic Languages: a Review and
                                  Some Open Questions  . . . . . . . . . . 361--379
         Patrick A. V. Hall and   
               Geoff R. Dowling   Approximate String Matching  . . . . . . 381--402
                     R. S. Bird   Tabulation Techniques for Recursive
                                  Programs . . . . . . . . . . . . . . . . 403--417
               George S. Lueker   Some Techniques for Solving Recurrences  419--436
       Aristides A. G. Requicha   Representations for Rigid Solids:
                                  Theory, Methods, and Systems . . . . . . 437--464
             Toby J. Teorey and   
                   James P. Fry   Corrigenda: ``The Logical Record Access
                                  Approach to Database Design''  . . . . . 465--465


ACM Computing Surveys
Volume 13, Number 1, March, 1981

                Thomas P. Moran   Guest Editor's Introduction: an Applied
                                  Psychology of the User . . . . . . . . . 1--11
                Phyllis Reisner   Human Factors Studies of Database Query
                                  Languages: a Survey and Assessment . . . 13--31
            David W. Embley and   
                    George Nagy   Behavioral Aspects of Text Editors . . . 33--70
               William B. Rouse   Human-Computer Interaction in the
                                  Control of Dynamic Systems . . . . . . . 71--99
                    B. A. Sheil   The Psychological Study of Programming   101--120
               Richard E. Mayer   The Psychology of How Novices Learn
                                  Computer Programming . . . . . . . . . . 121--141

ACM Computing Surveys
Volume 13, Number 2, June, 1981

                 Adele Goldberg   About This Issue \ldots  . . . . . . . . 143--144
                 Adele Goldberg   Editorial Policy . . . . . . . . . . . . 145--148
               Walter H. Kohler   A Survey of Techniques for
                                  Synchronization and Recovery in
                                  Decentralized Computer Systems . . . . . 149--183
        Philip A. Bernstein and   
                 Nathan Goodman   Concurrency Control in Distributed
                                  Database Systems . . . . . . . . . . . . 185--221
                   Jim Gray and   
               Paul McJones and   
               Mike Blasgen and   
              Bruce Lindsay and   
              Raymond Lorie and   
                  Tom Price and   
             Franco Putzolu and   
                 Irving Traiger   The Recovery Manager of the System R
                                  Database Manager . . . . . . . . . . . . 223--242
                     R. S. Bird   Surveyor's Forum: a Recurring Bug  . . . 243--243
                 Helmut Richter   Surveyor's Forum: a Recurring Bug  . . . 243--243

ACM Computing Surveys
Volume 13, Number 3, September, 1981

                 Adele Goldberg   About This Issue \ldots  . . . . . . . . 245--245
               Carl E. Landwehr   Formal Models for Computer Security  . . 247--278
     Maureen Harris Cheheyl and   
              Morrie Gasser and   
             George A. Huff and   
             Jonathan K. Millen   Verifying Security . . . . . . . . . . . 279--339
                  Jacques Cohen   Garbage Collection of Linked Data
                                  Structures . . . . . . . . . . . . . . . 341--367
       Aristides A. G. Requicha   Surveyor's Forum: an Update on
                                  SynthaVision . . . . . . . . . . . . . . 369--369
           Herbert A. Steinberg   Surveyor's Forum: an Update on
                                  SynthaVision . . . . . . . . . . . . . . 369--369
              Douglas J. Keenan   Surveyor's Forum: Generating Solutions   370--370
               George S. Lueker   Surveyor's Forum: Generating Solutions   370--370

ACM Computing Surveys
Volume 13, Number 4, December, 1981

                 Adele Goldberg   About This Issue \ldots  . . . . . . . . 371--372
             Narendra Ahuja and   
                B. J. Schachter   Image Models . . . . . . . . . . . . . . 373--397
              Sargur N. Srihari   Representation of Three-Dimensional
                                  Digital Images . . . . . . . . . . . . . 399--424
            Edward H. Frank and   
              Robert F. Sproull   Testing and Debugging Custom Integrated
                                  Circuits . . . . . . . . . . . . . . . . 425--451
            Andrew S. Tanenbaum   Network Protocols  . . . . . . . . . . . 453--489
           Christiane Floyd and   
              Reinhard Keil and   
               Erhard Nullmeier   Surveyor's Forum: Augmentation or
                                  Dehumanization?  . . . . . . . . . . . . 491--492
                Thomas P. Moran   Surveyor's Forum: Augmentation or
                                  Dehumanization?  . . . . . . . . . . . . 492--493
                 Bruce Leverett   Surveyor's Forum: Interpreting
                                  Experimental Data  . . . . . . . . . . . 493--494
            David W. Embley and   
                    George Nagy   Surveyor's Forum: Interpreting
                                  Experimental Data  . . . . . . . . . . . 494--494


ACM Computing Surveys
Volume 14, Number 1, March, 1982

                 Adele Goldberg   About This Issue \ldots  . . . . . . . . 1--2
                  Michael Brady   Computational Approaches to Image
                                  Understanding  . . . . . . . . . . . . . 3--71
              Alan R. Feuer and   
               Narain H. Gehani   Comparison of the Programming Languages
                                  C and Pascal . . . . . . . . . . . . . . 73--92
        Philip C. Treleaven and   
       David R. Brownbridge and   
             Richard P. Hopkins   Data-Driven and Demand-Driven Computer
                                  Architecture . . . . . . . . . . . . . . 93--143
                  David P. Reed   Surveyor's Forum: Recovering an Error    145--146
               Walter H. Kohler   Surveyor's Forum: Recovering an Error    146--147

ACM Computing Surveys
Volume 14, Number 2, June, 1982

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 149--150
              Adele J. Goldberg   Editorial Policy . . . . . . . . . . . . 151--157
         W. Richards Adrion and   
         Martha A. Branstad and   
            John C. Cherniavsky   Validation, Verification, and Testing of
                                  Computer Software  . . . . . . . . . . . 159--192
              William E. Howden   Validation of Scientific Programs  . . . 193--227
          Douglas D. Dunlop and   
               Victor R. Basili   A Comparative Analysis of Functional
                                  Correctness  . . . . . . . . . . . . . . 229--244
             Frank W. Allen and   
          Mary E. S. Loomis and   
             Michael V. Mannino   The Integrated Dictionary/Directory
                                  System . . . . . . . . . . . . . . . . . 245--286
          Lawrence W. Dowdy and   
              Derrell V. Foster   Comparative Models of the File
                                  Assignment Problem . . . . . . . . . . . 287--313
                   Heinz Bender   Surveyor's Forum: Technical Transactions 315--316
                  David Gifford   Surveyor's Forum: Technical Transactions 316--316
           Philip Bernstein and   
                 Nathan Goodman   Surveyor's Forum: Technical Transactions 317--318

ACM Computing Surveys
Volume 14, Number 3, September, 1982

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 319--320
           Norman Meyrowitz and   
                Andries Van Dam   Interactive Editing Systems: Part I  . . 321--352
           Norman Meyrowitz and   
                Andries van Dam   Interactive Editing Systems: Part II . . 353--415
             Richard Furuta and   
           Jeffrey Scofield and   
                      Alan Shaw   Document Formatting Systems: Survey,
                                  Concepts, and Issues . . . . . . . . . . 417--472
                 Alan Jay Smith   Cache Memories . . . . . . . . . . . . . 473--530

ACM Computing Surveys
Volume 14, Number 4, December, 1982

              Adele J. Goldberg   About This Issue \ldots  . . . . . . . . 531--532
             T. A. Marsland and   
                    M. Campbell   Parallel Search of Strongly Ordered Game
                                  Trees  . . . . . . . . . . . . . . . . . 533--551
         Stephen T. Barnard and   
             Martin A. Fischler   Computational Stereo . . . . . . . . . . 553--572
        Mahadevan Ganapathi and   
         Charles N. Fischer and   
               John L. Hennessy   Retargetable Compiler Code Generation    573--592
            Bernard M. E. Moret   Decision Trees and Diagrams  . . . . . . 593--623
              James L. Peterson   Surveyor's Forum: Idiomatic Programming  625--625
              Alan R. Feuer and   
               Narain H. Gehani   Surveyor's Forum: Idiomatic Programming  625--626


ACM Computing Surveys
Volume 15, Number 1, March, 1983

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 1--2
         Gregory R. Andrews and   
              Fred B. Schneider   Concepts and Notations for Concurrent
                                  Programming  . . . . . . . . . . . . . . 3--43
             Salvatore T. March   Techniques for Structuring Database
                                  Records  . . . . . . . . . . . . . . . . 45--79
    J. (Yiannis) G. Kollias and   
           Michalis Hatzopoulos   Surveyor's Forum: The File Assignment
                                  Problem  . . . . . . . . . . . . . . . . 81--82
          Lawrence W. Dowdy and   
              Derrell V. Foster   Surveyor's Forum: The File Assignment
                                  Problem  . . . . . . . . . . . . . . . . 82--82
                  Govind Sharma   Surveyor's Forum: Image Models . . . . . 83--84
             Narendra Ahuja and   
                B. J. Schachter   Surveyor's Forum: Image Models . . . . . 84--84

ACM Computing Surveys
Volume 15, Number 2, June, 1983

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 85--86
           Anthony I. Wasserman   Editorial Policy . . . . . . . . . . . . 87--94
            George Broomell and   
                J. Robert Heath   Classification Categories and Historical
                                  Development of Circuit Switching
                                  Topologies . . . . . . . . . . . . . . . 95--133
          Victor L. Voydock and   
                Stephen T. Kent   Security Mechanisms in High-Level
                                  Network Protocols  . . . . . . . . . . . 135--171

ACM Computing Surveys
Volume 15, Number 3, September, 1983

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 173--174
            Magdy S. Abadir and   
             Hassan K. Reghbati   Functional Testing of Semiconductor
                                  Random Access Memories . . . . . . . . . 175--198
                 H. Partsch and   
           R. Steinbrüggen   Program Transformation Systems . . . . . 199--236
               Dana Angluin and   
                  Carl H. Smith   Inductive Inference: Theory and Methods  237--269
               Bennet P. Lientz   Issues in Software Maintenance . . . . . 271--278
            William A. Wulf and   
               Joe Newcomer and   
             Bruce Leverett and   
               Rick Cattell and   
                   Paul Knueven   Surveyor's Forum: Retargetable Code
                                  Generators . . . . . . . . . . . . . . . 279--280
               M. Ganapathi and   
             J. L. Hennessy and   
                  C. N. Fischer   Surveyor's Forum: Retargetable Code
                                  Generators . . . . . . . . . . . . . . . 280--281
          Christopher W. Fraser   Surveyor's Forum: Retargetable Code
                                  Generators . . . . . . . . . . . . . . . 281--283
               M. Ganapathi and   
             J. L. Hennessy and   
                  C. N. Fischer   Surveyor's Forum: Retargetable Code
                                  Generators . . . . . . . . . . . . . . . 283--284

ACM Computing Surveys
Volume 15, Number 4, December, 1983

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 285--286
               Theo Haerder and   
                 Andreas Reuter   Principles of Transaction Oriented
                                  Database Recovery  . . . . . . . . . . . 287--317
               John Leslie King   Centralized versus decentralized
                                  computing:organizational considerations
                                  and management options . . . . . . . . . 319--349
                  D. L. Lee and   
                F. H. Lochovsky   Voice Response Systems . . . . . . . . . 351--374
               M. Stella Atkins   Surveyor's Forum: Notations for
                                  Concurrent Programming . . . . . . . . . 375--376
         Gregory R. Andrews and   
              Fred B. Schneider   Surveyor's Forum: Notations for
                                  Concurrent Programming . . . . . . . . . 376--377
         Gregory R. Andrews and   
              Fred B. Schneider   Corrigenda: ``Concepts and notations for
                                  concurrent programs''  . . . . . . . . . 377--377


ACM Computing Surveys
Volume 16, Number 1, March, 1984

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 1--2
              William Stallings   Local Networks . . . . . . . . . . . . . 3--41
            James F. Kurose and   
            Mischa Schwartz and   
                 Yechiam Yemini   Multiple-Access Protocols and
                                  Time-Con\-strained Communication . . . . 43--70
                        Won Kim   Highly Available Systems for Database
                                  Applications . . . . . . . . . . . . . . 71--98

ACM Computing Surveys
Volume 16, Number 2, June, 1984

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 99--100
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 101--102
           Anthony I. Wasserman   Editorial Policy . . . . . . . . . . . . 103--110
             Matthias Jarke and   
               Jürgen Koch   Query Optimization in Database Systems   111--152
      Hervé Gallaire and   
                Jack Minker and   
             Jean-Marie Nicolas   Logic and Databases: a Deductive
                                  Approach . . . . . . . . . . . . . . . . 153--185
                    Hanan Samet   The Quadtree and Related Hierarchical
                                  Data Structures  . . . . . . . . . . . . 187--260

ACM Computing Surveys
Volume 16, Number 3, September, 1984

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 261--262
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 263--264
                Ben Shneiderman   Response Time and Display Rate in Human
                                  Performance with Computers . . . . . . . 265--285
                Dina Bitton and   
            David J. DeWitt and   
             David K. Hsiao and   
               Jaishankar Menon   A Taxonomy of Parallel Sorting . . . . . 287--318
           Michael J. Quinn and   
                   Narsingh Deo   Parallel Graph Algorithms  . . . . . . . 319--348

ACM Computing Surveys
Volume 16, Number 4, December, 1984

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 349--350
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 351--351
                 Liba Svobodova   File Servers for Network-Based
                                  Distributed Systems  . . . . . . . . . . 353--398
                   C. T. Yu and   
                    C. C. Chang   Distributed Query Processing . . . . . . 399--433


ACM Computing Surveys
Volume 17, Number 1, March, 1985

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 1--2
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 3--4
             Gopal K. Gupta and   
            Ron Sacks-Davis and   
               Peter E. Tischer   A Review of Recent Developments in
                                  Solving ODEs . . . . . . . . . . . . . . 5--47
             Christos Faloutsos   Access Methods for Text  . . . . . . . . 49--74
               Paul J. Besl and   
                 Ramesh C. Jain   Three-Dimensional Object Recognition . . 75--145

ACM Computing Surveys
Volume 17, Number 2, June, 1985

                  Curtis Abbott   Guest Editor's Introduction to the
                                  Special Issue on Computer Music  . . . . 147--151
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 153--154
           Anthony I. Wasserman   Editorial Policy . . . . . . . . . . . . 155--162
                   Curtis Roads   Research in Music and Artificial
                                  Intelligence . . . . . . . . . . . . . . 163--190
                 John W. Gordon   System Architectures for Computer Music  191--233
                 Gareth Loy and   
                  Curtis Abbott   Programming Languages for Computer Music
                                  Synthesis, Performance, and Composition  235--265
             Bruce W. Pennycook   Computer-Music Interfaces: a Survey  . . 267--289

ACM Computing Surveys
Volume 17, Number 3, September, 1985

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 291--292
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 293--294
            James H. Hester and   
           Daniel S. Hirschberg   Self-Organizing Linear Search  . . . . . 295--311
             Matthias Jarke and   
               Yannis Vassiliou   A Framework for Choosing a Database
                                  Query Language . . . . . . . . . . . . . 313--340
          Susan B. Davidson and   
       Hector Garcia-Molina and   
                     Dale Skeen   Consistency in Partitioned Networks  . . 341--370

ACM Computing Surveys
Volume 17, Number 4, December, 1985

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 375--376
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 377--378
         John S. Quarterman and   
       Abraham Silberschatz and   
              James L. Peterson   4.2BSD and 4.3BSD as Examples of the
                                  UNIX System  . . . . . . . . . . . . . . 379--418
        Andrew S. Tanenbaum and   
            Robbert van Renesse   Distributed Operating Systems  . . . . . 419--470
              Luca Cardelli and   
                   Peter Wegner   On Understanding Types, Data
                                  Abstraction, and Polymorphism  . . . . . 471--522


ACM Computing Surveys
Volume 18, Number 1, March, 1986

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 1--2
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 3--4
              R. H. Perrott and   
              A. Zarea-Aliabadi   Supercomputer Languages  . . . . . . . . 5--22
                      Zvi Galil   Efficient Algorithms for Finding Maximum
                                  Matching in Graphs . . . . . . . . . . . 23--38
                  Jayadev Misra   Distributed Discrete-Event Simulation    39--65
             Roland T. Chin and   
                Charles R. Dyer   Model-Based Recognition in Robot Vision  67--108

ACM Computing Surveys
Volume 18, Number 2, June, 1986

           Anthony I. Wasserman   About This Issue \ldots  . . . . . . . . 113--114
           Anthony I. Wasserman   About the Authors \ldots . . . . . . . . 115--116
           Anthony I. Wasserman   Editorial Policy . . . . . . . . . . . . 117--124
               Nancy G. Leveson   Software Safety: Why, What, and How  . . 125--163
               R. A. Hirschheim   The Effect of \em A Priori Views on the
                                  Social Implications of Computing: The
                                  Case of Office Automation  . . . . . . . 165--195
             Toby J. Teorey and   
              Dongqing Yang and   
                   James P. Fry   A Logical Design Methodology for
                                  Relational Databases Using the Extended
                                  Entity-Relationship Model  . . . . . . . 197--222

ACM Computing Surveys
Volume 18, Number 3, September, 1986

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 227--228
             Salvatore T. March   About the Authors \ldots . . . . . . . . 229--229
                   Ali Mili and   
           Jules Desharnais and   
      Jean Raymond Gagné   Formal Models of Stepwise Refinement of
                                  Programs . . . . . . . . . . . . . . . . 231--276
           Barbara G. Ryder and   
                Marvin C. Paull   Elimination Algorithms for Data Flow
                                  Analysis . . . . . . . . . . . . . . . . 277--316

ACM Computing Surveys
Volume 18, Number 4, December, 1986

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 319--319
             Salvatore T. March   About the Authors \ldots . . . . . . . . 321--321
                  C. Batini and   
               M. Lenzerini and   
                  S. B. Navathe   A Comparative Analysis of Methodologies
                                  for Database Schema Integration  . . . . 323--364
                 Arthur H. Veen   Dataflow Machine Architecture  . . . . . 365--396


ACM Computing Surveys
Volume 19, Number 1, March, 1987

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 1--1
             Salvatore T. March   About the Authors \ldots . . . . . . . . 3--3
                 Kalle Lyytinen   Different Perspectives on Information
                                  Systems: Problems and Solutions  . . . . 5--46
              Alfons Kemper and   
              Mechtild Wallrath   An Analysis of Geometric Modeling in
                                  Database Systems . . . . . . . . . . . . 47--91

ACM Computing Surveys
Volume 19, Number 2, June, 1987

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 93--93
             Salvatore T. March   About the Authors \ldots . . . . . . . . 95--95
             Salvatore T. March   Editorial Policy . . . . . . . . . . . . 97--104
        Malcolm P. Atkinson and   
               O. Peter Buneman   Types and Persistence in Database
                                  Programming Languages  . . . . . . . . . 105--190
                     Arie Segev   Surveyor's Forum: Transitive
                                  Dependencies . . . . . . . . . . . . . . 191--192
                 Toby J. Teorey   Surveyor's Forum: Transitive
                                  Dependencies . . . . . . . . . . . . . . 193--193
                   Ali Mili and   
           Jules Desharnais and   
      Jean Raymond Gagné   Corrigendum: ``Formal Models of Stepwise
                                  Refinements of Programs''  . . . . . . . 195--195

ACM Computing Surveys
Volume 19, Number 3, September, 1987

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 197--198
             Salvatore T. March   About the Authors \ldots . . . . . . . . 199--199
               Richard Hull and   
                     Roger King   Semantic Database Modeling: Survey,
                                  Applications, and Research Issues  . . . 201--260
           Debra A. Lelewer and   
           Daniel S. Hirschberg   Data Compression . . . . . . . . . . . . 261--296

ACM Computing Surveys
Volume 19, Number 4, December, 1987

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 299--299
             Salvatore T. March   About the Authors \ldots . . . . . . . . 301--301
                    Edgar Knapp   Deadlock Detection in Distributed
                                  Databases  . . . . . . . . . . . . . . . 303--328
       Carol Bergfeld Mills and   
                Linda J. Weldon   Reading Text from Computer Screens . . . 329--358


ACM Computing Surveys
Volume 20, Number 1, March, 1988

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 1--1
             Salvatore T. March   About the Authors \ldots . . . . . . . . 3--3
                 Hideaki Takagi   Queuing Analysis of Polling Models . . . 5--28
             Scott Danforth and   
                Chris Tomlinson   Type Theories and Object-Oriented
                                  Programming  . . . . . . . . . . . . . . 29--72

ACM Computing Surveys
Volume 20, Number 2, June, 1988

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 73--73
             Salvatore T. March   About the Authors \ldots . . . . . . . . 75--75
             Salvatore T. March   Editorial Policy . . . . . . . . . . . . 77--84
               R. J. Enbody and   
                       H. C. Du   Dynamic Hashing Schemes  . . . . . . . . 85--113
         Kenneth L. Kraemer and   
               John Leslie King   Computer-Based Systems for Cooperative
                                  Work and Group Decision Making . . . . . 115--146

ACM Computing Surveys
Volume 20, Number 3, September, 1988

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 149--149
             Salvatore T. March   About the Authors \ldots . . . . . . . . 151--151
               Joan Peckham and   
                 Fred Maryanski   Semantic Data Models . . . . . . . . . . 153--189
         Michael V. Mannino and   
               Paicheng Chu and   
                   Thomas Sager   Statistical Profile Estimation in
                                  Database Systems . . . . . . . . . . . . 191--221

ACM Computing Surveys
Volume 20, Number 4, December, 1988

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 223--224
             Salvatore T. March   About the Authors \ldots . . . . . . . . 225--225
      Allen M. Johnson, Jr. and   
                 Miroslaw Malek   Survey of Software Tools for Evaluating
                                  Reliability, Availability, and
                                  Serviceability . . . . . . . . . . . . . 227--269
                    Hanan Samet   Hierarchical Representations of
                                  Collections of Small Rectangles  . . . . 271--309


ACM Computing Surveys
Volume 21, Number 1, March, 1989

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 1--2
             Salvatore T. March   About the Authors \ldots . . . . . . . . 3--3
             H. Rex Hartson and   
                    Deborah Hix   Human-Computer Interface Development:
                                  Concepts and Systems for Its Management  5--92
                   Kevin Knight   Unification: a Multidisciplinary Survey  93--124

ACM Computing Surveys
Volume 21, Number 2, June, 1989

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 125--126
             Salvatore T. March   About the Authors \ldots . . . . . . . . 127--127
             Salvatore T. March   Editorial Policy . . . . . . . . . . . . 129--136
                 Bruce Abramson   Control Strategies for Two-Player Games  137--161
                  Thomas Ellman   Explanation-Based Learning: a Survey of
                                  Programs and Perspectives  . . . . . . . 163--221
        Charles J. Colbourn and   
           Paul C. van Oorschot   Applications of Combinatorial Designs in
                                  Computer Science . . . . . . . . . . . . 223--250

ACM Computing Surveys
Volume 21, Number 3, September, 1989

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 251--251
                   Peter Wegner   Guest Editor's Introduction to the
                                  Special Issue on Programming Language
                                  Paradigms  . . . . . . . . . . . . . . . 253--258
             Salvatore T. March   About the Authors \ldots . . . . . . . . 259--260
               Henri E. Bal and   
        Jennifer G. Steiner and   
            Andrew S. Tanenbaum   Programming Languages for Distributed
                                  Computing Systems  . . . . . . . . . . . 261--322
          Nicholas Carriero and   
                David Gelernter   How to Write Parallel Programs: a Guide
                                  to the Perplexed . . . . . . . . . . . . 323--357
                     Paul Hudak   Conception, Evolution, and Application
                                  of Functional Programming Languages  . . 359--411
                   Ehud Shapiro   The Family of Concurrent Logic
                                  Programming Languages  . . . . . . . . . 413--510

ACM Computing Surveys
Volume 21, Number 4, December, 1989

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 511--512
             Salvatore T. March   About the Authors \ldots . . . . . . . . 513--513
              Nabil R. Adam and   
               John C. Wortmann   Security-Control Methods for Statistical
                                  Databases: a Comparative Study . . . . . 515--556
               Timothy Bell and   
              Ian H. Witten and   
                 John G. Cleary   Modeling for Text Compression  . . . . . 557--591
        Charles E. McDowell and   
              David P. Helmbold   Debugging Concurrent Programs  . . . . . 593--622


ACM Computing Surveys
Volume 22, Number 1, March, 1990

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 1--2
             Salvatore T. March   About the Authors \ldots . . . . . . . . 3--3
          A. J. van de Goor and   
                 C. A. Verruijt   An Overview of Deterministic Functional
                                  RAM Chip Testing . . . . . . . . . . . . 5--33
              Russell J. Abbott   Resourceful Systems for Fault Tolerance,
                                  Reliability, and Safety  . . . . . . . . 35--68

ACM Computing Surveys
Volume 22, Number 2, June, 1990

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 69--70
             Salvatore T. March   About the Authors \ldots . . . . . . . . 71--71
             Salvatore T. March   Editorial Policy . . . . . . . . . . . . 73--81
                Raif O. Onvural   Survey of Closed Queueing Networks with
                                  Blocking . . . . . . . . . . . . . . . . 83--121
          Krzysztof Pawlikowski   Steady-State Simulation of Queueing
                                  Processes: a Survey of Problems and
                                  Solutions  . . . . . . . . . . . . . . . 123--170
                   Robert Mandl   Surveyor's Forum: ``Applications of
                                  Combinatorial Designs in Computer
                                  Science''  . . . . . . . . . . . . . . . 171--171

ACM Computing Surveys
Volume 22, Number 3, September, 1990

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 173--173
        Ahmed K. Elmagarmid and   
                      Calton Pu   Introduction to the Special Issue on
                                  Heterogeneous Databases  . . . . . . . . 175--178
             Salvatore T. March   About the Authors \ldots . . . . . . . . 179--181
              Amit P. Sheth and   
                James A. Larson   Federated Database Systems for Managing
                                  Distributed, Heterogeneous, and
                                  Autonomous Databases . . . . . . . . . . 183--236
               Gomer Thomas and   
          Glenn R. Thompson and   
             Chin-Wan Chung and   
           Edward Barkmeyer and   
                Fred Carter and   
         Marjorie Templeton and   
                Stephen Fox and   
                   Berl Hartman   Heterogeneous Distributed Database
                                  Systems for Production Use . . . . . . . 237--266
              Witold Litwin and   
                   Leo Mark and   
              Nick Roussopoulos   Interoperability of Multiple Autonomous
                                  Databases  . . . . . . . . . . . . . . . 267--293

ACM Computing Surveys
Volume 22, Number 4, December, 1990

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 295--296
             Salvatore T. March   About the Authors \ldots . . . . . . . . 297--297
              Fred B. Schneider   Implementing Fault-Tolerant Services
                                  Using the State Machine Approach: a
                                  Tutorial . . . . . . . . . . . . . . . . 299--319
               Eliezer Levy and   
           Abraham Silberschatz   Distributed File Systems: Concepts and
                                  Examples . . . . . . . . . . . . . . . . 321--374
                  Randy H. Katz   Toward a Unified Framework for Version
                                  Modeling in Engineering Databases  . . . 375--408
          Krzysztof Pawlikowski   Corrigenda: ``Steady-State Simulation of
                                  Queueing Processes: A Survey of Problems
                                  and Solutions''  . . . . . . . . . . . . 409--409


ACM Computing Surveys
Volume 23, Number 1, March, 1991

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 1--2
             Salvatore T. March   About the Authors \ldots . . . . . . . . 3--3
                 David Goldberg   What Every Computer Scientist Should
                                  Know About Floating-Point Arithmetic . . 5--48
             Gregory R. Andrews   Paradigms for Process Interaction in
                                  Distributed Programs . . . . . . . . . . 49--90
              Roger S. Chin and   
              Samuel T. Chanson   Distributed, object-based programming
                                  systems  . . . . . . . . . . . . . . . . 91--124
                  S. Sankar and   
                D. S. Rosenblum   Surveyor's Forum: Runtime Checking and
                                  Debugging of Formally Specified Programs 125--127

ACM Computing Surveys
Volume 23, Number 2, June, 1991

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 129--129
             Salvatore T. March   About the Authors \ldots . . . . . . . . 131--131
             Salvatore T. March   Editorial Policy . . . . . . . . . . . . 133--141
               K. Shahookar and   
                    P. Mazumder   VLSI Cell Placement Techniques . . . . . 143--220
     Bandula W. Abeysundara and   
                 Ahmed E. Kamal   High-Speed Local Area Networks and Their
                                  Performance: a Survey  . . . . . . . . . 221--264

ACM Computing Surveys
Volume 23, Number 3, September, 1991

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 265--266
             Salvatore T. March   About the Authors \ldots . . . . . . . . 267--267
         Naser S. Barghouti and   
                 Gail E. Kaiser   Concurrency Control in Advanced Database
                                  Applications . . . . . . . . . . . . . . 269--317
                  Zvi Galil and   
           Giuseppe F. Italiano   Data Structures and Algorithms for
                                  Disjoint Set Union Problems  . . . . . . 319--344
              Franz Aurenhammer   Voronoi Diagrams: a Survey of a
                                  Fundamental Geometric Data Structure . . 345--405
               Lorenzo Strigini   Surveyor's Forum: ``Resourceful Systems
                                  for Fault Tolerance, Reliability, and
                                  Safety'' . . . . . . . . . . . . . . . . 407--409
                 Russell Abbott   Surveyor's Forum: ``Resourceful Systems
                                  for Fault Tolerance, Reliability, and
                                  Safety'' . . . . . . . . . . . . . . . . 409--411
                 David Goldberg   Corrigendum: ``What Every Computer
                                  Scientist Should Know About
                                  Floating-Point Arithmetic''  . . . . . . 413--413

ACM Computing Surveys
Volume 23, Number 4, December, 1991

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 417--418
             Salvatore T. March   About the Authors \ldots . . . . . . . . 419--419
                M. R. Stytz and   
                 G. Frieder and   
                     O. Frieder   Three-Dimensional Medical Imaging:
                                  Algorithms and Computer Systems  . . . . 421--499
     L. Edwin McKenzie, Jr. and   
       Richard Thomas Snodgrass   Evaluation of Relational Algebras
                                  Incorporating the Time Dimension in
                                  Databases  . . . . . . . . . . . . . . . 501--543


ACM Computing Surveys
Volume 24, Number 1, March, 1992

             Salvatore T. March   About This Issue \ldots  . . . . . . . . 1--2
             Salvatore T. March   About the Authors \ldots . . . . . . . . 3--3
               Paul Suetens and   
                 Pascal Fua and   
               Andrew J. Hanson   Computational Strategies for Object
                                  Recognition  . . . . . . . . . . . . . . 5--61
               Priti Mishra and   
               Margaret H. Eich   Join Processing in Relational Databases  63--113

ACM Computing Surveys
Volume 24, Number 2, June, 1992

             Salvatore T. March   Editorial Policy . . . . . . . . . . . . 117--125
             Salvatore T. March   About This Issue \ldots  . . . . . . . . 127--128
             Salvatore T. March   About the Authors \ldots . . . . . . . . 129--129
             Charles W. Krueger   Software Reuse . . . . . . . . . . . . . 131--183
              Per Brinch Hansen   Householder Reduction of Linear
                                  Equations  . . . . . . . . . . . . . . . 185--194
              Catherine McGeoch   Analyzing Algorithms by Simulation:
                                  Variance Reduction Techniques and
                                  Simulation Speedups  . . . . . . . . . . 195--212

ACM Computing Surveys
Volume 24, Number 3, September, 1992

               Richard R. Muntz   A Personal Note  . . . . . . . . . . . . 213--214
               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 215--215
               Richard R. Muntz   About the Authors \ldots . . . . . . . . 217--217
              Yong K. Hwang and   
                 Narendra Ahuja   Gross Motion Planning --- a Survey . . . 219--291
               Randal E. Bryant   Symbolic Boolean Manipulation with
                                  Ordered Binary-Decision Diagrams . . . . 293--318
              Charles B. Dunham   Surveyor's Forum: ``What Every Computer
                                  Scientist Should Know About
                                  Floating-Point Arithmetic''  . . . . . . 319--319
              Brian A. Wichmann   Surveyor's Forum: ``What Every Computer
                                  Scientist Should Know About
                                  Floating-Point Arithmetic''  . . . . . . 319--319

ACM Computing Surveys
Volume 24, Number 4, December, 1992

               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 321--322
               Richard R. Muntz   About the Authors \ldots . . . . . . . . 323--323
          Lisa Gottesfeld Brown   A Survey of Image Registration
                                  Techniques . . . . . . . . . . . . . . . 325--376
                   Karen Kukich   Techniques for Automatically Correcting
                                  Words in Text  . . . . . . . . . . . . . 377--439
   Vladimir Estivill-Castro and   
                    Derick Wood   A Survey of Adaptive Sorting Algorithms  441--476


ACM Computing Surveys
Volume 25, Number 1, March, 1993

               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 1--2
               Richard R. Muntz   About the Authors \ldots . . . . . . . . 3--3
              Farshid Arman and   
                 J. K. Aggarwal   Model-Based Object Recognition in
                                  Dense-Range Images --- a Review  . . . . 5--43
                Marco Schneider   Self-Sta\-bi\-li\-za\-tion . . . . . . . 45--67

ACM Computing Surveys
Volume 25, Number 2, June, 1993

               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 69--70
               Richard R. Muntz   About the Authors \ldots . . . . . . . . 71--72
                   Goetz Graefe   Query Evaluation Techniques for Large
                                  Databases  . . . . . . . . . . . . . . . 73--170
           Michael Barborak and   
             Miroslaw Malek and   
                  Anton Dahbura   The Consensus Problem in Fault-Tolerant
                                  Computing  . . . . . . . . . . . . . . . 171--220

ACM Computing Surveys
Volume 25, Number 3, September, 1993

               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 221--222
               Richard R. Muntz   About the Authors \ldots . . . . . . . . 223--223
               A. Udaya Shankar   An Introduction to Assertional Reasoning
                                  for Concurrent Systems . . . . . . . . . 225--262
          Michael G. Norman and   
                 Peter Thanisch   Models of Machines and Computation for
                                  Mapping in Multicomputers  . . . . . . . 263--302
                 David J. Lilja   Cache Coherence in Large-Scale
                                  Shared-Memory Multiprocessors: Issues
                                  and Comparisons  . . . . . . . . . . . . 303--338
             Randolph D. Nelson   The Mathematics of Product Form Queuing
                                  Networks . . . . . . . . . . . . . . . . 339--369

ACM Computing Surveys
Volume 25, Number 4, December, 1993

               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 371--372
               Richard R. Muntz   About the Authors \ldots . . . . . . . . 373--373
            Richard Baskerville   Information Systems Security Design
                                  Methods: Implications for Information
                                  Systems Development  . . . . . . . . . . 375--414
            Bernhard Eschermann   State Assignment for Hardwired VLSI
                                  Control Units  . . . . . . . . . . . . . 415--436
         James C. Brancheau and   
                 Carol V. Brown   The Management of End-User Computing:
                                  Status and Directions  . . . . . . . . . 437--482


ACM Computing Surveys
Volume 26, Number 1, March, 1994

                Rajiv Gupta and   
            Scott A. Smolka and   
                  Shaji Bhaskar   On Randomization in Sequential and
                                  Distributed Algorithms . . . . . . . . . 7--86
           Thomas W. Malone and   
                 Kevin Crowston   The Interdisciplinary Study of
                                  Coordination . . . . . . . . . . . . . . 87--119
                 Sunggu Lee and   
                 Kang Geun Shin   Probabilistic Diagnosis of
                                  Multiprocessor Systems . . . . . . . . . 121--139

ACM Computing Surveys
Volume 26, Number 2, June, 1994

               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 141--142
               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 143--144
              Peter M. Chen and   
              Edward K. Lee and   
            Garth A. Gibson and   
              Randy H. Katz and   
             David A. Patterson   RAID: High-Performance, Reliable
                                  Secondary Storage  . . . . . . . . . . . 145--185
                  Tim J. Harris   A Survey of PRAM Simulation Techniques   187--206

ACM Computing Surveys
Volume 26, Number 3, September, 1994

               Richard R. Muntz   About This Issue \ldots  . . . . . . . . 207--207
               Richard R. Muntz   About the Authors \ldots . . . . . . . . 209--210
           Carl E. Landwehr and   
               Alan R. Bull and   
          John P. McDermott and   
                William S. Choi   A Taxonomy of Computer Program Security
                                  Flaws  . . . . . . . . . . . . . . . . . 211--254
             Mary L. Bailey and   
        Jack V. Briner, Jr. and   
           Roger D. Chamberlain   Parallel Logic Simulation of VLSI
                                  Systems  . . . . . . . . . . . . . . . . 255--294
Jacques Chassin de Kergommeaux and   
              Philippe Codognet   Parallel Logic Programming Systems . . . 295--336

ACM Computing Surveys
Volume 26, Number 4, December, 1994

               Peter Wegner and   
                  Marvin Israel   Editorial Directions . . . . . . . . . . 337--339
               Richard R. Muntz   About This Issue . . . . . . . . . . . . 341--341
               Richard R. Muntz   About The Authors  . . . . . . . . . . . 343--343
             David F. Bacon and   
            Susan L. Graham and   
                Oliver J. Sharp   Compiler Transformations for
                                  High-Performance Computing . . . . . . . 345--420
       Ji\vrí Matou\vsek   Geometric Range Searching  . . . . . . . 421--461


ACM Computing Surveys
Volume 27, Number 1, March, 1995

               Peter Wegner and   
                  Marvin Israel   About This Issue \ldots  . . . . . . . . 1--2
                Juris Hartmanis   Turing Award Lecture: On Computational
                                  Complexity and the Nature of Computer
                                  Science  . . . . . . . . . . . . . . . . 7--16
               Laszlo A. Belady   The Disappearance of the ``Pure''
                                  Software Industry  . . . . . . . . . . . 17--18
                Gilles Brassard   Time for Another Paradigm Shift  . . . . 19--21
               Peter J. Denning   Can there be a science of information?   23--25
               Peter A. Freeman   Effective Computer Science . . . . . . . 27--29
                Michael C. Loui   Computer Science is a New Engineering
                                  Discipline . . . . . . . . . . . . . . . 31--32
                    John Plaice   Computer Science is an Experimental
                                  Science  . . . . . . . . . . . . . . . . 33--33
                 John E. Savage   Will computer science become irrelevant? 35--37
                  N. F. Stewart   Science and Computer Science . . . . . . 39--41
              Jeffrey D. Ullman   The Role of Theory Today . . . . . . . . 43--44
                   Peter Wegner   Interaction as a Basis for Empirical
                                  Computer Science . . . . . . . . . . . . 45--48
                Fred Weingarten   Government Funding and Computing
                                  Research Priorities  . . . . . . . . . . 49--54
                     W. A. Wulf   Are we scientists or engineers?  . . . . 55--57
                Juris Hartmanis   Response to the Essays ``On
                                  Computational Complexity and the Nature
                                  of Computer Science''  . . . . . . . . . 59--61
              Peter A. Buhr and   
             Michel Fortier and   
              Michael H. Coffin   Monitor Classification . . . . . . . . . 63--107
         Ricardo A. Baeza-Yates   Fringe Analysis Revisited  . . . . . . . 109--119
                        Various   The Scope and Tutorial Needs of the ACM
                                  SIGs . . . . . . . . . . . . . . . . . . 121--137

ACM Computing Surveys
Volume 27, Number 2, June, 1995

               Peter Wegner and   
                  Marvin Israel   About This Issue . . . . . . . . . . . . 139--140
          Evaggelia Pitoura and   
              Omran Bukhres and   
               Ahmed Elmagarmid   Object Orientation in Multidatabase
                                  Systems  . . . . . . . . . . . . . . . . 141--195
                   Jukka Paakki   Attribute Grammar Paradigms --- a
                                  High-Level Methodology in Language
                                  Implementation . . . . . . . . . . . . . 196--255
                   David Garlan   Research Directions in Software
                                  Architecture . . . . . . . . . . . . . . 257--261
           Oscar Nierstrasz and   
              Theo Dirk Meijler   Research Directions in Software
                                  Composition  . . . . . . . . . . . . . . 262--264
                 Gio Wiederhold   Mediation in Information Systems . . . . 265--267
                   Frank Manola   Interoperability Issues in Large-Scale
                                  Distributed Object Systems . . . . . . . 268--270
                  Sandra Heiler   Semantic Interoperability  . . . . . . . 271--273
                Jeff Sutherland   Business Objects in Corporate
                                  Information Systems  . . . . . . . . . . 274--276
     Efstratios Gallopoulos and   
           Elias N. Houstis and   
                   John R. Rice   Workshop on Problem-Solving
                                  Environments: Findings and
                                  Recommendations  . . . . . . . . . . . . 277--279
            Arnold L. Rosenberg   Thoughts on Parallelism and Concurrency
                                  in Computing Curricula . . . . . . . . . 280--283
               P. Takis Metaxas   Fundamental Ideas for a Parallel
                                  Computing Course . . . . . . . . . . . . 284--286
               Faron Moller and   
                Scott A. Smolka   On the Computational Complexity of
                                  Bisimulation . . . . . . . . . . . . . . 287--289
              Ron K. Cytron and   
                 Brent Hailpern   SIGPLAN Scope and Tutorial Needs . . . . 290--291
            Alexander Thomasian   Surveyors' forum --- high-performance
                                  secondary memory . . . . . . . . . . . . 292--295

ACM Computing Surveys
Volume 27, Number 3, September, 1995

               Peter Wegner and   
                  Marvin Israel   About This Issue . . . . . . . . . . . . 297--297
                      Raj Reddy   Grand Challenges in AI . . . . . . . . . 301--303
                 Narendra Ahuja   On Detection and Representation of
                                  Multiscale Low-Level Image Structure . . 304--306
          Yiannis Aloimonos and   
          C. Fermüller and   
                   A. Rosenfeld   Seeing and Understanding: Representing
                                  the Visual World . . . . . . . . . . . . 307--309
                  Ruzena Bajcsy   Signal-to-Symbol Transformation and Vice
                                  Versa: From Fundamental Processes to
                                  Representation . . . . . . . . . . . . . 310--313
         Ronald J. Brachman and   
             Hector J. Levesque   Undirected Behavior Without Unbounded
                                  Search . . . . . . . . . . . . . . . . . 314--316
                Eugene Charniak   Natural Language Learning  . . . . . . . 317--319
             William J. Clancey   AI: Inventing a New Kind of Machine  . . 320--322
                     A. G. Cohn   The Challenge of Qualitative Spatial
                                  Reasoning  . . . . . . . . . . . . . . . 323--325
                 Tom Dietterich   Overfitting and Undercomputing in
                                  Machine Learning . . . . . . . . . . . . 326--327
              Didier Dubois and   
                    Henri Prade   What Does Fuzzy Logic Bring to AI? . . . 328--330
            Matthew L. Ginsberg   Epistemological and Heuristic Adequacy
                                  Revisited  . . . . . . . . . . . . . . . 331--333
           Subbarao Kambhampati   AI Planning: a Prospectus on Theory and
                                  Applications . . . . . . . . . . . . . . 334--336
                Richard E. Korf   Space-Efficient Search Algorithms  . . . 337--339
               Victor R. Lesser   Multiagent Systems: An Emerging
                                  Subdiscipline of AI  . . . . . . . . . . 340--342
             Vladimir Lifschitz   The Logic of Common Sense  . . . . . . . 343--345
                     R. P. Loui   Models of Deliberation in the Social
                                  Sciences . . . . . . . . . . . . . . . . 346--348
                 Jacques Pitrat   AI Systems are Dumb Because AI
                                  Researchers Are Too Clever . . . . . . . 349--350
                    Austin Tate   Don't Leave Your Plan on the Shelf . . . 351--352
             Pietro Torasso and   
               Luca Console and   
            Luigi Portinale and   
 Daniele Theseider Dupré   On the Role of Abduction . . . . . . . . 353--355
                David Waltz and   
                    Simon Kasif   On Reasoning From Data . . . . . . . . . 356--359
             Michael P. Wellman   The Economic Approach to Artificial
                                  Intelligence . . . . . . . . . . . . . . 360--362
                Kenneth Yip and   
                  Feng Zhao and   
                   Elisha Sacks   Imagistic Reasoning  . . . . . . . . . . 363--365
             Vicki H. Allan and   
             Reese B. Jones and   
             Randall M. Lee and   
               Stephen J. Allan   Software Pipelining  . . . . . . . . . . 367--432
           S. S. Beauchemin and   
                   J. L. Barron   The Computation of Optical Flow  . . . . 433--467

ACM Computing Surveys
Volume 27, Number 4, December, 1995

           Raymond Greenlaw and   
             Rossella Petreschi   Cubic Graphs . . . . . . . . . . . . . . 471--495
              Ronald E. Prather   Design and Analysis of Hierarchical
                                  Software Metrics . . . . . . . . . . . . 497--518
                   Dilip Sarkar   Methods to Speed Up Error
                                  Back-Propagation Learning Algorithm  . . 519--542
                      Anonymous   Computing Surveys Symposium on
                                  Multimedia . . . . . . . . . . . . . . . 543--544
             Venkat N. Gudivada   Multimedia Systems --- An
                                  Interdisciplinary Perspective  . . . . . 545--548
              Edward A. Fox and   
               Linda M. Kieffer   Multimedia Curricula, Courses, and
                                  Knowledge Modules  . . . . . . . . . . . 549--551
                    Borko Furht   Where Are Information Superhighways
                                  Headed?  . . . . . . . . . . . . . . . . 554--556
               Jenny Preece and   
                Ben Shneiderman   Survival of the Fittest: The Evolution
                                  of Multimedia User Interfaces  . . . . . 557--559
         Elisabeth André   Intellimedia: Making Multimedia Usable
                                  by Exploiting AI Methods . . . . . . . . 560--563
              Walid G. Aref and   
              Ibrahim Kamel and   
             Daniel P. Lopresti   On Handling Electronic Ink . . . . . . . 564--567
             James E. Baker and   
             Isabel F. Cruz and   
            Giuseppe Liotta and   
               Roberto Tamassia   A New Model for Algorithm Animation Over
                                  the WWW  . . . . . . . . . . . . . . . . 568--572
                  Shih-Fu Chang   Exploring Functionalities in the
                                  Compressed Image/Video Domain  . . . . . 573--575
    Stavros Christodoulakis and   
            Peter Triantafillou   Research and Development Issues for
                                  Large-Scale Multimedia Information
                                  Systems  . . . . . . . . . . . . . . . . 576--579
              Crispin Cowan and   
                Shanwei Cen and   
           Jonathan Walpole and   
                      Calton Pu   Adaptive Methods for Distributed Video
                                  Presentation . . . . . . . . . . . . . . 580--583
              Nevenka Dimitrova   The Myth of Semantic Video Retrieval . . 584--586
                   Sharon Flank   The Role of Natural-Language Processing
                                  in Multimedia  . . . . . . . . . . . . . 587--589
       Minos N. Garofalakis and   
            Yannis E. Ioannidis   Scheduling Issues in Multimedia Query
                                  Optimization . . . . . . . . . . . . . . 590--592
                   Arif Ghafoor   Multimedia Database Management Systems   593--598
                     Wendy Hall   The Role of Hypermedia in Multimedia
                                  Information Systems  . . . . . . . . . . 599--601
                    Qing Li and   
                Liu Sheng Huang   A Dynamic Data Model for a Video
                                  Database Management System . . . . . . . 602--606
            Alistair Moffat and   
                   Justin Zobel   Index Organization for Multimedia
                                  Database Systems . . . . . . . . . . . . 607--609
            Daniel Mossé   Resource Reservations in Networked
                                  Multimedia Systems . . . . . . . . . . . 610--612
                Klara Nahrstedt   End-to-End QoS Guarantees in Networked
                                  Multimedia Systems . . . . . . . . . . . 613--616
            Banu Özden and   
             Rajeev Rastogi and   
               Avi Silberschatz   Research Issues in Multimedia Storage
                                  Servers  . . . . . . . . . . . . . . . . 617--620
             Rosalind W. Picard   Computer Learning of Subjectivity  . . . 621--623
                 Teresa Roselli   Artificial Intelligence Can Improve
                                  Hypermedia Instructional Technologies
                                  for Learning . . . . . . . . . . . . . . 624--626
                Daniela Rus and   
             Devika Subramanian   Customizing Multimedia Information
                                  Access . . . . . . . . . . . . . . . . . 627--629
                    Hanan Samet   General Research Issues in Multimedia
                                  Database Systems . . . . . . . . . . . . 630--632
            Roger C. Schank and   
           Michael Korcuska and   
                  Menachem Jona   Multimedia Applications for Education
                                  and Training: Revolution or Red Herring? 633--635
         Prashant J. Shenoy and   
                Pawan Goyal and   
                 Harrick M. Vin   Issues in Multimedia Server Design . . . 636--639
            Richard Staehli and   
           Jonathan Walpole and   
                    David Maier   Device and Physical-Data Independence
                                  for Multimedia Presentations . . . . . . 640--642
            HongJiang Zhang and   
                        Qi Tian   Digital Video Analysis and Recognition
                                  for Content-Based Access . . . . . . . . 643--644
                      Anonymous   Contents: Author Index: Vols. 23--27
                                  (1991--1995) . . . . . . . . . . . . . . 645--650
                      Anonymous   Contents: Subject index: Vols. 23--27
                                  (1991--1995) . . . . . . . . . . . . . . 650--653


ACM Computing Surveys
Volume 28, Number 1, March, 1996

            Serge Abiteboul and   
           Gabriel M. Kuper and   
           Harry G. Mairson and   
    Alexander A. Shvartsman and   
                 Moshe Y. Vardi   In memoriam Paris C. Kanellakis  . . . . 3--15
             Edward M. Reingold   Basic techniques for design and analysis
                                  of algorithms  . . . . . . . . . . . . . 19--21
               Allen Tucker and   
                   Peter Wegner   ACM 50th-Anniversary Symposium:
                                  Perspectives in Computer Science . . . . 19--286
               Roberto Tamassia   Data structures  . . . . . . . . . . . . 23--26
                      D. T. Lee   Computational geometry . . . . . . . . . 27--31
             Rajeev Motwani and   
             Prabhakar Raghavan   Randomized algorithms  . . . . . . . . . 33--37
          Maxime Crochemore and   
                 Thierry Lecroq   Pattern-matching and text-compression
                                  algorithms . . . . . . . . . . . . . . . 39--41
              Samir Khuller and   
            Balaji Raghavachari   Graph and network algorithms . . . . . . 43--45
                Michael C. Loui   Computational complexity theory  . . . . 47--49
            Guy E. Blelloch and   
                 Bruce M. Maggs   Parallel algorithms  . . . . . . . . . . 51--54
              Vijay Chandru and   
                      M. R. Rao   Combinatorial optimization: an integer
                                  programming perspective  . . . . . . . . 55--58
              Andrea S. Lapaugh   Layout algorithm for VLSI design . . . . 59--61
                    Doug Burger   Memory systems . . . . . . . . . . . . . 63--65
           Michael J. Flynn and   
                  Kevin W. Rudd   Parallel architectures . . . . . . . . . 67--70
                  J. R. Quinlan   Learning decision tree classifiers . . . 71--72
          Michael I. Jordan and   
          Christopher M. Bishop   Neural networks  . . . . . . . . . . . . 73--75
              Stephanie Forrest   Genetic algorithms . . . . . . . . . . . 77--80
                F. L. Lewis and   
              M. Fitzgerald and   
                         K. Liu   Robotics . . . . . . . . . . . . . . . . 81--83
                    Thomas Dean   Automated planning . . . . . . . . . . . 85--87
                    Judea Pearl   Decision making under uncertainty  . . . 89--92
              Pasquale Cinnella   Numerical simulations of reactive flows  93--96
                Joseph S. Shang   Computational electromagnetics . . . . . 97--99
             David T. Kingsbury   Computational biology  . . . . . . . . . 101--103
           Avi Silberschatz and   
             Henry F. Korth and   
                   S. Sudarshan   Data models  . . . . . . . . . . . . . . 105--108
               Stefano Ceri and   
             Raghu Ramakrishnan   Rules in database systems  . . . . . . . 109--111
                  Dennis Shasha   Tuning databases for high performance    113--115
                 Betty Salzberg   Access methods . . . . . . . . . . . . . 117--120
            Yannis E. Ioannidis   Query optimization . . . . . . . . . . . 121--123
         M. Tamer Özsu and   
              Patrick Valduriez   Distributed and parallel database
                                  systems  . . . . . . . . . . . . . . . . 125--128
                 Sushil Jajodia   Database security and privacy  . . . . . 129--131
               Ellen Riloff and   
                    Lee Hollaar   Text databases and information retrieval 133--135
      François Bancilhon   Object databases . . . . . . . . . . . . 137--140
                     Jim Melton   SQL language summary . . . . . . . . . . 141--143
                Donald H. House   Overview of three-dimensional computer
                                  graphics . . . . . . . . . . . . . . . . 145--148
                 A. P. Rockwood   Geometric primitives . . . . . . . . . . 149--151
                 David S. Ebert   Advanced modeling techniques for
                                  computer graphics  . . . . . . . . . . . 153--156
                      Alan Watt   Rendering techniques: past, present and
                                  future . . . . . . . . . . . . . . . . . 157--159
    Nadia Magnenat Thalmann and   
                Daniel Thalmann   Computer animation . . . . . . . . . . . 161--163
                Arie E. Kaufman   Volume visualization . . . . . . . . . . 165--167
                Jonathan Grudin   The organizational contexts of
                                  development and use  . . . . . . . . . . 169--171
                 Wolfgang Dzida   International usability standards  . . . 173--175
             Robert J. K. Jacob   Human-computer interaction: input
                                  devices  . . . . . . . . . . . . . . . . 177--179
                     Colin Ware   Multimedia output devices and techniques 181--183
            Jürgen Ziegler   Interactive techniques . . . . . . . . . 185--187
                  Brad A. Myers   User interface software technology . . . 189--191
               Mary Beth Rosson   Human factors in programming and
                                  software development . . . . . . . . . . 193--195
           Stuart A. Selber and   
     Johndan Johnson-Eilola and   
              Brad Mehlenbacher   Online support systems . . . . . . . . . 197--200
               Raphel A. Finkel   Operating systems  . . . . . . . . . . . 201--203
              John A. Stankovic   Real-time and embedded systems . . . . . 205--208
                 Craig E. Wills   Process synchronization and IPC  . . . . 209--211
               Peter J. Denning   Virtual memory . . . . . . . . . . . . . 213--216
         Marshall Kirk McKusick   Secondary storage and filesystems  . . . 217--219
              William Stallings   Advances in high-speed networking  . . . 221--223
              Sape J. Mullender   Distributed operating systems  . . . . . 225--227
        Thomas W. Doeppner, Jr.   Distributed file systems and distributed
                                  memory . . . . . . . . . . . . . . . . . 229--231
                Steve J. Chapin   Distributed and multiprocessor
                                  scheduling . . . . . . . . . . . . . . . 233--235
          Howard Jay Siegel and   
             Henry G. Dietz and   
                John K. Antonio   Software support for heterogeneous
                                  computing  . . . . . . . . . . . . . . . 237--239
                Ravi Sandhu and   
            Pierangela Samarati   Authentication, access control, and
                                  audit  . . . . . . . . . . . . . . . . . 241--243
                   Kim B. Bruce   Progress in programming languages  . . . 245--247
              Benjamin Goldberg   Functional programming languages . . . . 249--251
          Stuart Hirshfield and   
                 Raimund K. Ege   Object-oriented programming  . . . . . . 253--255
                  Jacques Cohen   Logic programming and constraint logic
                                  programming  . . . . . . . . . . . . . . 257--259
                  Michael Wolfe   Parallelizing compilers  . . . . . . . . 261--262
                  Luca Cardelli   Type systems . . . . . . . . . . . . . . 263--264
               David A. Schmidt   Programming language semantics . . . . . 265--267
                Ian Sommerville   Software process models  . . . . . . . . 269--271
             Ian M. Holland and   
             Karl J. Lieberherr   Object-oriented design . . . . . . . . . 273--275
              Stephen R. Schach   Testing: principles and practice . . . . 277--279
                Steven P. Reiss   Software tools and environments  . . . . 281--284
                   Peter Wegner   Interoperability . . . . . . . . . . . . 285--287

ACM Computing Surveys
Volume 28, Number 2, June, 1996

               Chris Hankin and   
             Hanne Riis Nielson   Computing Surveys Symposium on Models of
                                  Programming Languages and Computation    293--294
                    Gul A. Agha   Linguistic Paradigms for Programming
                                  Complex Distributed Systems  . . . . . . 295--296
         Jean-Marc Andreoli and   
                  Remo Pareschi   Integrated Computational Paradigms for
                                  Flexible Client-Server Communication . . 297--299
               Paolo Ciancarini   Coordination Models and Languages as
                                  Software Integrators . . . . . . . . . . 300--302
                  David Gilbert   Can Computational Logic Provide a
                                  Paradigm for Both the Specification and
                                  Implementation of Concurrent Systems?    303--305
              Michael Hanus and   
                 Herbert Kuchen   Integration of Functional and Logic
                                  Programming  . . . . . . . . . . . . . . 306--308
                   Alan Mycroft   On Integration of Programming Paradigms  309--311
                    U. S. Reddy   Imperative Functional Programming  . . . 312--314
             Dennis Volpano and   
                 Geoffrey Smith   On the Systematic Design of Web
                                  Languages  . . . . . . . . . . . . . . . 315--317
                  Philip Wadler   Lazy Versus Strict . . . . . . . . . . . 318--320
                   P. N. Benton   On the Relationship Between Formal
                                  Semantics and Static Analysis  . . . . . 321--323
                 Patrick Cousot   Abstract Interpretation  . . . . . . . . 324--328
              Olivier Danvy and   
               Nevin Hentze and   
        Karoline Malmkjær   Resource-bounded partial evaluation  . . 329--332
       Gilberto Filé and   
         Roberto Giacobazzi and   
              Francesco Ranzato   A Unifying View of Abstract Domain
                                  Design . . . . . . . . . . . . . . . . . 333--336
         Suresh Jagannathan and   
                  Andrew Wright   Compiling Functional Languages with Flow
                                  Analysis . . . . . . . . . . . . . . . . 337--339
   Daniel Le Métayer and   
                  David Schmidt   Structural Operational Semantics as a
                                  Basis for Static Program Analysis  . . . 340--343
               Flemming Nielson   Annotated Type and Effect Systems  . . . 344--345
                       Mads Dam   Modalities in Analysis and Verification  346--348
          Robert Cartwright and   
             Matthias Felleisen   Program Verification Through Soft Typing 349--351
           Pierpaolo Degano and   
                 Corrado Priami   Enhanced Operational Semantics . . . . . 352--354
                   C. Barry Jay   Shape in Computing . . . . . . . . . . . 355--357
                  Jens Palsberg   Type Inference for Objects . . . . . . . 358--359
         Alberto Pettorossi and   
              Maurizio Proietti   Rules and Strategies for Transforming
                                  Functional and Logic Programs  . . . . . 360--414
             William Frakes and   
                    Carol Terry   Software Reuse: Metrics and Models . . . 415--435

ACM Computing Surveys
Volume 28, Number 3, September, 1996

             Antero Taivalsaari   On the Notion of Inheritance . . . . . . 438--479
                  Neil D. Jones   An Introduction to Partial Evaluation    480--503
              Joseph A. Gallian   Error Detection Methods  . . . . . . . . 504--517
           Peter Soderquist and   
                  Miriam Leeser   Area and Performance Tradeoffs in
                                  Floating-Point Divide and Square-Root
                                  Implementations  . . . . . . . . . . . . 518--564

ACM Computing Surveys
Volume 28, Number 4, December, 1996

               Peter Wegner and   
                      Jon Doyle   Editorial: Strategic directions in
                                  computing research . . . . . . . . . . . 565--574
                      Anonymous   ACM 50th Anniversary Issue --- Strategic
                                  Directions in Computing Research . . . . 565--845
            Michael C. Loui and   
                Anne Condon and   
                 Faith Fich and   
       Greg N. Frederickson and   
         Andrew V. Goldberg and   
           David S. Johnson and   
              Steven Mahney and   
         Prabhakar Raghavan and   
                John Savage and   
             Alan L. Selman and   
                David B. Shmoys   Strategic directions in research in
                                  theory of computing  . . . . . . . . . . 575--590
           Roberto Tamassia and   
          Pankaj K. Agarwal and   
                Nancy Amato and   
              Danny Z. Chen and   
               David Dobkin and   
              Scot Drysdale and   
             Steven Fortune and   
        Michael T. Goodrich and   
           John Hershberger and   
            Joseph O'Rourke and   
        Franco P. Preparata and   
         Joerg-Rudiger Sack and   
               Subhash Suri and   
             Ioannis Tollis and   
          Jeffrey S. Vitter and   
                 Sue Whitesides   Strategic directions in computational
                                  geometry . . . . . . . . . . . . . . . . 591--606
           Rance Cleaveland and   
            Scott A. Smolka and   
                Rajeev Alur and   
                 Jos Baeten and   
            Jan A. Bergstra and   
                  Eike Best and   
            Rocco De Nicola and   
                 Helen Gill and   
           Roberto Gorrieri and   
           Mohamed G. Gouda and   
           Jan Friso Groote and   
           Tom A. Henzinger and   
             C. A. R. Hoare and   
       Maj. David Luginbuhl and   
               Albert Meyer and   
                Dale Miller and   
              Jayadev Misra and   
               Faron Moller and   
              Ugo Montanari and   
                Amir Pnueli and   
             Sanjiva Prasad and   
           Vaughan R. Pratt and   
             Joseph Sifakis and   
           Bernhard Steffen and   
               Bent Thomsen and   
           Frits Vaandrager and   
                Moshe Vardi and   
                  Pierre Wolper   Strategic directions in concurrency
                                  research . . . . . . . . . . . . . . . . 607--625
           Edmund M. Clarke and   
          Jeannette M. Wing and   
                Rajeev Alur and   
           Rance Cleaveland and   
                 David Dill and   
              Allen Emerson and   
            Stephen Garland and   
              Steven German and   
                John Guttag and   
               Anthony Hall and   
           Thomas Henzinger and   
            Gerard Holzmann and   
                Cliff Jones and   
             Robert Kurshan and   
              Nancy Leveson and   
           Kenneth McMillan and   
                   J. Moore and   
                Doron Peled and   
                Amir Pnueli and   
                John Rushby and   
          Natarajan Shankar and   
             Joseph Sifakis and   
              Prasad Sistla and   
           Bernhard Steffen and   
              Pierre Wolper and   
               Jim Woodcock and   
                    Pamela Zave   Formal methods: state of the art and
                                  future directions  . . . . . . . . . . . 626--643
               Chris Hankin and   
         Hanne Riis Nielson and   
              Jens Palsberg and   
                         others   Strategic directions in research on
                                  programming languages  . . . . . . . . . 644--652
                  Jon Doyle and   
                Thomas Dean and   
                         others   Strategic directions in artificial
                                  intelligence . . . . . . . . . . . . . . 653--670
                   Trevor Mudge   Strategic directions in computer
                                  architecture . . . . . . . . . . . . . . 671--678
                David Clark and   
            Joseph Pasquale and   
                         others   Strategic directions in networks and
                                  telecommunications . . . . . . . . . . . 679--690
           Rachid Guerraoui and   
                         others   Strategic directions in object-oriented
                                  programming  . . . . . . . . . . . . . . 691--700
      Pascal Van Hentenryck and   
             Vijay Saraswat and   
                         others   Strategic directions in constraint
                                  programming  . . . . . . . . . . . . . . 701--726
                Carl Gunter and   
              John Mitchell and   
                   David Notkin   Strategic directions in software
                                  engineering and programming languages    727--737
             Leon Osterweil and   
                         others   Strategic directions in software quality 738--750
          John A. Stankovic and   
                         others   Strategic directions in real-time and
                                  embedded systems . . . . . . . . . . . . 751--763
           Avi Silberschatz and   
                Stan Zdonik and   
                         others   Strategic directions in database systems
                                  --- breaking out of the box  . . . . . . 764--778
            Garth A. Gibson and   
       Jeffrey Scott Vitter and   
                John Wilkes and   
                         others   Strategic directions in storage I/O
                                  issues in large-scale computing  . . . . 779--793
                 Brad Myers and   
                 Jim Hollan and   
                Isabel Cruz and   
               Steve Bryson and   
             Dick Bulterman and   
            Tiziana Catarci and   
               Wayne Citrin and   
            Ephraim Glinert and   
            Jonathan Grudin and   
                  Rob Jacob and   
                Bonnie John and   
            David Kurlander and   
                  Dan Olsen and   
               Randy Pausch and   
             Stuart Shieber and   
            Ben Shneiderman and   
                John Stasko and   
                Gary Strong and   
                Kent Wittenburg   Strategic directions in human-computer
                                  interaction  . . . . . . . . . . . . . . 794--809
                   A. Sameh and   
                 G. Cybenko and   
                   M. Kalos and   
                   K. Neves and   
                    J. Rice and   
                D. Sorensen and   
                    F. Sullivan   Computational science and engineering    810--817
                 Nabil Adam and   
               Yelena Yesha and   
                         others   Strategic directions in electronic
                                  commerce and digital libraries: towards
                                  a digital agora  . . . . . . . . . . . . 818--835
            Allen B. Tucker and   
                         others   Strategic directions in computer science
                                  education  . . . . . . . . . . . . . . . 836--845
                      Anonymous   Author Index: Vols. 24--28 (1992--1996)  846--854
                      Anonymous   Subject Index: Vols. 24--28 (1992--1996) 854--859

ACM Computing Surveys
Volume 28, Number 4es, December, 1996

         Ronald J. Brachman and   
             Hector J. Levesque   Undirected behavior without unbounded
                                  search . . . . . . . . . . . . . . . . . 1:1--1:??
                 Thomas L. Dean   Integrating theory and practice in
                                  planning . . . . . . . . . . . . . . . . 2:1--2:??
                 Tom Dietterich   Machine learning . . . . . . . . . . . . 3:1--3:??
                      Jon Doyle   Cleaving (unto) artificial intelligence  4:1--4:??
                  Cordell Green   Formality helps scalability and
                                  robustness . . . . . . . . . . . . . . . 5:1--5:??
               Barbara J. Grosz   The importance of integration for AI . . 6:1--6:??
                   Ian Horswill   Integrated systems and naturalistic
                                  tasks  . . . . . . . . . . . . . . . . . 7:1--7:??
                  Daphne Koller   Structured representations and
                                  intractability . . . . . . . . . . . . . 8:1--8:??
               Fernando Pereira   Language, computation and artificial
                                  intelligence . . . . . . . . . . . . . . 9:1--9:??
                    Bart Selman   Computational challenges in artificial
                                  intelligence . . . . . . . . . . . . . . 10:1--10:??
                    Yoav Shoham   The open scientific borders of AI, and
                                  the case of economics  . . . . . . . . . 11:1--11:??
               Howard E. Shrobe   Two challenging domains  . . . . . . . . 12:1--12:??
            William R. Swartout   Future directions in knowledge-based
                                  systems  . . . . . . . . . . . . . . . . 13:1--13:??
             Michael P. Wellman   The economic approach to artificial
                                  intelligence . . . . . . . . . . . . . . 14:1--14:??
             Shlomo Zilberstein   Resource-bounded reasoning in
                                  intelligent systems  . . . . . . . . . . 15:1--15:??
          Pankaj K. Agarwal and   
                   Subhash Suri   Simple and practical geometric
                                  algorithms . . . . . . . . . . . . . . . 16:1--16:??
                 Nancy M. Amato   Equipping CAD/CAM systems with geometric
                                  intelligence . . . . . . . . . . . . . . 17:1--17:??
                  Danny Z. Chen   Developing algorithms and software for
                                  geometric path planning problems . . . . 18:1--18:??
              Ioannis G. Tollis   Graph drawing and information
                                  visualization  . . . . . . . . . . . . . 19:1--19:??
              Jeffrey S. Vitter   Communication issues in large-scale
                                  geometric computation  . . . . . . . . . 20:1--20:??
                 George Cybenko   Large-scope computing: the industrial
                                  challenges . . . . . . . . . . . . . . . 21:1--21:??
                   Melvin Kalos   Challenges in computational science  . . 22:1--22:??
                  Kenneth Neves   Thoughts on CSE candidates for
                                  industrial positions . . . . . . . . . . 23:1--23:??
                   John R. Rice   Computational science as one driving
                                  force for all aspects of computing
                                  research . . . . . . . . . . . . . . . . 24:1--24:??
               Francis Sullivan   From theory to practice  . . . . . . . . 25:1--25:??
                      Tom Conte   Importance of profiling and
                                  compatibility  . . . . . . . . . . . . . 26:1--26:??
                      Joel Emer   Incremental versus revolutionary
                                  research . . . . . . . . . . . . . . . . 27:1--27:??
                   Matt Farrens   Distributed decentralized computing  . . 28:1--28:??
                  Dirk Grunwald   Embedded, general-purpose, and
                                  high-performance systems . . . . . . . . 29:1--29:??
                         Kai Li   Applications, storage hierarchy, and
                                  integration  . . . . . . . . . . . . . . 30:1--30:??
                     Jack Mills   An industrial perspective on computer
                                  architecture . . . . . . . . . . . . . . 31:1--31:??
                    David Nagle   Synergy between software and hardware    32:1--32:??
                      Yale Patt   Microarchitecture, compilers and
                                  algorithms . . . . . . . . . . . . . . . 33:1--33:??
                      Jim Smith   Multiscalar as a new architecture
                                  paradigm . . . . . . . . . . . . . . . . 34:1--34:??
                  Wen-Hann Wang   Microprocessor architecture challenges
                                  --- the best is yet to come! . . . . . . 35:1--35:??
                     David Wood   Problems, challenges and the importance
                                  of performance evaluation  . . . . . . . 36:1--36:??
                    Robert Yung   The importance of process technology to
                                  microarchitecture  . . . . . . . . . . . 37:1--37:??
           Jos C. M. Baeten and   
                Jan A. Bergstra   Six issues concerning future directions
                                  in concurrency research  . . . . . . . . 39:1--39:??
                      Eike Best   Some major dichotomies relating to
                                  future research in concurrency . . . . . 40:1--40:??
               Rance Cleaveland   Semantic theories and system design  . . 41:1--41:??
               Roberto Gorrieri   On the power of concurrency theory . . . 42:1--42:??
               Mohamed G. Gouda   Network protocols between exact
                                  specifications and pragmatic
                                  implementations  . . . . . . . . . . . . 43:1--43:??
               Jan Friso Groote   Concurrency theory will set standards
                                  for description and analysis of software 44:1--44:??
                 C. A. R. Hoare   Unifying theories: a personal statement  46:1--46:??
                David Luginbuhl   Issues in concurrent systems research    47:1--47:??
                    Dale Miller   Logical foundations for open system
                                  design . . . . . . . . . . . . . . . . . 48:1--48:??
                  Jayadev Misra   A discipline of multiprogramming . . . . 49:1--49:??
                   Faron Moller   Logics for concurrency: structure versus
                                  automata . . . . . . . . . . . . . . . . 50:1--50:??
                  Ugo Montanari   Causal computing . . . . . . . . . . . . 51:1--51:??
            Rocco De Nicola and   
                Scott A. Smolka   Concurrency: theory and practice . . . . 52:1--52:??
                 Sanjiva Prasad   Models for mobile computing agents . . . 53:1--53:??
               Vaughan R. Pratt   Concurrency concepts: an ongoing search  54:1--54:??
                 Joseph Sifakis   Research directions for concurrency  . . 55:1--55:??
           Bernhard Steffen and   
               Tiziana Margaria   Method engineering for real-life
                                  concurrent systems . . . . . . . . . . . 56:1--56:??
                   Bent Thomsen   Programming languages, analysis tools,
                                  and concurrency theory . . . . . . . . . 57:1--57:??
                  Pierre Wolper   Where is the algorithmic support?  . . . 58:1--58:??
              Alexander Brodsky   Constraint databases: promising
                                  technology or just intellectual
                                  exercise?  . . . . . . . . . . . . . . . 59:1--59:??
              Philippe Codognet   The virtuality of constraints and the
                                  constraints of virtuality  . . . . . . . 60:1--60:??
                     R. Dechter   Bucket elimination: a unifying framework
                                  for processing hard and soft constraints 61:1--61:??
                     M. Dincbas   Constraint programming . . . . . . . . . 62:1--62:??
                     E. Freuder   In pursuit of the holy grail . . . . . . 63:1--63:??
            Manuel Hermenegildo   Some challenges for constraint
                                  programming  . . . . . . . . . . . . . . 64:1--64:??
                  J. Jaffar and   
                         R. Yap   Constraint programming 2000  . . . . . . 65:1--65:??
                       S. Kasif   Towards a constraint-based engineering
                                  framework for algorithm design and
                                  application  . . . . . . . . . . . . . . 66:1--66:??
                 Alan Mackworth   Constraint-based design of embedded
                                  intelligent systems  . . . . . . . . . . 67:1--67:??
                  D. McAllester   The rise of nonlinear mathematical
                                  programming  . . . . . . . . . . . . . . 68:1--68:??
                    Ken McAloon   Constraint-based programming . . . . . . 69:1--69:??
              Ugo Montanari and   
                Francesca Rossi   Constraint solving and programming:
                                  what's next? . . . . . . . . . . . . . . 70:1--70:??
               William J. Older   CLP (intervals)  . . . . . . . . . . . . 71:1--71:??
     Jean-François Puget   Future of constraint programming . . . . 72:1--72:??
                R. Ramakrishnan   Constraints in databases . . . . . . . . 73:1--73:??
                 Vijay Saraswat   Compositional computing  . . . . . . . . 74:1--74:??
                    Gert Smolka   Constraints in OZ  . . . . . . . . . . . 75:1--75:??
          Pascal Van Hentenryck   Constraint programming for combinatorial
                                  search problems  . . . . . . . . . . . . 76:1--76:??
           José Blakeley   Thoughts on directions in database
                                  research . . . . . . . . . . . . . . . . 77:1--77:??
                 Umeshwar Dayal   Database technology at a crossroads  . . 78:1--78:??
                 Sushil Jajodia   Managing security and privacy of
                                  information  . . . . . . . . . . . . . . 79:1--79:??
                 Henry F. Korth   New focal points for research in
                                  database systems . . . . . . . . . . . . 80:1--80:??
                  Guy M. Lohman   You think your DBMS is complex
                                  now\ldots? . . . . . . . . . . . . . . . 81:1--81:??
                    David Lomet   A role for research in the database
                                  industry . . . . . . . . . . . . . . . . 82:1--82:??
                    David Maier   Repackaging database systems . . . . . . 83:1--83:??
                   Frank Manola   Transforming the database system into an
                                  open service concept . . . . . . . . . . 84:1--84:??
             M. Tamer Özsu   Future of database systems: changing
                                  applications and technological
                                  developments . . . . . . . . . . . . . . 85:1--85:??
             Raghu Ramakrishnan   Some promising directions for database
                                  research . . . . . . . . . . . . . . . . 86:1--86:??
             Krithi Ramamritham   Application-oriented database support    87:1--87:??
                  Hans-J. Schek   Improving the role of future database
                                  systems  . . . . . . . . . . . . . . . . 88:1--88:??
       Richard Thomas Snodgrass   The inefficiency of misalignment . . . . 89:1--89:??
                    Jeff Ullman   Moving database theory into database
                                  practice . . . . . . . . . . . . . . . . 90:1--90:??
                 Jennifer Widom   Integrating heterogeneous databases:
                                  lazy or eager? . . . . . . . . . . . . . 91:1--91:??
                 Owen Astrachan   Education goals and priorities . . . . . 92:1--92:??
                      Kim Bruce   Thoughts on computer science education   93:1--93:??
                  Robert Cupper   A revised curriculum framework . . . . . 94:1--94:??
                  Peter Denning   Business designs of the university . . . 95:1--95:??
                  Scot Drysdale   What should we teach?  . . . . . . . . . 96:1--96:??
                Charles Kelemen   First courses for nonmajors and public
                                  understanding of computer science  . . . 97:1--97:??
              Catherine McGeoch   Research in the curriculum, and the Web  98:1--98:??
                      Yale Patt   First courses and fundamentals . . . . . 99:1--99:??
             Richard Proulx and   
                 Richard Rosala   The future of computer science education 100:1--100:??
                       Roy Rada   Calling for a virtual computing college  101:1--101:??
                   Eric Roberts   Directions in computer science education 102:1--102:??
              Lynn Andrea Stein   Interactive programming: revolutionizing
                                  introductory computer science  . . . . . 103:1--103:??
                   Allen Tucker   Crisis in computer science education . . 104:1--104:??
              Nabil R. Adam and   
                   Shamim Naqvi   Universal access in digital libraries    105:1--105:??
                Baruch Awerbuch   Maximizing gross network product (GNP):
                                  resource management on the GII . . . . . 106:1--106:??
                   Alex Brodsky   Constraint database technology for
                                  electronic trade with complex objectives 107:1--107:??
                Robert Grossman   Database mining challenges for digital
                                  libraries  . . . . . . . . . . . . . . . 108:1--108:??
                    Jim Johnson   The physics of politics in the
                                  information age  . . . . . . . . . . . . 109:1--109:??
       Barbara T. Blaustein and   
         Catherine McCollum and   
                Arnon Rosenthal   Flexible security policies for digital
                                  libraries  . . . . . . . . . . . . . . . 110:1--110:??
               Anna-Lena Neches   The future of electronic commerce: a
                                  pragmatic view . . . . . . . . . . . . . 111:1--111:??
               Karen Bennet and   
                   Jacob Slonim   The electronic commerce position paper   112:1--112:??
                   Ouri Wolfson   Infrastructure and cost models for
                                  digital libraries  . . . . . . . . . . . 113:1--113:??
              Howard D. Wactlar   The next generation electronic library
                                  --- capturing the experience . . . . . . 114:1--114:??
                    Rajeev Alur   Next steps in formal verification  . . . 115:1--115:??
              Edmund Clarke and   
              Jeannette M. Wing   Tools and partial analysis . . . . . . . 116:1--116:??
               Rance Cleaveland   Formality and software design  . . . . . 117:1--117:??
                  Steven German   Research goals for formal methods  . . . 118:1--118:??
            Thomas A. Henzinger   Some myths about formal verification . . 119:1--119:??
                Gerard Holzmann   On-the-fly model checking  . . . . . . . 120:1--120:??
                    Cliff Jones   Formal methods light . . . . . . . . . . 121:1--121:??
                    Doron Peled   User interfaces for formal methods . . . 122:1--122:??
                    John Rushby   Enhancing the utility of formal methods  123:1--123:??
                 Joseph Sifakis   Safety, security and quality . . . . . . 124:1--124:??
                  Prasad Sistla   Hybrid and incremental modelchecking
                                  techniques . . . . . . . . . . . . . . . 125:1--125:??
           Bernhard Steffen and   
               Tiziana Margaria   Tools get formal methods into practice   126:1--126:??
                  Pierre Wolper   The meaning of ``formal''  . . . . . . . 127:1--127:??
                   Jim Woodcock   Software engineering research directions 128:1--128:??
                   Steve Bryson   Implications of near-real-time
                                  three-dimensional interfaces . . . . . . 129:1--129:??
           Dick C. A. Bulterman   Making the technology serve the user . . 130:1--130:??
                Tiziana Catarci   Databases and the Web: new requirements
                                  for an easy access . . . . . . . . . . . 131:1--131:??
                   Wayne Citrin   Strategic directions in visual languages
                                  research . . . . . . . . . . . . . . . . 132:1--132:??
                 Isabel F. Cruz   Tailorable information visualization . . 133:1--133:??
         Ephraim P. Glinert and   
            R. Lindsay Todd and   
                 G. Bowden Wise   The adaptive multi-interface multimodal
                                  environment  . . . . . . . . . . . . . . 134:1--134:??
                Jonathan Grudin   The end of exile . . . . . . . . . . . . 135:1--135:??
                James D. Hollan   Strategic issues for human-computer
                                  interaction  . . . . . . . . . . . . . . 136:1--136:??
            Yannis E. Ioannidis   Visual user interfaces for database
                                  systems  . . . . . . . . . . . . . . . . 137:1--137:??
             Robert J. K. Jacob   The future of input devices  . . . . . . 138:1--138:??
                 Bonnie E. John   Evaluating usability evaluation
                                  techniques . . . . . . . . . . . . . . . 139:1--139:??
                David Kurlander   Thoughts on user interface processes and
                                  agendas  . . . . . . . . . . . . . . . . 140:1--140:??
                  Brad A. Myers   Programmability and heuristics in the
                                  user interfaces  . . . . . . . . . . . . 141:1--141:??
              Dan R. Olsen, Jr.   Computational resources and the Internet 142:1--142:??
              Stuart M. Shieber   A call for collaborative interfaces  . . 143:1--143:??
                Ben Shneiderman   Advanced graphic user interfaces:
                                  elastic and tightly coupled windows  . . 144:1--144:??
                    John Stasko   Future research directions in
                                  human-computer interaction . . . . . . . 145:1--145:??
                 Gary W. Strong   Human-centered information systems
                                  (HCIS) . . . . . . . . . . . . . . . . . 146:1--146:??
                Kent Wittenburg   The WWW information glut: implications
                                  for next-generation HCI technologies . . 147:1--147:??
                       M. Aksit   Separation and composition of concerns
                                  in the object-oriented model . . . . . . 148:1--148:??
                    A. P. Black   Object-oriented languages: the next
                                  generation . . . . . . . . . . . . . . . 149:1--149:??
                    L. Cardelli   Bad engineering properties of
                                  object-orient languages  . . . . . . . . 150:1--150:??
                      P. Cointe   Reflective languages and metalevel
                                  architectures  . . . . . . . . . . . . . 151:1--151:??
                     J. Coplien   Broadening beyond objects to patterns
                                  and to other paradigms . . . . . . . . . 152:1--152:??
                   R. Guerraoui   Distributed programming abstractions . . 153:1--153:??
                    G. Kiczales   Aspect-oriented programming  . . . . . . 154:1--154:??
                         D. Lea   Specification, architecture, and
                                  interoperability . . . . . . . . . . . . 155:1--155:??
                  K. Lieberherr   From transience to persistence in
                                  object-oriented programming:
                                  architectures and patterns . . . . . . . 156:1--156:??
                      O. Madsen   Strategic research directions in
                                  object-oriented programming  . . . . . . 157:1--157:??
                   B. Magnusson   Technology integration . . . . . . . . . 158:1--158:??
           José Meseguer   Why OOP needs new semantic foundations   159:1--159:??
        H. Mössenböck   Trends in object-oriented programming    160:1--160:??
                    J. Palsberg   Compiler technology for object-oriented
                                  languages  . . . . . . . . . . . . . . . 161:1--161:??
                     D. Schmidt   Using design patterns to guide the
                                  development of reusable object-oriented
                                  software . . . . . . . . . . . . . . . . 162:1--162:??
                  Luca Cardelli   Global computation . . . . . . . . . . . 163:1--163:??
                 Charles Consel   Program adaptation based on program
                                  transformation . . . . . . . . . . . . . 164:1--164:??
                 Patrick Cousot   Program analysis: the abstract
                                  interpretation perspective . . . . . . . 165:1--165:??
                  Michael Hanus   Integration of declarative paradigms:
                                  benefits and challenges  . . . . . . . . 166:1--166:??
       Daniel Le Métayer   Program analysis for software
                                  engineering: new applications, new
                                  requirements, new tools  . . . . . . . . 167:1--167:??
               Flemming Nielson   Perspectives on program analysis . . . . 168:1--168:??
                 Martin Odersky   Challenges in type systems research  . . 169:1--169:??
                   Robert Paige   Future directions in program
                                  transformations  . . . . . . . . . . . . 170:1--170:??
         Alberto Pettorossi and   
              Maurizio Proietti   Future directions in program
                                  transformation . . . . . . . . . . . . . 171:1--171:??
                  John Reynolds   Beyond ML  . . . . . . . . . . . . . . . 172:1--172:??
                  Jon G. Riecke   Semantics: the description of
                                  computational structures . . . . . . . . 173:1--173:??
                  Barbara Ryder   The future of program analysis . . . . . 174:1--174:??
               David A. Schmidt   On the need for a popular formal
                                  semantics  . . . . . . . . . . . . . . . 175:1--175:??
                 Dennis Volpano   Provably secure programming languages
                                  for remote evaluation  . . . . . . . . . 176:1--176:??
               Reinhard Wilhelm   Program analysis --- a toolmaker's
                                  perspective  . . . . . . . . . . . . . . 177:1--177:??
                     Alan Burns   Broadening real-time systems research    178:1--178:??
                   Kevin Jeffay   Technical and educational challenges for
                                  real-time computing  . . . . . . . . . . 179:1--179:??
                     Mike Jones   Consumer real-time systems . . . . . . . 180:1--180:??
                      Gary Koob   Large-scale distributed real-time
                                  systems  . . . . . . . . . . . . . . . . 181:1--181:??
                      Insup Lee   Formal verification, testing and
                                  checking of real-time systems  . . . . . 182:1--182:??
                  John Lehoczky   Analytical methods for real-time
                                  computing  . . . . . . . . . . . . . . . 183:1--183:??
                       Jane Liu   Validation of timing properties  . . . . 184:1--184:??
                         Al Mok   Firm real-time systems . . . . . . . . . 185:1--185:??
             Krithi Ramamritham   Predictability: demonstrating real-time
                                  properties . . . . . . . . . . . . . . . 186:1--186:??
                        Lui Sha   Real-time in the real world  . . . . . . 187:1--187:??
                 Jack Stankovic   The pervasiveness of real-time computing 188:1--188:??
              Andre van Tilborg   Real-time research in the Department of
                                  Defense  . . . . . . . . . . . . . . . . 189:1--189:??
                  Gregory Abowd   Software engineering and programming
                                  language considerations for ubiquitous
                                  computing  . . . . . . . . . . . . . . . 190:1--190:??
                 Craig Chambers   Towards reusable, extensible components  192:1--192:??
             Lori A. Clarke and   
                      Peri Tarr   New functionality for programming
                                  languages  . . . . . . . . . . . . . . . 193:1--193:??
        William G. Griswold and   
             Richard Wolski and   
             Scott B. Baden and   
            Stephen J. Fink and   
                  Scott R. Kohn   Programming language requirements for
                                  the next millennium  . . . . . . . . . . 194:1--194:??
              Robert Harper and   
                      Peter Lee   Research in programming languages for
                                  composability, safety, and performance   195:1--195:??
                     Paul Hudak   Building domain-specific embedded
                                  languages  . . . . . . . . . . . . . . . 196:1--196:??
                      Sam Kamin   The challenge of language technology
                                  transfer . . . . . . . . . . . . . . . . 197:1--197:??
                Melody M. Moore   Representation issues for reengineering
                                  interactive systems  . . . . . . . . . . 199:1--199:??
                  Jens Palsberg   Software evolution and integration . . . 200:1--200:??
                  Bill Scherlis   Beyond coding  . . . . . . . . . . . . . 201:1--201:??
                   Jack Wileden   Programming languages and software
                                  engineering: past, present and future    202:1--202:??
                 Lori A. Clarke   How do we improve software quality and
                                  how do we show that it matters?  . . . . 203:1--203:??
             Richard A. DeMillo   Mission-critical applications,
                                  commercial value and software quality    204:1--204:??
               William McKeeman   Separating concerns in software quality  205:1--205:??
          Edward F. Miller, Jr.   Getting quality methods into practice    206:1--206:??
             Alok Choudhary and   
                     David Kotz   Large-scale file systems with the
                                  flexibility of databases . . . . . . . . 207:1--207:??
           Thomas H. Cormen and   
            Michael T. Goodrich   A bridging model for parallel
                                  computation, communication, and I/O  . . 208:1--208:??
            Garth A. Gibson and   
                    John Wilkes   Self-managing network-attached storage   209:1--209:??
           Richard R. Muntz and   
                Joseph Pasquale   System-level design issues for storage
                                  I/O  . . . . . . . . . . . . . . . . . . 210:1--210:??
          M. Satyanarayanan and   
          Carla Schlatter Ellis   Adaptation: the key to mobile I/O  . . . 211:1--211:??
       Darren Erik Vengroff and   
           Jeffrey Scott Vitter   I/O-efficient algorithms and
                                  environments . . . . . . . . . . . . . . 212:1--212:??
                     Paul Green   The impact of the Web on networking
                                  research . . . . . . . . . . . . . . . . 213:1--213:??
                     Jim Kurose   Future directions in networking research 214:1--214:??
                Joseph Pasquale   Towards Internet computing . . . . . . . 215:1--215:??
                   Dana Angluin   A 1996 snapshot of computational
                                  learning theory  . . . . . . . . . . . . 216:1--216:??
                     Faith Fich   Infrastructure issues related to theory
                                  of computing research  . . . . . . . . . 217:1--217:??
             Oded Goldreich and   
                  Avi Wigderson   Theory of computing: a scientific
                                  perspective  . . . . . . . . . . . . . . 218:1--218:??
              Robert Harper and   
                  John Mitchell   ML and beyond  . . . . . . . . . . . . . 219:1--219:??


ACM Computing Surveys
Volume 29, Number 1, March, 1997

                   Peter Wegner   Editorial Statement  . . . . . . . . . . 1--2
                 M. M. Reid and   
               R. J. Millar and   
                    N. D. Black   Second-Generation Image Coding: An
                                  Overview . . . . . . . . . . . . . . . . 3--29
            Micha\l Walicki and   
                  Sigurd Meldal   Algebraic approaches to nondeterminism
                                  --- an overview  . . . . . . . . . . . . 30--81
                  Fong Pong and   
                  Michel Dubois   Verification Techniques for Cache
                                  Coherence Protocols  . . . . . . . . . . 82--126

ACM Computing Surveys
Volume 29, Number 2, June, 1997

                   Peter Wegner   About this Issue \ldots  . . . . . . . . 127--127
           Richard A. Uhlig and   
                Trevor N. Mudge   Trace-Driven Memory Simulation: a Survey 128--170
            Vangelis T. Paschos   A Survey of Approximately Optimal
                                  Solutions to Some Covering and Packing
                                  Problems . . . . . . . . . . . . . . . . 171--209

ACM Computing Surveys
Volume 29, Number 3, September, 1997

                    Tommy Thorn   Programming languages for mobile code    213--239
                  Philip Wadler   How to declare an imperative . . . . . . 240--263
                   Qiang Ji and   
             Michael M. Marefat   Machine interpretation of CAD data for
                                  manufacturing applications . . . . . . . 264--311

ACM Computing Surveys
Volume 29, Number 4, December, 1997

                    Pamela Zave   Classification of research efforts in
                                  requirements engineering . . . . . . . . 315--321
              Hyacinth S. Nwana   Is computer science education in crisis? 322--324
      Frederick M. Weinhaus and   
               Venkat Devarajan   Texture mapping $3$D models of
                                  real-world scenes  . . . . . . . . . . . 325--365
                   Hong Zhu and   
         Patrick A. V. Hall and   
                 John H. R. May   Software unit test coverage and adequacy 366--427
                      Anonymous   Errata . . . . . . . . . . . . . . . . . 428--428
                      Anonymous   Author index: Vols. 25--29 (1993--1997)  429--437
                      Anonymous   Author index . . . . . . . . . . . . . . 429--437
                      Anonymous   Subject index: Vols. 25--29 (1993--1997) 437--442
                  Subject index   Subject index  . . . . . . . . . . . . . 437--442


ACM Computing Surveys
Volume 30, Number 1, March, 1998

                   Peter Wegner   About this issue . . . . . . . . . . . . 1--1
           Scott M. Lewandowski   Frameworks for component-based
                                  client/server computing  . . . . . . . . 3--27
                   Ran El-Yaniv   Competitive solutions for online
                                  financial problems . . . . . . . . . . . 28--69
            Alexander Thomasian   Concurrency control: methods,
                                  performance, and analysis  . . . . . . . 70--119

ACM Computing Surveys
Volume 30, Number 2, June, 1998

        David B. Skillicorn and   
                 Domenico Talia   Models and languages for parallel
                                  computation  . . . . . . . . . . . . . . 123--169
               Volker Gaede and   
            Oliver Günther   Multidimensional access methods  . . . . 170--231
             Reidar Conradi and   
           Bernhard Westfechtel   Version models for software
                                  configuration management . . . . . . . . 232--282

ACM Computing Surveys
Volume 30, Number 3, September, 1998

                      Anonymous   Contents: Computing Surveys' Electronic
                                  Symposium on Partial Evaluating:
                                  \path=http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/=  283--283
                      Anonymous   Editorial  . . . . . . . . . . . . . . . 284--284
               Peter Wegner and   
                  Marvin Israel   Editorial  . . . . . . . . . . . . . . . 284--284
              Olivier Danvy and   
          Robert Glück and   
                 Peter Thiemann   1998 Symposium on Partial Evaluation . . 285--290
          Jean-Pierre Briot and   
           Rachid Guerraoui and   
               Klaus-Peter Lohr   Concurrency and Distribution in
                                  Object-Oriented Programming  . . . . . . 291--329
         Saleh E. Abdullahi and   
              Graem A. Ringwood   Garbage Collecting the Internet: a
                                  Survey of Distributed Garbage Collection 330--373
              Prasant Mohapatra   Wormhole Routing Techniques for Directly
                                  Connected Multicomputer Systems  . . . . 374--410

ACM Computing Surveys
Volume 30, Number 3es, September, 1998

                    David Basin   Logical framework based program
                                  development  . . . . . . . . . . . . . . 1:1--1:??
                   J. Field and   
                 J. Heering and   
                   T. B. Dinesh   Equations as a uniform framework for
                                  partial evaluation and abstract
                                  interpretation . . . . . . . . . . . . . 2:1--2:??
                  Andrei Klimov   Program specialization vs. program
                                  composition  . . . . . . . . . . . . . . 3:1--3:??
           Michael Leuschel and   
                 B. Martens and   
                  D. de Schreye   Some achievements and prospects in
                                  partial deduction  . . . . . . . . . . . 4:1--4:??
                Torben Mogensen   Inherited limits . . . . . . . . . . . . 5:1--5:??
         Alberto Pettorossi and   
              Maurizio Proietti   Program specialization via algorithmic
                                  unfold/fold transformations  . . . . . . 6:1--6:??
             Akihiko Takano and   
               Zhenjiang Hu and   
                Masato Takeichi   Program transformation in calculational
                                  form . . . . . . . . . . . . . . . . . . 7:1--7:??
            Philip Wickline and   
                  Peter Lee and   
             Frank Pfenning and   
                   Rowan Davies   Modal types as staging specifications
                                  for run-time code generation . . . . . . 8:1--8:??
             Maria Alpuente and   
            Moreno Falaschi and   
                   German Vidal   A unifying view of functional and logic
                                  program specialization . . . . . . . . . 9:1--9:??
           Michele Bugliesi and   
            Anna Ciampolini and   
              Evelina Lamma and   
                    Paola Mello   Optimizing modular logic languages . . . 10:1--10:??
              Sandro Etalle and   
             Maurizio Gabbrieli   Partial evaluation of concurrent
                                  constraint languages . . . . . . . . . . 11:1--11:??
            J. P. Gallagher and   
                      L. Lafave   The role of trace abstractions in
                                  program specialization algorithms  . . . 12:1--12:??
                  John Hatcliff   Foundations for partial evaluation of
                                  functional programs with computational
                                  effects  . . . . . . . . . . . . . . . . 13:1--13:??
                    John Hughes   Type specialization  . . . . . . . . . . 14:1--14:??
                  L. Lafave and   
                J. P. Gallagher   Extending the power of automatic
                                  constraint-based partial evaluators  . . 15:1--15:??
       Konstantinos Sagonas and   
               Michael Leuschel   Extending partial deduction to tabled
                                  execution: some results and open issues  16:1--16:??
             Sandrine Blazy and   
                 Philippe Facon   Partial evaluation for program
                                  comprehension  . . . . . . . . . . . . . 17:1--17:??
               Tristan Cazenave   Synthesis of an efficient tactical
                                  theorem prover for the game of go  . . . 18:1--18:??
                  C. Consel and   
                  L. Hornof and   
                  R. Marlet and   
                  G. Muller and   
                S. Thibault and   
            E.-N. Volanschi and   
                  J. Lawall and   
                 J. Noyé   Tempo: specializing systems applications
                                  and beyond . . . . . . . . . . . . . . . 19:1--19:??
                  C. Consel and   
                  L. Hornof and   
                  R. Marlet and   
                  G. Muller and   
                S. Thibault and   
            E.-N. Volanschi and   
                  J. Lawall and   
                 J. Noyé   Partial evaluation for software
                                  engineering  . . . . . . . . . . . . . . 20:1--20:??
                   Scott Draves   Partial evaluation for media processing  21:1--21:??
              Matthew Dwyer and   
              John Hatcliff and   
                 Muhammad Nanda   Using partial evaluation to enable
                                  verification of concurrent software  . . 22:1--22:??
                 Mark Leone and   
                      Peter Lee   Dynamic specialization in the Fabius
                                  system . . . . . . . . . . . . . . . . . 23:1--23:??
              Oscar Waddell and   
                 R. Kent Dybvig   Visualizing partial evaluation . . . . . 24:1--24:??
            Yuan Chang Liou and   
                   Yih Nen Jeng   A transfinite interpolation method of
                                  grid generation based on multipoints . . 105--113

ACM Computing Surveys
Volume 30, Number 4, December, 1998

                   Peter Wegner   About this issue\ldots . . . . . . . . . 411--411
          Pankaj K. Agarwal and   
                   Micha Sharir   Efficient algorithms for geometric
                                  optimization . . . . . . . . . . . . . . 412--458
                  Roel Wieringa   A survey of structured and
                                  object-oriented software specification
                                  methods and techniques . . . . . . . . . 459--527
             Fabio Crestani and   
              Mounia Lalmas and   
 Cornelis J. Van Rijsbergen and   
                  Iain Campbell   ``Is this document relevant? \ldots
                                  probably'': a survey of probabilistic
                                  models in information retrieval  . . . . 528--552


ACM Computing Surveys
Volume 31, Number 1, March, 1999

          Felix C. Gärtner   Fundamentals of fault-tolerant
                                  distributed computing in asynchronous
                                  environments . . . . . . . . . . . . . . 1--26
                    Mengchi Liu   Deductive database languages: problems
                                  and solutions  . . . . . . . . . . . . . 27--62
            Norman W. Paton and   
              Oscar Díaz   Active database systems  . . . . . . . . 63--103

ACM Computing Surveys
Volume 31, Number 2, June, 1999

                 Kevin L. Mills   Introduction to the Electronic Symposium
                                  on Computer-Supported Cooperative Work   105--115
                      Anonymous   Table of Contents: Electronic Symposium
                                  on Computer-Supported Cooperative Work   116--116
                   Jin Jing and   
      Abdelsalam Sumi Helal and   
               Ahmed Elmagarmid   Client-server computing in mobile
                                  environments . . . . . . . . . . . . . . 117--157
             Betty Salzberg and   
            Vassilis J. Tsotras   Comparison of access methods for
                                  time-evolving data . . . . . . . . . . . 158--221

ACM Computing Surveys
Volume 31, Number 2es, June, 1999

                 Kevin L. Mills   Introduction to the Electronic Symposium
                                  on Computer-Supported Cooperative Work   1:1--1:??
             Steven McCanne and   
                Eric Brewer and   
                 Randy Katz and   
                  Elan Amir and   
             Yatin Chawathe and   
                 Todd Hodes and   
          Ketan Mayer-Patel and   
             Suchitra Raman and   
              Cynthia Romer and   
             Angela Schuett and   
                Andrew Swan and   
              Teck-Lee Tung and   
                  Tina Wong and   
                 Kristin Wright   MASH: enabling scalable multipoint
                                  collaboration  . . . . . . . . . . . . . 2:1--2:??
                    Son Dao and   
                 Eddie Shek and   
             Asha Vellaikal and   
           Richard R. Muntz and   
                Lixia Zhang and   
          Miodrag Potkonjak and   
                   Ouri Wolfson   Semantic multicast: intelligently
                                  sharing collaborative sessions . . . . . 3:1--3:??
                    Ivan Marsic   DISCIPLE: a framework for multimodal
                                  collaboration in heterogeneous
                                  environments . . . . . . . . . . . . . . 4:1--4:??
             Daniel A. Reed and   
                Simon M. Kaplan   Orbit/Virtue: collaboration and
                                  visualization toolkits . . . . . . . . . 5:1--5:??
                   Kevin Martin   Creation and performance analysis of
                                  user representations in collaborative
                                  virtual environments . . . . . . . . . . 6:1--6:??
             Francis Kubala and   
               Sean Colbath and   
                  Daben Liu and   
                   John Makhoul   Rough'n'Ready: a meeting recorder and
                                  browser  . . . . . . . . . . . . . . . . 7:1--7:??
               David Payton and   
                 Mike Daily and   
                   Kevin Martin   Dynamic collaborator discovery in
                                  information intensive environments . . . 8:1--8:??
          Howard D. Wactlar and   
        Michael G. Christel and   
     Alexander G. Hauptmann and   
                    Yihong Gong   Informedia Experience-on-Demand:
                                  capturing, integrating and communicating
                                  experiences across people, time and
                                  space  . . . . . . . . . . . . . . . . . 9:1--9:??
              Michael Wolverton   Task-based information management  . . . 10:1--10:??
            James H. Morris and   
      Christine M. Neuwirth and   
       Susan Harkness Regli and   
          Ravinder Chandhok and   
             Geoffrey C. Wenger   Interface issues in computer support for
                                  asynchronous communication . . . . . . . 11:1--11:??
           Larry S. Jackson and   
                    Ed Grossman   Integration of synchronous and
                                  asynchronous collaboration activities    12:1--12:??
              Jonathan Rees and   
             Sarah Ferguson and   
         Sankar Virdhagriswaran   Consistency management for distributed
                                  collaboration  . . . . . . . . . . . . . 13:1--13:??
             Craig Thompson and   
              Paul Pazandak and   
             Venu Vasudevan and   
               Frank Manola and   
                Mark Palmer and   
                 Gil Hansen and   
                     Tom Bannon   Intermediary Architecture: Interposing
                                  middleware object services between Web
                                  client and server  . . . . . . . . . . . 14:1--14:??
            Laurie Damianos and   
          Lynette Hirschman and   
             Robyn Kozierok and   
              Jeffrey Kurtz and   
           Andrew Greenberg and   
            Kimberley Walls and   
           Sharon Laskowski and   
                   Jean Scholtz   Evaluation for collaborative systems . . 15:1--15:??
             M. Ranganathan and   
             Laurent Andrey and   
            Virginie Schaal and   
          Jean-Philippe Favreau   Re-configurable distributed scripting    16:1--16:??
               Samuel Bayer and   
         Laurie E. Damianos and   
             Robyn Kozierok and   
                    James Mokwa   The MITRE Multi-Modal Logger: its use in
                                  evaluation of collaborative systems  . . 17:1--17:??
           Jeffrey L. Kurtz and   
         Laurie E. Damianos and   
             Robyn Kozierok and   
              Lynette Hirschman   The MITRE map navigation experiment  . . 18:1--18:??

ACM Computing Surveys
Volume 31, Number 3, September, 1999

                  P. Degano and   
                R. Gorrieri and   
    A. Marchetti-Spaccamela and   
                      P. Wegner   Computing Surveys' Electronic Symposium
                                  on the Theory of Computation . . . . . . 223--225
                      Anonymous   Symposium on the Theory of Computation:
                                  Table of Contents  . . . . . . . . . . . 226--226
               Piero Fraternali   Tools and approaches for developing
                                  data-intensive Web applications: a
                                  survey . . . . . . . . . . . . . . . . . 227--263
                 A. K. Jain and   
                M. N. Murty and   
                    P. J. Flynn   Data clustering: a review  . . . . . . . 264--323

ACM Computing Surveys
Volume 31, Number 3es, September, 1999

                  P. Degano and   
                R. Gorrieri and   
    A. Marchetti-Spaccamela and   
                      P. Wegner   Computing surveys' electronic symposium
                                  on the theory of computation . . . . . . 1:1--1:??
              H. Noltemeier and   
                H.-C. Wirth and   
                   S. O. Krumke   Network design and improvement . . . . . 2:1--2:??
          Giuseppe Cattaneo and   
              Giuseppe Italiano   Algorithm engineering  . . . . . . . . . 3:1--3:??
             Susanne Albers and   
               Stefano Leonardi   On-line algorithms . . . . . . . . . . . 4:1--4:??
               Chris Hankin and   
             Pasquale Malacaria   Program analysis games . . . . . . . . . 5:1--5:??
                  Patric Cousot   Directions for research in approximate
                                  system analysis  . . . . . . . . . . . . 6:1--6:??
                 Marco Bernardo   Let's evaluate performance algebraically 7:1--7:??
              Juraj Hromkovi\vc   Some contributions of the study of
                                  abstract communication complexity to
                                  other areas of computer science  . . . . 8:1--8:??
              Hartmut Ehrig and   
              Gabriele Taentzer   Graphical representation and graph
                                  transformation . . . . . . . . . . . . . 9:1--9:??
            Donald Sannella and   
               Andrzei Tarlecki   Algebraic methods for specification and
                                  formal development of programs . . . . . 10:1--10:??
                Dale Miller and   
            Catuscia Palmidessi   Foundational aspects of syntax . . . . . 11:1--11:??
           Dora Giammarresi and   
                Antonio Restivo   Extending formal language hierarchies to
                                  higher dimensions  . . . . . . . . . . . 12:1--12:??
                 Corrado Priami   Operational methods in theoretical
                                  computer science . . . . . . . . . . . . 13:1--13:??
                    Kohei Honda   Semantics study and reality of computing 14:1--14:??
               Rusins Freivalds   How to simulate free will in a
                                  computational device . . . . . . . . . . 15:1--15:??
                Jiri Wiedermann   Simulating the mind: a gauntlet thrown
                                  to computer science  . . . . . . . . . . 16:1--16:??

ACM Computing Surveys
Volume 31, Number 4, December, 1999

               Helen Ashman and   
      Rosemary Michelle Simpson   Computing Surveys' Electronic Symposium
                                  on Hypertext and Hypermedia: Editorial   325--334
              Grigoris Antoniou   A tutorial on default logics . . . . . . 337--359
                  Sami Iren and   
               Paul D. Amer and   
              Phillip T. Conrad   The transport layer: tutorial and survey 360--404
              Yu-Kwong Kwok and   
                   Ishfaq Ahmad   Static scheduling algorithms for
                                  allocating directed task graphs to
                                  multiprocessors  . . . . . . . . . . . . 406--471

ACM Computing Surveys
Volume 31, Number 4es, December, 1999

               Helen Ashman and   
      Rosemary Michelle Simpson   Computing Surveys' Electronic Symposium
                                  on Hypertext and Hypermedia: Editorial   1:1--1:??
               Uffe K. Wiil and   
     Peter J. Nürnberg and   
                John J. Leggett   Hypermedia research directions: an
                                  infrastructure perspective . . . . . . . 2:1--2:??
              Andrew E. Treloar   Applying hypertext and hypermedia to
                                  scholarly journals enables both product
                                  and process innovation . . . . . . . . . 3:1--3:??
            Douglas Tudhope and   
                Daniel Cunliffe   Semantically indexed hypermedia: linking
                                  information disciplines  . . . . . . . . 4:1--4:??
               Jon M. Kleinberg   Hubs, authorities, and communities . . . 5:1--5:??
              Sougata Mukherjea   Information visualization for hypermedia
                                  systems  . . . . . . . . . . . . . . . . 6:1--6:??
           Harri Oinas-Kukkonen   Flexible CASE and hypertext  . . . . . . 7:1--7:??
              Gustavo Rossi and   
    Fernando Daniel Lyardet and   
                 Daniel Schwabe   Developing hypermedia applications with
                                  methods and patterns . . . . . . . . . . 8:1--8:??
                Leslie Carr and   
                 Wendy Hall and   
                 David De Roure   The evolution of hypertext link services 9:1--9:??
              Paul H. Lewis and   
                 Wendy Hall and   
             Leslie A. Carr and   
                 David De Roure   The significance of linking  . . . . . . 10:1--10:??
            Siegfried Reich and   
                Leslie Carr and   
             David De Roure and   
                     Wendy Hall   Where have you been from here? Trials in
                                  hypertext systems  . . . . . . . . . . . 11:1--11:??
                Paul De Bra and   
          Peter Brusilovsky and   
               Geert-Jan Houben   Adaptive hypermedia: from systems to
                                  framework  . . . . . . . . . . . . . . . 12:1--12:??
                Wen-Syan Li and   
        K. Selçuk Candan   Integrating content search with
                                  structure analysis for hypermedia
                                  retrieval and management . . . . . . . . 13:1--13:??
      Frank M. Shipman, III and   
          Catherine C. Marshall   Spatial hypertext: an alternative to
                                  navigational and semantic links  . . . . 14:1--14:??
             Richard Bodner and   
                  Mark Chignell   Dynamic hypertext: querying and linking  15:1--15:??
               Richard W. Kopak   Functional link typing in hypertext  . . 16:1--16:??
             Soumen Chakrabarti   Recent results in automatic Web resource
                                  discovery  . . . . . . . . . . . . . . . 17:1--17:??
            Jonathan Furner and   
                David Ellis and   
                  Peter Willett   Inter-linker consistency in the manual
                                  construction of hypertext documents  . . 18:1--18:??
                 Mark Bernstein   Structural patterns and hypertext
                                  rhetoric . . . . . . . . . . . . . . . . 19:1--19:??
            Kenneth M. Anderson   Supporting software engineering with
                                  open hypermedia  . . . . . . . . . . . . 20:1--20:??
               Steven J. DeRose   XML linking  . . . . . . . . . . . . . . 21:1--21:??
               Stephen J. Green   Lexical semantics and automatic
                                  hypertext construction . . . . . . . . . 22:1--22:??
              Lynda Hardman and   
     Jacco van Ossenbruggen and   
             Lloyd Rutledge and   
           Dick C. A. Bulterman   Hypermedia: the link with time . . . . . 23:1--23:??
                   Fabio Vitali   Versioning hypermedia  . . . . . . . . . 24:1--24:??
              Steve Benford and   
                 Ian Taylor and   
           David Brailsford and   
             Boriana Koleva and   
                Mike Craven and   
                Mike Fraser and   
               Gail Reynard and   
               Chris Greenhalgh   Three dimensional visualization of the
                                  World Wide Web . . . . . . . . . . . . . 25:1--25:??
           Megan Quentin-Baxter   Quantitative evidence for differences
                                  between learners making use of passive
                                  hypermedia learning environments . . . . 26:1--26:??
             Ross Wilkinson and   
                Alan F. Smeaton   Automatic link generation  . . . . . . . 27:1--27:??
                  Hugh C. Davis   Hypertext link integrity . . . . . . . . 28:1--28:??
             Michael Bieber and   
                    Joonhee Yoo   Hypermedia: a design philosophy  . . . . 29:1--29:??
            David F. Brailsford   Separable hyperstructure and delayed
                                  link binding . . . . . . . . . . . . . . 30:1--30:??
               Fabio Vitali and   
                 Michael Bieber   Hypermedia on the Web: what will it
                                  take?  . . . . . . . . . . . . . . . . . 31:1--31:??
             Michael Bieber and   
       Harri Oinas-Kukkonen and   
             V. Balasubramanian   Hypertext functionality  . . . . . . . . 32:1--32:??
            Theodor Holm Nelson   Xanalogical structure, needed now more
                                  than ever: parallel documents, deep
                                  links to content, deep versioning, and
                                  deep re-use  . . . . . . . . . . . . . . 33:1--33:??
                  Janet Verbyla   Unlinking the link . . . . . . . . . . . 34:1--34:??
            Robert Cailliau and   
                   Helen Ashman   Hypertext in the Web --- a history . . . 35:1--35:??
                Andries van Dam   Education: the unfinished revolution . . 36:1--36:??
            Theodor Holm Nelson   The unfinished revolution and Xanadu . . 37:1--37:??
          Douglas Engelbart and   
                 Jeff Ruilifson   Bootstrapping our collective
                                  intelligence . . . . . . . . . . . . . . 38:1--38:??


ACM Computing Surveys
Volume 32, Number 1, March, 2000

                 P. Bellini and   
               R. Mattolini and   
                        P. Nesi   Temporal logics for real-time system
                                  specification  . . . . . . . . . . . . . 12--42
            Wilhelm Hasselbring   Programming languages and systems for
                                  prototyping concurrent applications  . . 43--79
                  Palash Sarkar   A brief history of cellular automata . . 80--107

ACM Computing Surveys
Volume 32, Number 1es, March, 2000

               Mohamed E. Fayad   Introduction to the Computing Surveys'
                                  Electronic Symposium on Object-Oriented
                                  Application Frameworks . . . . . . . . . 1:1--1:??
             Davide Brugali and   
                   Katia Sycara   Frameworks and pattern languages: an
                                  intriguing relationship  . . . . . . . . 2:1--2:??
                  Jan Bosch and   
                Peter Molin and   
           Michael Mattsson and   
              PerOlof Bengtsson   Object-oriented framework-based software
                                  development: problems and experiences    3:1--3:??
           Mohamed E. Fayad and   
                  David S. Hamu   Enterprise frameworks: guidelines for
                                  selection  . . . . . . . . . . . . . . . 4:1--4:??
           Dirk Bäumer and   
              Guido Gryczan and   
                 Rolf Knoll and   
          Carola Lilienthal and   
                Dirk Riehle and   
         Heinz Züllighoven   Domain-driven framework layering in
                                  large systems  . . . . . . . . . . . . . 5:1--5:??
              Wolfgang Pree and   
                  Kai Koskimies   Framelets --- small and loosely coupled
                                  frameworks . . . . . . . . . . . . . . . 6:1--6:??
                Yingwu Wang and   
                Dilip Patel and   
                Graham King and   
                  Ian Court and   
              Geoff Staples and   
               Maraget Ross and   
                  Mohamad Fayad   On built-in test reuse in
                                  object-oriented framework design . . . . 7:1--7:??
           Görel Hedin and   
 Jòrgen Lindskov Knudsen   On the role of language constructs for
                                  framework design . . . . . . . . . . . . 8:1--8:??
             James E. Carey and   
               Brent A. Carlson   Deferring design decisions in an
                                  application framework  . . . . . . . . . 9:1--9:??
                Dirk Riehle and   
           Roger Brudermann and   
               Thomas Gross and   
            Kai-Uwe Mätzel   Pattern density and role modeling of an
                                  object transport service . . . . . . . . 10:1--10:??
               Mehmet Aksit and   
       Francesco Marcelloni and   
             Bedir Tekinerdogan   Developing object-oriented frameworks
                                  using domain models  . . . . . . . . . . 11:1--11:??
            Giancarlo Succi and   
             Andrea Valerio and   
            Tullio Vernazza and   
           Massimo Fenaroli and   
               Paolo Predonzani   Framework extraction with domain
                                  analysis . . . . . . . . . . . . . . . . 12:1--12:??
                 Pierre Roy and   
                 Anne Liret and   
         François Pachet   The framework approach for constraint
                                  satisfaction . . . . . . . . . . . . . . 13:1--13:??
             Neelam Soundarajan   Documenting framework behavior . . . . . 14:1--14:??
                Greg Butler and   
           Rudolf K. Keller and   
                    Hafedh Mili   A framework for framework documentation  15:1--15:??
  António Rito Silva and   
       Francisco Assis Rosa and   
        Teresa Gonçalves   Framework description using
                                  concern-specific design patterns
                                  composition  . . . . . . . . . . . . . . 16:1--16:??
            Garry Froehlich and   
            H. James Hoover and   
               Paul G. Sorenson   Choosing an object-oriented domain
                                  framework  . . . . . . . . . . . . . . . 17:1--17:??
                Jagdish Bansiya   Evaluating framework architecture
                                  structural stability . . . . . . . . . . 18:1--18:??
             Zakaria Maamar and   
                 Bernard Moulin   An overview of software agent-oriented
                                  frameworks . . . . . . . . . . . . . . . 19:1--19:??
       Elizabeth A. Kendall and   
       P. V. Murali Krishna and   
               C. B. Suresh and   
             Chira G. V. Pathak   An application framework for intelligent
                                  and mobile agents  . . . . . . . . . . . 20:1--20:??
             Davide Brugali and   
                   Katia Sycara   Towards agent oriented application
                                  frameworks . . . . . . . . . . . . . . . 21:1--21:??
        Beno\^\it Garbinato and   
               Rachid Guerraoui   An open framework for reliable
                                  distributed computing  . . . . . . . . . 22:1--22:??
            John Michaloski and   
               Sushil Birla and   
               C. Jerry Yen and   
               Richard Igou and   
                 George Weinert   An open system framework for
                                  component-based CNC machines . . . . . . 23:1--23:??
              Lidia Fuentes and   
          Josée M. Troya   Towards an open multimedia service
                                  framework  . . . . . . . . . . . . . . . 24:1--24:??
                 Verlyn Johnson   The San Francisco Project: Business
                                  process components and infrastructure    25:1--25:??
       Riccardo Capobianchi and   
      Alberto Coen-Porisini and   
             Dino Mandrioli and   
                Angelo Morzenti   A framework architecture for supervision
                                  and control systems  . . . . . . . . . . 26:1--26:??
               Gerti Kappel and   
       Stefan Rausch-Schott and   
          Werner Retschitzegger   A framework for workflow management
                                  systems based on objects, rules and
                                  roles  . . . . . . . . . . . . . . . . . 27:1--27:??
               Michael Koch and   
               Jürgen Koch   Application of frameworks in groupware
                                  --- the Iris group editor environment    28:1--28:??
              Partha Pratim Pal   A Framework for Isolating Connection
                                  Exception Management . . . . . . . . . . 29:1--29:10
              Partha pratim Pal   A framework for isolating connection
                                  exception management . . . . . . . . . . 29:1--29:??
              Gustavo Rossi and   
          Alejandra Garrido and   
                 Daniel Schwabe   Navigating between objects. Lessons from
                                  an object-oriented framework perspective 30:1--30:??
   J.-M. Jézéquel   An object-oriented framework for data
                                  parallelism  . . . . . . . . . . . . . . 31:1--31:??
                   Raman Kannan   PAcceptor and SConnector frameworks:
                                  combining concurrency and communication  32:1--32:??
            Jürgen Buchner   HotDoc: a framework for compound
                                  documents  . . . . . . . . . . . . . . . 33:1--33:??
              Serge Demeyer and   
              Koen De Hondt and   
               Patrick Steyaert   Consistent framework documentation with
                                  computed links and framework contracts   34:1--34:??
                Peter T. Whelan   Experiences and issues with SEMATECH's
                                  CIM framework  . . . . . . . . . . . . . 35:1--35:??
              Raja Harinath and   
         Jaideep Srivastava and   
             Jim Richardson and   
                   Mark Foresti   Experiences with an object oriented
                                  framework for distributed control
                                  applications . . . . . . . . . . . . . . 36:1--36:??
              Ehab Al-Shaer and   
              Mohamed Fayed and   
            Hussein Abdel-Wahab   Adaptive object-oriented filtering
                                  framework for event management
                                  applications . . . . . . . . . . . . . . 37:1--37:??
              Volker Luckas and   
               Ralf Dörner   Experience form the future --- using
                                  object-orientation concepts for $3$D
                                  visualization and validation of
                                  industrial scenarios . . . . . . . . . . 38:1--38:??
         Douglas C. Schmidt and   
                    James C. Hu   Developing flexible and high-performance
                                  Web servers with frameworks and patterns 39:1--39:??
                 Ezra Ebner and   
              Weiguang Shao and   
                   Wei-Tek Tsai   The five-module framework for Internet
                                  application development  . . . . . . . . 40:1--40:??
Constantinos A. Constantinides and   
                 Atef Bader and   
            Tzilla H. Elrad and   
                P. Netinant and   
               Mohamed E. Fayad   Designing an aspect-oriented framework
                                  in an object-oriented environment  . . . 41:1--41:??

ACM Computing Surveys
Volume 32, Number 2, June, 2000

               Carlos A. Coello   An updated survey of GA-based
                                  multiobjective optimization techniques   109--143
              Mei Kobayashi and   
                  Koichi Takeda   Information retrieval on the Web . . . . 144--173
       Steven P. Vanderwiel and   
                 David J. Lilja   Data prefetch mechanisms . . . . . . . . 174--199

ACM Computing Surveys
Volume 32, Number 3, September, 2000

                   Helen Ashman   Electronic document addressing: dealing
                                  with change  . . . . . . . . . . . . . . 201--212
              Iffat H. Kazi and   
             Howard H. Chen and   
           Berdenia Stanley and   
                 David J. Lilja   Techniques for obtaining high
                                  performance in Java programs . . . . . . 213--240
     Dejan S. Miloji\vci\'c and   
               Fred Douglis and   
           Yves Paindaveine and   
            Richard Wheeler and   
                  Songnian Zhou   Process migration  . . . . . . . . . . . 241--299
            Eleanor Rieffel and   
                 Wolfgang Polak   An introduction to quantum computing for
                                  non-physicists . . . . . . . . . . . . . 300--335

ACM Computing Surveys
Volume 32, Number 4, December, 2000

Carlos Iván Chesñevar and   
     Ana Gabriela Maguitman and   
           Ronald Prescott Loui   Logical models of argument . . . . . . . 337--383
           David M. Hilbert and   
              David F. Redmiles   Extracting usability information from
                                  user interface events  . . . . . . . . . 384--421
                Donald Kossmann   The state of the art in distributed
                                  query processing . . . . . . . . . . . . 422--469


ACM Computing Surveys
Volume 33, Number 1, March, 2001

            Russell Greiner and   
           Christian Darken and   
                N. Iwan Santoso   Efficient reasoning  . . . . . . . . . . 1--30
                Gonzalo Navarro   A guided tour to approximate string
                                  matching . . . . . . . . . . . . . . . . 31--88
                  Karsten Weihe   A software engineering perspective on
                                  algorithmics . . . . . . . . . . . . . . 89--134

ACM Computing Surveys
Volume 33, Number 2, June, 2001

           Pierpaolo Degano and   
                 Corrado Priami   Enhanced operational semantics: a tool
                                  for describing and analyzing concurrent
                                  systems  . . . . . . . . . . . . . . . . 135--176
             Bev Littlewood and   
                Peter Popov and   
               Lorenzo Strigini   Modeling software design diversity: a
                                  review . . . . . . . . . . . . . . . . . 177--208
           Jeffrey Scott Vitter   External memory algorithms and data
                                  structures: dealing with massive data    209--271

ACM Computing Surveys
Volume 33, Number 3, September, 2001

        Edgar Chávez and   
            Gonzalo Navarro and   
        Ricardo Baeza-Yates and   
José Luis Marroquín   Searching in metric spaces . . . . . . . 273--321
        Christian Böhm and   
           Stefan Berchtold and   
                 Daniel A. Keim   Searching in high-dimensional spaces:
                                  Index structures for improving the
                                  performance of multimedia databases  . . 322--373
             Evgeny Dantsin and   
               Thomas Eiter and   
              Georg Gottlob and   
                Andrei Voronkov   Complexity and expressive power of logic
                                  programming  . . . . . . . . . . . . . . 374--425

ACM Computing Surveys
Volume 33, Number 4, December, 2001

        Gregory V. Chockler and   
                Idit Keidar and   
                Roman Vitenberg   Group communication specifications: a
                                  comprehensive study  . . . . . . . . . . 427--469
            Melody Y. Ivory and   
                Marti A. Hearst   The state of the art in automating
                                  usability evaluation of user interfaces  470--516
           Pieter H. Hartel and   
                     Luc Moreau   Formalizing the safety of Java, the Java
                                  Virtual Machine, and Java card . . . . . 517--558


ACM Computing Surveys
Volume 34, Number 1, March, 2002

            Fabrizio Sebastiani   Machine learning in automated text
                                  categorization . . . . . . . . . . . . . 1--47
                 Weiyi Meng and   
                 Clement Yu and   
                   King-Lup Liu   Building efficient and effective
                                  metasearch engines . . . . . . . . . . . 48--89
              Michael F. McTear   Spoken dialogue technology: enabling the
                                  conversational user interface  . . . . . 90--169

ACM Computing Surveys
Volume 34, Number 2, June, 2002

          Katherine Compton and   
                    Scott Hauck   Reconfigurable computing: a survey of
                                  systems and software . . . . . . . . . . 171--210
              Sylvain Petitjean   A survey of methods for recovering
                                  quadrics in triangle meshes  . . . . . . 211--262
         Valeria Cardellini and   
       Emiliano Casalicchio and   
          Michele Colajanni and   
                   Philip S. Yu   The state of the art in locally
                                  distributed Web-server systems . . . . . 263--311

ACM Computing Surveys
Volume 34, Number 3, September, 2002

          Josep Díaz and   
                Jordi Petit and   
                    Maria Serna   A survey of graph layout problems  . . . 313--356
                   Hala Elaarag   Improving TCP performance over mobile
                                  networks . . . . . . . . . . . . . . . . 357--374
    E. N. (Mootaz) Elnozahy and   
             Lorenzo Alvisi and   
                Yi-Min Wang and   
               David B. Johnson   A survey of rollback-recovery protocols
                                  in message-passing systems . . . . . . . 375--408

ACM Computing Surveys
Volume 34, Number 4, December, 2002

              Yuri Leontiev and   
         M. Tamer Özsu and   
                  Duane Szafron   On type systems for object-oriented
                                  database programming languages . . . . . 409--449
                   G. Denys and   
                F. Piessens and   
                    F. Matthijs   A survey of customizability in operating
                                  systems research . . . . . . . . . . . . 450--468
            Devanshu Dhyani and   
               Wee Keong Ng and   
             Sourav S. Bhowmick   A survey of Web metrics  . . . . . . . . 469--503
                Jörg Rothe   Some facets of complexity theory and
                                  cryptography: a five-lecture tutorial    504--549
          Pankaj K. Agarwal and   
         Leonidas J. Guibas and   
       Herbert Edelsbrunner and   
              Jeff Erickson and   
              Michael Isard and   
           Sariel Har-Peled and   
           John Hershberger and   
           Christian Jensen and   
              Lydia Kavraki and   
              Patrice Koehl and   
                   Ming Lin and   
             Dinesh Manocha and   
           Dimitris Metaxas and   
              Brian Mirtich and   
                David Mount and   
           S. Muthukrishnan and   
                 Dinesh Pai and   
               Elisha Sacks and   
              Jack Snoeyink and   
               Subhash Suri and   
                  Ouri Wolefson   Algorithmic issues in modeling motion    550--572


ACM Computing Surveys
Volume 35, Number 1, March, 2003

              Jason Dedrick and   
            Vijay Gurbaxani and   
             Kenneth L. Kraemer   Information technology and economic
                                  performance: a critical review of the
                                  empirical evidence . . . . . . . . . . . 1--28
               Theo Ungerer and   
              Borut Robi\vc and   
                   Jurij \vSilc   A survey of processors with explicit
                                  multithreading . . . . . . . . . . . . . 29--63
           William R. Scott and   
               Gerhard Roth and   
    Jean-François Rivest   View planning for automated
                                  three-dimensional object reconstruction
                                  and inspection . . . . . . . . . . . . . 64--96

ACM Computing Surveys
Volume 35, Number 2, June, 2003

                    John Aycock   A brief history of just-in-time  . . . . 97--113
        Patrick Th. Eugster and   
           Pascal A. Felber and   
           Rachid Guerraoui and   
           Anne-Marie Kermarrec   The many faces of publish/subscribe  . . 114--131
        William N. Robinson and   
       Suzanne D. Pawlowski and   
               Vecheslav Volkov   Requirements interaction management  . . 132--190
              Sandeep Purao and   
                Vijay Vaishnavi   Product metrics for object-oriented
                                  systems  . . . . . . . . . . . . . . . . 191--221

ACM Computing Surveys
Volume 35, Number 3, September, 2003

Árpád Beszédes and   
              Rudolf Ferenc and   
      Tibor Gyimóthy and   
        André Dolenc and   
                Konsta Karsisto   Survey of code-size reduction methods    223--267
             Christian Blum and   
                    Andrea Roli   Metaheuristics in combinatorial
                                  optimization: Overview and conceptual
                                  comparison . . . . . . . . . . . . . . . 268--308
             Sandro Rafaeli and   
                David Hutchison   A survey of key management for secure
                                  group communication  . . . . . . . . . . 309--329

ACM Computing Surveys
Volume 35, Number 4, December, 2003

             Utz Westermann and   
                  Wolfgang Klas   An analysis of XML database solutions
                                  for the management of MPEG-7 media
                                  descriptions . . . . . . . . . . . . . . 331--373
           Stefan Podlipnig and   
   Laszlo Böszörmenyi   A survey of Web cache replacement
                                  strategies . . . . . . . . . . . . . . . 374--398
                    W. Zhao and   
               R. Chellappa and   
             P. J. Phillips and   
                   A. Rosenfeld   Face recognition: a literature survey    399--458


ACM Computing Surveys
Volume 36, Number 1, March, 2004

         Wesley M. Johnston and   
           J. R. Paul Hanna and   
              Richard J. Millar   Advances in dataflow programming
                                  languages  . . . . . . . . . . . . . . . 1--34
               M. L. Kherfi and   
                    D. Ziou and   
                    A. Bernardi   Image Retrieval from the World Wide Web:
                                  Issues, Techniques, and Systems  . . . . 35--67
         Mitchell A. Harris and   
             Edward M. Reingold   Line drawing, leap years, and Euclid . . 68--80

ACM Computing Surveys
Volume 36, Number 2, June, 2004

               Cemil Kirbas and   
                   Francis Quek   A review of vessel extraction techniques
                                  and algorithms . . . . . . . . . . . . . 81--121
                  Jacques Cohen   Bioinformatics --- an introduction for
                                  computer scientists  . . . . . . . . . . 122--158
                    Hanan Samet   Object-based and image-based object
                                  representations  . . . . . . . . . . . . 159--217

ACM Computing Surveys
Volume 36, Number 3, September, 2004

             Stefan Pleisch and   
           André Schiper   Approaches to fault-tolerant and
                                  transactional mobile agent
                                  execution---an algorithmic view  . . . . 219--262
               Anna Formica and   
              Michele Missikoff   Inheritance processing and conflicts in
                                  structural generalization hierarchies    263--290
Swaminathan Sivasubramanian and   
           Michal Szymaniak and   
           Guillaume Pierre and   
              Maarten van Steen   Replication for Web hosting systems  . . 291--334

ACM Computing Surveys
Volume 36, Number 4, December, 2004

Stephanos Androutsellis-Theotokis and   
             Diomidis Spinellis   A survey of peer-to-peer content
                                  distribution technologies  . . . . . . . 335--371
       Xavier Défago and   
       André Schiper and   
      Péter Urbán   Total order broadcast and multicast
                                  algorithms: Taxonomy and survey  . . . . 372--421
          Reuven Bar-Yehuda and   
               Keren Bendel and   
                 Ari Freund and   
                    Dror Rawitz   Local ratio: a unified framework for
                                  approximation algorithms. In Memoriam:
                                  Shimon Even 1935--2004 . . . . . . . . . 422--463


ACM Computing Surveys
Volume 37, Number 1, March, 2005

              Rajendra Bose and   
                     James Frew   Lineage retrieval for scientific data
                                  processing: a survey . . . . . . . . . . 1--28
             William Tolone and   
              Gail-Joon Ahn and   
               Tanusree Pai and   
                 Seng-Phil Hong   Access control in collaborative systems  29--41
              Yasushi Saito and   
                   Marc Shapiro   Optimistic replication . . . . . . . . . 42--81

ACM Computing Surveys
Volume 37, Number 2, June, 2005

           Caitlin Kelleher and   
                   Randy Pausch   Lowering the barriers to programming: a
                                  taxonomy of programming environments and
                                  languages for novice programmers . . . . 83--137
                   Eran Gal and   
                   Sivan Toledo   Algorithms and data structures for flash
                                  memories . . . . . . . . . . . . . . . . 138--163
                    Paolo Santi   Topology control in wireless ad hoc and
                                  sensor networks  . . . . . . . . . . . . 164--194

ACM Computing Surveys
Volume 37, Number 3, September, 2005

      Vasanth Venkatachalam and   
                  Michael Franz   Power reduction techniques for
                                  microprocessor systems . . . . . . . . . 195--237
                David E. Taylor   Survey and taxonomy of packet
                                  classification techniques  . . . . . . . 238--275

ACM Computing Surveys
Volume 37, Number 4, December, 2005

           Marco Eichelberg and   
                Thomas Aden and   
        Jörg Riesmeier and   
               Asuman Dogac and   
                Gokce B. Laleci   A survey and analysis of Electronic
                                  Healthcare Record standards  . . . . . . 277--315
              Marjan Mernik and   
                Jan Heering and   
              Anthony M. Sloane   When and how to develop domain-specific
                                  languages  . . . . . . . . . . . . . . . 316--344
            Benjamin Bustos and   
             Daniel A. Keim and   
              Dietmar Saupe and   
             Tobias Schreck and   
              Dejan V. Vrani\'c   Feature-based similarity search in $3$D
                                  object databases . . . . . . . . . . . . 345--387


ACM Computing Surveys
Volume 38, Number 1, March, 2006

         Tobias Bjerregaard and   
              Shankar Mahadevan   A survey of research and practices of
                                  Network-on-Chip  . . . . . . . . . . . . 1:1--1:51
       Deepayan Chakrabarti and   
             Christos Faloutsos   Graph mining: Laws, generators, and
                                  algorithms . . . . . . . . . . . . . . . 2:1--2:69
         Srikumar Venugopal and   
             Rajkumar Buyya and   
         Kotagiri Ramamohanarao   A taxonomy of Data Grids for distributed
                                  data sharing, management, and processing 3:1--3:53

ACM Computing Surveys
Volume 38, Number 2, March, 2006

                Jordi Turmo and   
               Alicia Ageno and   
                  Neus Catal\`a   Adaptive information extraction  . . . . 4:1--4:47
               Aaron Ceglar and   
                John F. Roddick   Association mining . . . . . . . . . . . 5:1--5:42
               Justin Zobel and   
                Alistair Moffat   Inverted files for text search engines   6:1--6:56

ACM Computing Surveys
Volume 38, Number 3, September, 2006

                    Jing Ma and   
           Jeffrey V. Nickerson   Hands-on, simulated, and remote
                                  laboratories: a comparative literature
                                  review . . . . . . . . . . . . . . . . . 7:1--7:24
               Alice Miller and   
         Alastair Donaldson and   
                   Muffy Calder   Symmetry in temporal logic model
                                  checking . . . . . . . . . . . . . . . . 8:1--8:36
               Liqiang Geng and   
             Howard J. Hamilton   Interestingness measures for data
                                  mining: a survey . . . . . . . . . . . . 9:1--9:32
                   Goetz Graefe   Implementing sorting in database systems 10:1--10:37

ACM Computing Surveys
Volume 38, Number 4, December, 2006

               Richard A. Frost   Realization of natural language
                                  interfaces using lazy functional
                                  programming  . . . . . . . . . . . . . . 11:1--11:54
             Lucas Bordeaux and   
             Youssef Hamadi and   
                   Lintao Zhang   Propositional Satisfiability and
                                  Constraint Programming: a comparative
                                  survey . . . . . . . . . . . . . . . . . 12:1--12:54
               Alper Yilmaz and   
                 Omar Javed and   
                   Mubarak Shah   Object tracking: a survey  . . . . . . . 13:1--13:45


ACM Computing Surveys
Volume 39, Number 1, April, 2007

       Johann Van Der Merwe and   
              Dawoud Dawoud and   
               Stephen McDonald   A survey on peer-to-peer key management
                                  for mobile ad hoc networks . . . . . . . 1:1--1:45
            Gonzalo Navarro and   
              Veli Mäkinen   Compressed full-text indexes . . . . . . 2:1--2:61
                   Tao Peng and   
         Christopher Leckie and   
         Kotagiri Ramamohanarao   Survey of network-based defense
                                  mechanisms countering the DoS and DDoS
                                  problems . . . . . . . . . . . . . . . . 3:1--3:42

ACM Computing Surveys
Volume 39, Number 2, July, 2007

           Simon J. Puglisi and   
                W. F. Smyth and   
               Andrew H. Turpin   A taxonomy of suffix array construction
                                  algorithms . . . . . . . . . . . . . . . 4:1--4:31
                 Dong Zheng and   
                    Yan Liu and   
                Jiying Zhao and   
         Abdulmotaleb El Saddik   A survey of RST invariant image
                                  watermarking algorithms  . . . . . . . . 5:1--5:91
               Dagmar Bruss and   
Gábor Erdélyi and   
                  Tim Meyer and   
               Tobias Riege and   
                Jörg Rothe   Quantum cryptography: a survey . . . . . 6:1--6:27

ACM Computing Surveys
Volume 39, Number 3, September, 2007

            Suleyman Uludag and   
              King-Shan Lui and   
            Klara Nahrstedt and   
               Gregory Brewster   Analysis of Topology Aggregation
                                  techniques for QoS routing . . . . . . . 7:1--7:31
                Mark Truran and   
             James Goulding and   
                   Helen Ashman   Autonomous authoring tools for hypertext 8:1--8:30
        Eduardo F. Nakamura and   
     Antonio A. F. Loureiro and   
             Alejandro C. Frery   Information fusion for wireless sensor
                                  networks: Methods, models, and
                                  classifications  . . . . . . . . . . . . 9:1--9:55

ACM Computing Surveys
Volume 39, Number 4, November, 2007

            Akrivi Katifori and   
        Constantin Halatsis and   
            George Lepouras and   
          Costas Vassilakis and   
           Eugenia Giannopoulou   Ontology visualization methods --- a
                                  survey . . . . . . . . . . . . . . . . . 10:1--10:43
            David B. Thomas and   
                  Wayne Luk and   
         Philip H. W. Leong and   
             John D. Villasenor   Gaussian random number generators  . . . 11:1--11:38
     Konstantinos Morfonios and   
            Stratis Konakas and   
           Yannis Ioannidis and   
                Nikolaos Kotsis   ROLAP implementations of the data cube   12:1--12:53


ACM Computing Surveys
Volume 40, Number 1, February, 2008

               Renzo Angles and   
              Claudio Gutierrez   Survey of graph database models  . . . . 1:1--1:39
             Ricardo Fabbri and   
        Luciano Da F. Costa and   
           Julio C. Torelli and   
                Odemir M. Bruno   $2$D Euclidean distance transform
                                  algorithms: a comparative survey . . . . 2:1--2:44
               Raman Ramsin and   
               Richard F. Paige   Process-centered review of object
                                  oriented software development
                                  methodologies  . . . . . . . . . . . . . 3:1--3:89

ACM Computing Surveys
Volume 40, Number 2, April, 2008

                Iwan Vosloo and   
              Derrick G. Kourie   Server-centric Web frameworks: an
                                  overview . . . . . . . . . . . . . . . . 4:1--4:33
             Ritendra Datta and   
               Dhiraj Joshi and   
                     Jia Li and   
                  James Z. Wang   Image retrieval: Ideas, influences, and
                                  trends of the new age  . . . . . . . . . 5:1--5:60
         Vincenzo De Florio and   
                  Chris Blondia   A survey of linguistic structures for
                                  application-level fault tolerance  . . . 6:1--6:37

ACM Computing Surveys
Volume 40, Number 3, August, 2008

        Markus C. Huebscher and   
                Julie A. McCann   A survey of autonomic computing ---
                                  degrees, models, and applications  . . . 7:1--7:28
                     Adam Lopez   Statistical machine translation  . . . . 8:1--8:49
            Peter C. Chapin and   
           Christian Skalka and   
                   X. Sean Wang   Authorization in trust management:
                                  Features and foundations . . . . . . . . 9:1--9:48
            Stefan Miltchev and   
          Jonathan M. Smith and   
        Vassilis Prevelakis and   
          Angelos Keromytis and   
              Sotiris Ioannidis   Decentralized access control in
                                  distributed file systems . . . . . . . . 10:1--10:30

ACM Computing Surveys
Volume 40, Number 4, October, 2008

              Ihab F. Ilyas and   
            George Beskales and   
             Mohamed A. Soliman   A survey of top-$k$ query processing
                                  techniques in relational database
                                  systems  . . . . . . . . . . . . . . . . 11:1--11:58
                S. Biasotti and   
             L. De Floriani and   
              B. Falcidieno and   
                 P. Frosini and   
                  D. Giorgi and   
                   C. Landi and   
                 L. Papaleo and   
                   M. Spagnuolo   Describing shapes by
                                  geometrical-topological properties of
                                  real functions . . . . . . . . . . . . . 12:1--12:87


ACM Computing Surveys
Volume 41, Number 1, December, 2008

            Jens Bleiholder and   
                  Felix Naumann   Data fusion  . . . . . . . . . . . . . . 1:1--1:41
              Andy Cockburn and   
                Amy Karlson and   
           Benjamin B. Bederson   A review of overview+detail, zooming,
                                  and focus+context interfaces . . . . . . 2:1--2:31
           Michael Benedikt and   
                 Christoph Koch   XPath leashed  . . . . . . . . . . . . . 3:1--3:54
           Richard B. Borie and   
             R. Gary Parker and   
                 Craig A. Tovey   Solving problems on recursively
                                  constructed graphs . . . . . . . . . . . 4:1--4:51
             Jose A. Onieva and   
              Jianying Zhou and   
                   Javier Lopez   Multiparty nonrepudiation: a survey  . . 5:1--5:43
            Kate A. Smith-Miles   Cross-disciplinary perspectives on
                                  meta-learning for algorithm selection    6:1--6:25
             Besma R. Abidi and   
             Nash R. Aragam and   
                     Yi Yao and   
                 Mongi A. Abidi   Survey and analysis of multimodal sensor
                                  planning and integration for wide area
                                  surveillance . . . . . . . . . . . . . . 7:1--7:36

ACM Computing Surveys
Volume 41, Number 2, February, 2009

                   Nathan Brown   Chemoinformatics --- an introduction for
                                  computer scientists  . . . . . . . . . . 8:1--8:38
          Robert M. Hierons and   
            Kirill Bogdanov and   
          Jonathan P. Bowen and   
           Rance Cleaveland and   
               John Derrick and   
                Jeremy Dick and   
            Marian Gheorghe and   
                Mark Harman and   
             Kalpesh Kapoor and   
                Paul Krause and   
        Gerald Lüttgen and   
       Anthony J. H. Simons and   
            Sergiy Vilkomir and   
         Martin R. Woodward and   
                  Hussein Zedan   Using formal specifications to support
                                  testing  . . . . . . . . . . . . . . . . 9:1--9:76
                Roberto Navigli   Word sense disambiguation: a survey  . . 10:1--10:69
            Alicia Iriberri and   
                    Gondy Leroy   A life-cycle perspective on online
                                  community success  . . . . . . . . . . . 11:1--11:29
               Xiaoguang Qi and   
               Brian D. Davison   Web page classification: Features and
                                  algorithms . . . . . . . . . . . . . . . 12:1--12:31
             Carlo A. Furia and   
            Matteo Pradella and   
                   Matteo Rossi   Comments on temporal logics for
                                  real-time system specification . . . . . 13:1--13:5

ACM Computing Surveys
Volume 41, Number 3, July, 2009

             Gary H. Sockut and   
            Balakrishna R. Iyer   Online reorganization of databases . . . 14:1--14:136
             Varun Chandola and   
           Arindam Banerjee and   
                    Vipin Kumar   Anomaly detection: a survey  . . . . . . 15:1--15:58
               Carlo Batini and   
           Cinzia Cappiello and   
         Chiara Francalanci and   
                 Andrea Maurino   Methodologies for data quality
                                  assessment and improvement . . . . . . . 16:1--16:52
          Claudio Carpineto and   
        Stanislaw Osi\'nski and   
            Giovanni Romano and   
                    Dawid Weiss   A survey of Web clustering engines . . . 17:1--17:38

ACM Computing Surveys
Volume 41, Number 4, October, 2009

             C. A. R. Hoare and   
                  Jayadev Misra   Preface to special issue on software
                                  verification . . . . . . . . . . . . . . 18:1--18:3
               Jim Woodcock and   
          Peter Gorm Larsen and   
            Juan Bicarregui and   
                John Fitzgerald   Formal methods: Practice and experience  19:1--19:36
              Natarajan Shankar   Automated deduction for verification . . 20:1--20:56
               Ranjit Jhala and   
                 Rupak Majumdar   Software model checking  . . . . . . . . 21:1--21:54
             C. A. R. Hoare and   
              Jayadev Misra and   
            Gary T. Leavens and   
              Natarajan Shankar   The verified software initiative: a
                                  manifesto  . . . . . . . . . . . . . . . 22:1--22:8


ACM Computing Surveys
Volume 42, Number 1, December, 2009

              Kevin Hoffman and   
                 David Zage and   
           Cristina Nita-Rotaru   A survey of attack and defense
                                  techniques for reputation systems  . . . 1:1--1:31
                     Hubie Chen   A rendezvous of logic, complexity, and
                                  algebra  . . . . . . . . . . . . . . . . 2:1--2:32
               Alexis Kirke and   
           Eduardo Reck Miranda   A survey of computer systems for
                                  expressive music performance . . . . . . 3:1--3:41
              James A. Muir and   
           Paul C. Van Oorschot   Internet geolocation: Evasion and
                                  counterevasion . . . . . . . . . . . . . 4:1--4:23
              Matthew Edman and   
              Bülent Yener   On anonymity in an electronic society: a
                                  survey of anonymous communication
                                  systems  . . . . . . . . . . . . . . . . 5:1--5:35

ACM Computing Surveys
Volume 42, Number 2, February, 2010

             Carlo A. Furia and   
             Dino Mandrioli and   
            Angelo Morzenti and   
                   Matteo Rossi   Modeling time in computing: a taxonomy
                                  and a comparative survey . . . . . . . . 6:1--6:59
         Bernhard Haslhofer and   
                  Wolfgang Klas   A survey of techniques for achieving
                                  metadata interoperability  . . . . . . . 7:1--7:37
                  Zhiwen Yu and   
                Yuichi Nakamura   Smart meeting systems: a survey of
                                  state-of-the-art and open issues . . . . 8:1--8:20
               Jaume Abella and   
                    Xavier Vera   Electromigration for microarchitects . . 9:1--9:18

ACM Computing Surveys
Volume 42, Number 3, March, 2010

              Felix Salfner and   
                 Maren Lenk and   
                 Miroslaw Malek   A survey of online failure prediction
                                  methods  . . . . . . . . . . . . . . . . 10:1--10:42
             Yildiray Kabak and   
                   Asuman Dogac   A survey and analysis of electronic
                                  business document standards  . . . . . . 11:1--11:31
              Sergio Ilarri and   
               Eduardo Mena and   
           Arantza Illarramendi   Location-dependent query processing:
                                  Where we are and where we are heading    12:1--12:73

ACM Computing Surveys
Volume 42, Number 4, June, 2010

  João M. P. Cardoso and   
             Pedro C. Diniz and   
               Markus Weinhardt   Compiling for reconfigurable computing:
                                  a survey . . . . . . . . . . . . . . . . 13:1--13:65
        Benjamin C. M. Fung and   
                    Ke Wang and   
                   Rui Chen and   
                   Philip S. Yu   Privacy-preserving data publishing: a
                                  survey of recent developments  . . . . . 14:1--14:53
                    Wen Gao and   
              Yonghong Tian and   
               Tiejun Huang and   
                     Qiang Yang   Vlogging: a survey of videoblogging
                                  technology on the Web  . . . . . . . . . 15:1--15:57


ACM Computing Surveys
Volume 43, Number 1, November, 2010

            Mario Cannataro and   
            Pietro H. Guzzi and   
              Pierangelo Veltri   Protein-to-protein interactions:
                                  Technologies, databases, and algorithms  1:1--1:36
          Sarah M. Diesburg and   
                 An-I Andy Wang   A survey of confidential data storage
                                  and deletion methods . . . . . . . . . . 2:1--2:37
         Nizar R. Mabroukeh and   
                   C. I. Ezeife   A taxonomy of sequential pattern mining
                                  algorithms . . . . . . . . . . . . . . . 3:1--3:41
                Hafedh Mili and   
               Guy Tremblay and   
          Guitta Bou Jaoude and   
       Éric Lefebvre and   
               Lamia Elabed and   
          Ghizlane El Boussaidi   Business process modeling languages:
                                  Sorting through the alphabet soup  . . . 4:1--4:56
                Jinu Kurian and   
                    Kamil Sarac   A survey on the design, applications,
                                  and enhancements of application-layer
                                  overlay networks . . . . . . . . . . . . 5:1--5:34

ACM Computing Surveys
Volume 43, Number 2, January, 2011

         Pimwadee Chaovalit and   
         Aryya Gangopadhyay and   
           George Karabatis and   
                   Zhiyuan Chen   Discrete wavelet transform-based time
                                  series analysis and mining . . . . . . . 6:1--6:37
       Aline Carneiro Viana and   
              Stephane Maag and   
                   Fatiha Zaidi   One step forward: Linking wireless
                                  self-organizing network validation
                                  techniques with formal testing
                                  approaches . . . . . . . . . . . . . . . 7:1--7:36
             Guido Urdaneta and   
           Guillaume Pierre and   
              Maarten Van Steen   A survey of DHT security techniques  . . 8:1--8:49
          Felix C. Freiling and   
           Rachid Guerraoui and   
                 Petr Kuznetsov   The failure detector abstraction . . . . 9:1--9:40
              Simon Parsons and   
  Juan A. Rodriguez-Aguilar and   
                     Mark Klein   Auctions and bidding: a guide for
                                  computer scientists  . . . . . . . . . . 10:1--10:59
               Changhai Nie and   
                  Hareton Leung   A survey of combinatorial testing  . . . 11:1--11:29
                    Wei Jie and   
              Junaid Arshad and   
            Richard Sinnott and   
               Paul Townend and   
                       Zhou Lei   A review of grid authentication and
                                  authorization technologies and support
                                  for federated access control . . . . . . 12:1--12:26

ACM Computing Surveys
Volume 43, Number 3, April, 2011

    Clémence Magnien and   
            Matthieu Latapy and   
            Jean-Loup Guillaume   Impact of random failures and attacks on
                                  Poisson and power-law random networks    13:1--13:31
            Patricia Beatty and   
                   Ian Reay and   
                 Scott Dick and   
                   James Miller   Consumer trust in e-commerce Web sites:
                                  a meta-study . . . . . . . . . . . . . . 14:1--14:46
            Kathleen Mcgill and   
                 Stephen Taylor   Robot algorithms for localization of
                                  multiple emission sources  . . . . . . . 15:1--15:25
             J. K. Aggarwal and   
                     M. S. Ryoo   Human activity analysis: a review  . . . 16:1--16:43
             Sarvnaz Karimi and   
               Falk Scholer and   
                  Andrew Turpin   Machine transliteration survey . . . . . 17:1--17:46
               Roland Ducournau   Implementing statically typed
                                  object-oriented programming languages    18:1--18:48
               Luca Mottola and   
              Gian Pietro Picco   Programming wireless sensor networks:
                                  Fundamental concepts and state of the
                                  art  . . . . . . . . . . . . . . . . . . 19:1--19:51
              Steffen Van Bakel   Strict intersection types for the Lambda
                                  Calculus . . . . . . . . . . . . . . . . 20:1--20:49
               Andrew J. Ko and   
              Robin Abraham and   
             Laura Beckwith and   
             Alan Blackwell and   
           Margaret Burnett and   
               Martin Erwig and   
             Chris Scaffidi and   
            Joseph Lawrance and   
            Henry Lieberman and   
                 Brad Myers and   
           Mary Beth Rosson and   
            Gregg Rothermel and   
                  Mary Shaw and   
               Susan Wiedenbeck   The state of the art in end-user
                                  software engineering . . . . . . . . . . 21:1--21:44
       Elias P. Duarte, Jr. and   
          Roverli P. Ziwich and   
              Luiz C. P. Albini   A survey of comparison-based
                                  system-level diagnosis . . . . . . . . . 22:1--22:56
                     Yuhui Deng   What is the future of disk drives, death
                                  or rebirth?  . . . . . . . . . . . . . . 23:1--23:27

ACM Computing Surveys
Volume 43, Number 4, October, 2011

              Laurie McLeod and   
           Stephen G. MacDonell   Factors that affect software systems
                                  development project outcomes: a survey
                                  of research  . . . . . . . . . . . . . . 24:1--24:56
          Alsayed Algergawy and   
               Marco Mesiti and   
                Richi Nayak and   
                   Gunter Saake   XML data clustering: an overview . . . . 25:1--25:41
             Anderson Rocha and   
            Walter Scheirer and   
             Terrance Boult and   
              Siome Goldenstein   Vision of the unseen: Current trends and
                                  challenges in digital image and video
                                  forensics  . . . . . . . . . . . . . . . 26:1--26:42
               Sergio Damas and   
        Oscar Cordón and   
 Oscar Ibáñez and   
     Jose Santamaría and   
   Inmaculada Alemán and   
             Miguel Botella and   
               Fernando Navarro   Forensic identification by
                                  computer-aided craniofacial
                                  superimposition: a survey  . . . . . . . 27:1--27:27
              Manuel Wimmer and   
        Andrea Schauerhuber and   
               Gerti Kappel and   
      Werner Retschitzegger and   
          Wieland Schwinger and   
            Elizabeth Kapsammer   A survey on UML-based aspect-oriented
                                  design modeling  . . . . . . . . . . . . 28:1--28:33
           Ferdous A. Sohel and   
           Gour C. Karmakar and   
         Laurence S. Dooley and   
             Mohammed Bennamoun   Geometric distortion measurement for
                                  shape coding: a contemporary review  . . 29:1--29:22
             Torsten Anders and   
             Eduardo R. Miranda   Constraint programming systems for
                                  modeling music theories and composition  30:1--30:38
          Matthew G. Parris and   
          Carthik A. Sharma and   
               Ronald F. Demara   Progress in autonomous fault recovery of
                                  field programmable gate arrays . . . . . 31:1--31:30
                      Bang Wang   Coverage problems in sensor networks: a
                                  survey . . . . . . . . . . . . . . . . . 32:1--32:53
             Davide Falessi and   
           Giovanni Cantone and   
                Rick Kazman and   
              Philippe Kruchten   Decision-making techniques for software
                                  architecture design: a comparative
                                  survey . . . . . . . . . . . . . . . . . 33:1--33:28
      Tomá\vs Skopal and   
                Benjamin Bustos   On nonmetric similarity search problems
                                  in complex domains . . . . . . . . . . . 34:1--34:50
            Robert I. Davis and   
                     Alan Burns   A survey of hard real-time scheduling
                                  for multiprocessor systems . . . . . . . 35:1--35:44
                   Fariba Sadri   Ambient intelligence: a survey . . . . . 36:1--36:66


ACM Computing Surveys
Volume 44, Number 1, January, 2012

          Claudio Carpineto and   
                Giovanni Romano   A Survey of Automatic Query Expansion in
                                  Information Retrieval  . . . . . . . . . 1:1--1:50
                David Zhang and   
               Wangmeng Zuo and   
                       Feng Yue   A Comparative Study of Palmprint
                                  Recognition Algorithms . . . . . . . . . 2:1--2:37
         Hanne Riis Nielson and   
           Flemming Nielson and   
               Henrik Pilegaard   Flow Logic for Process Calculi . . . . . 3:1--3:39
                Songbo Song and   
           Hassnaa Moustafa and   
                   Hossam Afifi   A Survey on Personalized TV and NGN
                                  Services through Context-Awareness . . . 4:1--4:18
       Robert Wójcik and   
              Andrzej Jajszczyk   Flow Oriented Approaches to QoS
                                  Assurance  . . . . . . . . . . . . . . . 5:1--5:37

ACM Computing Surveys
Volume 44, Number 2, February, 2012

               Manuel Egele and   
           Theodoor Scholte and   
                Engin Kirda and   
            Christopher Kruegel   A survey on automated dynamic
                                  malware-analysis techniques and tools    6:1--6:42
             Kevin Crowston and   
               Kangning Wei and   
              James Howison and   
                 Andrea Wiggins   Free\slash Libre open-source software
                                  development: What we know and what we do
                                  not know . . . . . . . . . . . . . . . . 7:1--7:35
              Pedro Antunes and   
          Valeria Herskovic and   
            Sergio F. Ochoa and   
                   Jose A. Pino   Structuring dimensions for collaborative
                                  systems evaluation . . . . . . . . . . . 8:1--8:28
             Godwin Caruana and   
                     Maozhen Li   A survey of emerging approaches to spam
                                  filtering  . . . . . . . . . . . . . . . 9:1--9:27

ACM Computing Surveys
Volume 44, Number 3, June, 2012

                  Jan Midtgaard   Control-flow analysis of functional
                                  programs . . . . . . . . . . . . . . . . 10:1--10:33
           Hossain Shahriar and   
            Mohammad Zulkernine   Mitigating program security
                                  vulnerabilities: Approaches and
                                  challenges . . . . . . . . . . . . . . . 11:1--11:46
                    Josep Silva   A vocabulary of program slicing-based
                                  techniques . . . . . . . . . . . . . . . 12:1--12:41
                Joonho Kong and   
             Sung Woo Chung and   
                  Kevin Skadron   Recent thermal management techniques for
                                  microprocessors  . . . . . . . . . . . . 13:1--13:42
           Syed M. S. Islam and   
         Mohammed Bennamoun and   
             Robyn A. Owens and   
                   Rowan Davies   A review of recent advances in $3$D ear-
                                  and expression-invariant face biometrics 14:1--14:34
           Gianpaolo Cugola and   
             Alessandro Margara   Processing flows of information: From
                                  data stream to complex event processing  15:1--15:62
              John Hatcliff and   
            Gary T. Leavens and   
         K. Rustan M. Leino and   
          Peter Müller and   
              Matthew Parkinson   Behavioral interface specification
                                  languages  . . . . . . . . . . . . . . . 16:1--16:58
                Yves Younan and   
              Wouter Joosen and   
                 Frank Piessens   Runtime countermeasures for code
                                  injection attacks against C and C++
                                  programs . . . . . . . . . . . . . . . . 17:1--17:28

ACM Computing Surveys
Volume 44, Number 4, August, 2012

             Lukasz Budzisz and   
               Johan Garcia and   
             Anna Brunstrom and   
            Ramon Ferrús   A taxonomy and survey of SCTP research   18:1--18:36
              Robert Biddle and   
             Sonia Chiasson and   
             P. C. Van Oorschot   Graphical passwords: Learning from the
                                  first twelve years . . . . . . . . . . . 19:1--19:41
                Wilson Wong and   
                    Wei Liu and   
             Mohammed Bennamoun   Ontology learning from text: a look back
                                  and into the future  . . . . . . . . . . 20:1--20:36
                 Huaiyu Liu and   
                 Mic Bowman and   
                  Francis Chang   Survey of state melding in virtual
                                  worlds . . . . . . . . . . . . . . . . . 21:1--21:25
                   Pedro Gonnet   A review of error estimation in adaptive
                                  quadrature . . . . . . . . . . . . . . . 22:1--22:36
              Cigdem Sengul and   
       Aline Carneiro Viana and   
                  Artur Ziviani   A survey of adaptive services to cope
                                  with dynamics in wireless
                                  self-organizing networks . . . . . . . . 23:1--23:35
           Paolo Bellavista and   
            Antonio Corradi and   
              Mario Fanelli and   
                  Luca Foschini   A survey of context data distribution
                                  for mobile ubiquitous systems  . . . . . 24:1--24:45
                  Meng Wang and   
                Bingbing Ni and   
             Xian-Sheng Hua and   
                  Tat-Seng Chua   Assistive tagging: a survey of
                                  multimedia tagging with human-computer
                                  joint exploration  . . . . . . . . . . . 25:1--25:24
             Luca Cittadini and   
       Giuseppe Di Battista and   
              Massimo Rimondini   On the stability of interdomain routing  26:1--26:40


ACM Computing Surveys
Volume 45, Number 1, November, 2012

                  Dong Zhou and   
                Mark Truran and   
             Tim Brailsford and   
               Vincent Wade and   
                   Helen Ashman   Translation techniques in cross-language
                                  information retrieval  . . . . . . . . . 1:1--1:44
            Simona Bernardi and   
      José Merseguer and   
               Dorina C. Petriu   Dependability modeling and analysis of
                                  software systems specified with UML  . . 2:1--2:48
          Sasikanth Avancha and   
                  Amit Baxi and   
                     David Kotz   Privacy in mobile technology for
                                  personal healthcare  . . . . . . . . . . 3:1--3:54
           Sergey Zhuravlev and   
           Juan Carlos Saez and   
          Sergey Blagodurov and   
         Alexandra Fedorova and   
                  Manuel Prieto   Survey of scheduling techniques for
                                  addressing shared resources in multicore
                                  processors . . . . . . . . . . . . . . . 4:1--4:28
           Anisa Al-Hafeedh and   
          Maxime Crochemore and   
                Lucian Ilie and   
          Evguenia Kopylova and   
                W. F. Smyth and   
            German Tischler and   
                  Munina Yusufu   A comparison of index-based Lempel--Ziv
                                  LZ77 factorization algorithms  . . . . . 5:1--5:17
                Boris Danev and   
             Davide Zanetti and   
                  Srdjan Capkun   On physical-layer identification of
                                  wireless devices . . . . . . . . . . . . 6:1--6:29
                Yi Zhi Zhao and   
               Chunyan Miao and   
                   Maode Ma and   
            Jing Bing Zhang and   
                    Cyril Leung   A survey and projection on medium access
                                  control protocols for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 7:1--7:37
              Glenn I. Hawe and   
              Graham Coates and   
           Duncan T. Wilson and   
                Roger S. Crouch   Agent-based simulation for large-scale
                                  emergency response: a survey of usage
                                  and implementation . . . . . . . . . . . 8:1--8:51
             R. Annie Uthra and   
              S. V. Kasmir Raja   QoS routing in wireless sensor networks
                                  --- a survey . . . . . . . . . . . . . . 9:1--9:12
 João Mendes-Moreira and   
              Carlos Soares and   
Alípio Mário Jorge and   
          Jorge Freire De Sousa   Ensemble approaches for regression: a
                                  survey . . . . . . . . . . . . . . . . . 10:1--10:40
                Mark Harman and   
         S. Afshin Mansouri and   
                 Yuanyuan Zhang   Search-based software engineering:
                                  Trends, techniques and applications  . . 11:1--11:61
            Philippe Esling and   
                    Carlos Agon   Time-series data mining  . . . . . . . . 12:1--12:34

ACM Computing Surveys
Volume 45, Number 2, February, 2013

                Simone Faro and   
                 Thierry Lecroq   The exact online string matching
                                  problem: a review of the most recent
                                  results  . . . . . . . . . . . . . . . . 13:1--13:42
        Angeliki Kritikakou and   
           Francky Catthoor and   
        Vasilios Kelefouras and   
                  Costas Goutis   A systematic approach to classify
                                  design-time global scheduling techniques 14:1--14:30
               Marco Attene and   
              Marcel Campen and   
                   Leif Kobbelt   Polygon mesh repairing: an application
                                  perspective  . . . . . . . . . . . . . . 15:1--15:33
                Susan Lomax and   
                   Sunil Vadera   A survey of cost-sensitive decision tree
                                  induction algorithms . . . . . . . . . . 16:1--16:35
             Michael Pearce and   
           Sherali Zeadally and   
                       Ray Hunt   Virtualization: Issues, security
                                  threats, and solutions . . . . . . . . . 17:1--17:39
Maria Elena Acevedo-Mosqueda and   
Cornelio Yáñez-Márquez and   
 Marco Antonio Acevedo-Mosqueda   Bidirectional Associative Memories:
                                  Different approaches . . . . . . . . . . 18:1--18:30
             Carl H. Mooney and   
                John F. Roddick   Sequential pattern mining --- approaches
                                  and algorithms . . . . . . . . . . . . . 19:1--19:39
               Timo Koskela and   
              Otso Kassinen and   
              Erkki Harjula and   
                Mika Ylianttila   P2P group management systems: a
                                  conceptual analysis  . . . . . . . . . . 20:1--20:25
               Mehdi Saeedi and   
                 Igor L. Markov   Synthesis and optimization of reversible
                                  circuits --- a survey  . . . . . . . . . 21:1--21:34
                Ayman Abaza and   
                  Arun Ross and   
           Christina Hebert and   
       Mary Ann F. Harrison and   
                  Mark S. Nixon   A survey on ear biometrics . . . . . . . 22:1--22:35
     Mohammad Tanvir Parvez and   
               Sabri A. Mahmoud   Offline Arabic handwritten text
                                  recognition: a survey  . . . . . . . . . 23:1--23:35
                  Jukka Suomela   Survey of local algorithms . . . . . . . 24:1--24:40

ACM Computing Surveys
Volume 45, Number 3, June, 2013

  Mohammad Hossein Manshaei and   
                Quanyan Zhu and   
               Tansu Alpcan and   
               Tamer Bacsar and   
             Jean-Pierre Hubaux   Game theory meets network security and
                                  privacy  . . . . . . . . . . . . . . . . 25:1--25:39
              James Stanier and   
                     Des Watson   Intermediate representations in
                                  imperative compilers: a survey . . . . . 26:1--26:27
Seyed Amir Hoseini-Tabatabaei and   
           Alexander Gluhak and   
                Rahim Tafazolli   A survey on smartphone-based systems for
                                  opportunistic user context recognition   27:1--27:51
          Christian Colombo and   
                 Gordon J. Pace   Recovery within long-running
                                  transactions . . . . . . . . . . . . . . 28:1--28:35
            Omer Zilberberg and   
               Shlomo Weiss and   
                   Sivan Toledo   Phase-change memory: an architectural
                                  perspective  . . . . . . . . . . . . . . 29:1--29:33
       João V. Gomes and   
  Pedro R. M. Inácio and   
            Manuela Pereira and   
     Mário M. Freire and   
              Paulo P. Monteiro   Detection and classification of
                                  peer-to-peer traffic: a survey . . . . . 30:1--30:40
             Floarea Serban and   
         Joaquin Vanschoren and   
        Jörg-Uwe Kietz and   
              Abraham Bernstein   A survey of intelligent assistants for
                                  data analysis  . . . . . . . . . . . . . 31:1--31:35
                   Wei Zang and   
                Ann Gordon-Ross   A survey on cache tuning from a
                                  power/energy perspective . . . . . . . . 32:1--32:49
                Tom Bostoen and   
             Sape Mullender and   
                Yolande Berbers   Power-reduction techniques for
                                  data-center storage systems  . . . . . . 33:1--33:38
     John David N. Dionisio and   
       William G. Burns III and   
                Richard Gilbert   $3$D Virtual worlds and the metaverse:
                                  Current status and future possibilities  34:1--34:38
            Matej Crepinsek and   
               Shih-Hsi Liu and   
                  Marjan Mernik   Exploration and exploitation in
                                  evolutionary algorithms: a survey  . . . 35:1--35:33
Leandro Silva Galvão De Carvalho and   
           Edjair De Souza Mota   Survey on application-layer mechanisms
                                  for speech quality adaptation in VoIP    36:1--36:31
             Xavier Grehant and   
           Isabelle Demeure and   
                    Sverre Jarp   A survey of task mapping on production
                                  grids  . . . . . . . . . . . . . . . . . 37:1--37:25
       Abbas Eslami Kiasari and   
               Axel Jantsch and   
                    Zhonghai Lu   Mathematical formalisms for performance
                                  evaluation of networks-on-chip . . . . . 38:1--38:41
              Andrew Newell and   
                  Jing Dong and   
           Cristina Nita-Rotaru   On the practicality of cryptographic
                                  defences against pollution attacks in
                                  wireless network coding  . . . . . . . . 39:1--39:26
    Gábor Pék and   
           Levente Butty'an and   
Boldizsár Bencsáth   A survey of security issues in hardware
                                  virtualization . . . . . . . . . . . . . 40:1--40:34

ACM Computing Surveys
Volume 45, Number 4, August, 2013

             Lilian Bossuet and   
              Michael Grand and   
               Lubos Gaspar and   
             Viktor Fischer and   
                    Guy Gogniat   Architectures of flexible symmetric key
                                  crypto engines --- a survey: From
                                  hardware coprocessor to
                                  multi-crypto-processor system on chip    41:1--41:32
           Christine Parent and   
       Stefano Spaccapietra and   
               Chiara Renso and   
          Gennady Andrienko and   
          Natalia Andrienko and   
              Vania Bogorny and   
        Maria Luisa Damiani and   
     Aris Gkoulalas-Divanis and   
                Jose Macedo and   
              Nikos Pelekis and   
         Yannis Theodoridis and   
                    Zhixian Yan   Semantic trajectories modeling and
                                  analysis . . . . . . . . . . . . . . . . 42:1--42:32
                 Jierui Xie and   
             Stephen Kelley and   
          Boleslaw K. Szymanski   Overlapping community detection in
                                  networks: The state-of-the-art and
                                  comparative study  . . . . . . . . . . . 43:1--43:35
                 Jiajun Liu and   
                   Zi Huang and   
                Hongyun Cai and   
              Heng Tao Shen and   
              Chong Wah Ngo and   
                       Wei Wang   Near-duplicate video retrieval: Current
                                  research and future trends . . . . . . . 44:1--44:23
Rafael A. Rodríguez-Gómez and   
Gabriel Maciá-Fernández and   
    Pedro García-Teodoro   Survey and taxonomy of botnet research
                                  through life-cycle . . . . . . . . . . . 45:1--45:33
               Anirban Basu and   
              Simon Fleming and   
              James Stanier and   
            Stephen Naicken and   
                Ian Wakeman and   
               Vijay K. Gurbani   The state of peer-to-peer network
                                  simulators . . . . . . . . . . . . . . . 46:1--46:25
            Wanita Sherchan and   
                Surya Nepal and   
                   Cecile Paris   A survey of trust in social networks . . 47:1--47:33
       Rajshekar Kalayappan and   
              Smruti R. Sarangi   A survey of checker architectures  . . . 48:1--48:34
                 Jian Chang and   
Krishna K. Venkatasubramanian and   
             Andrew G. West and   
                      Insup Lee   Analyzing and defending against
                                  Web-based malware  . . . . . . . . . . . 49:1--49:35
                Anne Benoit and   
Ümit V. Çatalyürek and   
                Yves Robert and   
                     Erik Saule   A survey of pipelined workflow
                                  scheduling: Models and algorithms  . . . 50:1--50:36
              Arnaud Hubaux and   
             Thein Than Tun and   
                Patrick Heymans   Separation of concerns in feature
                                  diagram languages: a systematic survey   51:1--51:23
      Engineer Bainomugisha and   
    Andoni Lombide Carreton and   
             Tom van Cutsem and   
            Stijn Mostinckx and   
             Wolfgang de Meuter   A survey on reactive programming . . . . 52:1--52:34
      Kelly Androutsopoulos and   
                David Clark and   
                Mark Harman and   
                Jens Krinke and   
                 Laurence Tratt   State-based model slicing: a survey  . . 53:1--53:36
              Daniel Lazaro and   
        Joan Manuel Marques and   
                Josep Jorba and   
              Xavier Vilajosana   Decentralized resource discovery
                                  mechanisms for distributed computing in
                                  peer-to-peer environments  . . . . . . . 54:1--54:54
                 Levi Shaul and   
                   Doron Tauber   Critical success factors in enterprise
                                  resource planning systems: Review of the
                                  last decade  . . . . . . . . . . . . . . 55:1--55:39


ACM Computing Surveys
Volume 46, Number 1, October, 2013

          Kyriakos Kritikos and   
            Barbara Pernici and   
          Pierluigi Plebani and   
           Cinzia Cappiello and   
              Marco Comuzzi and   
           Salima Benrernou and   
              Ivona Brandic and   
      Attila Kertész and   
             Michael Parkin and   
                   Manuel Carro   A survey on service quality description  1:1--1:??
             Sibel Yenikaya and   
       Gökhan Yenikaya and   
               Ekrem Düven   Keeping the vehicle on the road: a
                                  survey on on-road lane detection systems 2:1--2:??
         Damian A. Tamburri and   
              Patricia Lago and   
                 Hans van Vliet   Organizational social structures for
                                  software engineering . . . . . . . . . . 3:1--3:??
            Kevin A. Roundy and   
               Barton P. Miller   Binary-code obfuscations in prevalent
                                  packer tools . . . . . . . . . . . . . . 4:1--4:??
            Rocco de Nicola and   
              Diego Latella and   
             Michele Loreti and   
                  Mieke Massink   A uniform definition of stochastic
                                  process calculi  . . . . . . . . . . . . 5:1--5:??
            Flavio Esposito and   
              Ibrahim Matta and   
                Vatche Ishakian   Slice embedding solutions for
                                  distributed service architectures  . . . 6:1--6:??
       Aluizio F. R. Araujo and   
           Renata L. M. E. Rego   Self-organizing maps with a time-varying
                                  structure  . . . . . . . . . . . . . . . 7:1--7:??
            Martin Radetzki and   
              Chaochao Feng and   
               Xueqian Zhao and   
                   Axel Jantsch   Methods for fault tolerance in
                                  networks-on-chip . . . . . . . . . . . . 8:1--8:??
               Amir Yahyavi and   
                  Bettina Kemme   Peer-to-peer architectures for massively
                                  multiplayer online games: a survey . . . 9:1--9:??
                  Xin Zhang and   
              Yee-Hong Yang and   
               Zhiguang Han and   
                   Hui Wang and   
                       Chao Gao   Object class detection: a survey . . . . 10:1--10:??
                Sherif Sakr and   
                   Anna Liu and   
               Ayman G. Fayoumi   The family of MapReduce and large-scale
                                  data processing systems  . . . . . . . . 11:1--11:??
              Talal H. Noor and   
              Quan Z. Sheng and   
           Sherali Zeadally and   
                        Jian Yu   Trust management of services in cloud
                                  environments: obstacles and solutions    12:1--12:??
          Jonathan A. Silva and   
            Elaine R. Faria and   
          Rodrigo C. Barros and   
        Eduardo R. Hruschka and   
André C. P. L. F. de Carvalho and   
               João Gama   Data stream clustering: a survey . . . . 13:1--13:??
Kanthaiah Sivapragasam Vijayalayan and   
              Aaron Harwood and   
           Shanika Karunasekera   Distributed scheduling schemes for
                                  wireless mesh networks: a survey . . . . 14:1--14:??

ACM Computing Surveys
Volume 46, Number 2, November, 2013

                 Soumya Sen and   
            Carlee Joe-Wong and   
                 Sangtae Ha and   
                    Mung Chiang   A survey of smart data pricing: Past
                                  proposals, current plans, and future
                                  trends . . . . . . . . . . . . . . . . . 15:1--15:??
       Anne-Marie Kermarrec and   
            Peter Triantafillou   XL peer-to-peer pub/sub systems  . . . . 16:1--16:??
        Pablo Samuel Castro and   
               Daqing Zhang and   
                  Chao Chen and   
                 Shijian Li and   
                       Gang Pan   From taxi GPS traces to social and
                                  community dynamics: a survey . . . . . . 17:1--17:??
                   Qiong Wu and   
                   Chunyan Miao   Curiosity: From psychology to
                                  computation  . . . . . . . . . . . . . . 18:1--18:??
Ádám Csapó and   
    György Wersényi   Overview of auditory representations in
                                  human-machine interfaces . . . . . . . . 19:1--19:??
             Wojciech Mazurczyk   VoIP steganography and its detection ---
                                  a survey . . . . . . . . . . . . . . . . 20:1--20:??
                   Peter Gammie   Synchronous digital circuits as
                                  functional programs  . . . . . . . . . . 21:1--21:??
             Subir K. Ghosh and   
              Partha P. Goswami   Unsolved problems in visibility graphs
                                  of points, segments, and polygons  . . . 22:1--22:??
          Rebekka S. Renner and   
      Boris M. Velichkovsky and   
                Jens R. Helmert   The perception of egocentric distances
                                  in virtual environments --- a review . . 23:1--23:??
              Karim Barkati and   
                Pierre Jouvelot   Synchronous programming in audio
                                  processing: a lookup table oscillator
                                  case study . . . . . . . . . . . . . . . 24:1--24:??
                 Zheng Yang and   
                  Zimu Zhou and   
                     Yunhao Liu   From RSSI to CSI: Indoor localization
                                  via channel response . . . . . . . . . . 25:1--25:??
Ricardo Wandré Dias Pedro and   
  Fátima L. S. Nunes and   
            Ariane Machado-Lima   Using grammars for pattern recognition
                                  in images: a systematic review . . . . . 26:1--26:??
      Orlando R. E. Pereira and   
        Joel J. P. C. Rodrigues   Survey and analysis of current mobile
                                  learning applications and technologies   27:1--27:??
             Israel Herraiz and   
           Daniel Rodriguez and   
            Gregorio Robles and   
     Jesus M. Gonzalez-Barahona   The evolution of the laws of software
                                  evolution: a discussion based on a
                                  systematic literature review . . . . . . 28:1--28:??
            Roberto Vezzani and   
            Davide Baltieri and   
                 Rita Cucchiara   People reidentification in surveillance
                                  and forensics: a survey  . . . . . . . . 29:1--29:??

ACM Computing Surveys
Volume 46, Number 3, January, 2013

             Violeta Medina and   
      Juan Manuel García   A survey of migration mechanisms of
                                  virtual machines . . . . . . . . . . . . 30:1--30:??
                    Feng Li and   
              Beng Chin Ooi and   
         M. Tamer Özsu and   
                         Sai Wu   Distributed data management using
                                  MapReduce  . . . . . . . . . . . . . . . 31:1--31:??
            Andrea Bellucci and   
            Alessio Malizia and   
                   Ignacio Aedo   Light on horizontal interactive
                                  surfaces: Input space for tabletop
                                  computing  . . . . . . . . . . . . . . . 32:1--32:??
            Andreas Bulling and   
                 Ulf Blanke and   
                  Bernt Schiele   A tutorial on human activity recognition
                                  using body-worn inertial sensors . . . . 33:1--33:??
             Carlo A. Furia and   
             Bertrand Meyer and   
                  Sergey Velder   Loop invariants: Analysis,
                                  classification, and examples . . . . . . 34:1--34:??
                     Bin Li and   
               Steven C. H. Hoi   Online portfolio selection: a survey . . 35:1--35:??
                 Dongzhe Ma and   
               Jianhua Feng and   
                    Guoliang Li   A survey of address translation
                                  technologies for flash memories  . . . . 36:1--36:??
        Mardé Helbig and   
         Andries P. Engelbrecht   Benchmarks for dynamic multi-objective
                                  optimisation algorithms  . . . . . . . . 37:1--37:??
                    Tao Mei and   
                   Yong Rui and   
                 Shipeng Li and   
                        Qi Tian   Multimedia search reranking: a
                                  literature survey  . . . . . . . . . . . 38:1--38:??
              Peter Fontana and   
               Rance Cleaveland   A menagerie of timed automata  . . . . . 40:1--40:??
             Arlind Kopliku and   
      Karen Pinel-Sauvagnat and   
               Mohand Boughanem   Aggregated search: a new information
                                  retrieval paradigm . . . . . . . . . . . 41:1--41:??
     Marta R. Costa-Juss\`a and   
           Mireia Farrús   Statistical machine translation
                                  enhancements through linguistic levels:
                                  a survey . . . . . . . . . . . . . . . . 42:1--42:??

ACM Computing Surveys
Volume 46, Number 4, March, 2013

Natalia Díaz Rodríguez and   
       M. P. Cuéllar and   
               Johan Lilius and   
    Miguel Delgado Calvo-Flores   A survey on ontologies for human
                                  behavior recognition . . . . . . . . . . 43:1--43:??
              Martin Hirzel and   
        Robert Soulé and   
            Scott Schneider and   
                Bugra Gedik and   
                   Robert Grimm   A catalog of stream processing
                                  optimizations  . . . . . . . . . . . . . 46:1--46:??
        Anne-Cecile Orgerie and   
    Marcos Dias de Assuncao and   
                Laurent Lefevre   A survey on techniques for improving the
                                  energy efficiency of large-scale
                                  distributed systems  . . . . . . . . . . 47:1--47:??
                  C. M. Krishna   Fault-tolerant scheduling in homogeneous
                                  real-time systems  . . . . . . . . . . . 48:1--48:??
 Héctor Pérez and   
     J. Javier Gutiérrez   A survey on standards for real-time
                                  distribution middleware  . . . . . . . . 49:1--49:??
                Gonzalo Navarro   Spaces, Trees, and Colors: The
                                  algorithmic landscape of document
                                  retrieval on sequences . . . . . . . . . 52:1--52:??
             Michael Henson and   
                 Stephen Taylor   Memory encryption: a survey of existing
                                  techniques . . . . . . . . . . . . . . . 53:1--53:??
            Robert Mitchell and   
                   Ing-Ray Chen   A survey of intrusion detection
                                  techniques for cyber-physical systems    55:1--55:??


ACM Computing Surveys
Volume 47, Number 1, May, 2014

              Yao-Yi Chiang and   
                Stefan Leyk and   
              Craig A. Knoblock   A Survey of Digital Map Processing
                                  Techniques . . . . . . . . . . . . . . . 1:1--1:??
             Thomas Winkler and   
                Bernhard Rinner   Security and Privacy Protection in
                                  Visual Sensor Networks: a Survey . . . . 2:1--2:??
                    Yue Shi and   
              Martha Larson and   
                  Alan Hanjalic   Collaborative Filtering beyond the
                                  User-Item Matrix: a Survey of the State
                                  of the Art and Future Challenges . . . . 3:1--3:??
           Catherine Howard and   
               Markus Stumptner   A Survey of Directed
                                  Entity-Relation--Based First-Order
                                  Probabilistic Languages  . . . . . . . . 4:1--4:??
        Adel Nadjaran Toosi and   
       Rodrigo N. Calheiros and   
                 Rajkumar Buyya   Interconnected Cloud Computing
                                  Environments: Challenges, Taxonomy, and
                                  Survey . . . . . . . . . . . . . . . . . 7:1--7:??
              Ming Ki Chong and   
             Rene Mayrhofer and   
                 Hans Gellersen   A Survey of User Interaction for
                                  Spontaneous Device Association . . . . . 8:1--8:??
            Pierre A. Akiki and   
          Arosha K. Bandara and   
                       Yijun Yu   Adaptive Model-Driven User Interface
                                  Development Systems  . . . . . . . . . . 9:1--9:??
             Charu Aggarwal and   
                Karthik Subbian   Evolutionary Network Analysis: a Survey  10:1--10:??
          João Paulo and   
            José Pereira   A Survey and Classification of Storage
                                  Deduplication Systems  . . . . . . . . . 11:1--11:??
                 You-Chiun Wang   Mobile Sensor Networks: System Hardware
                                  and Dispatch Software  . . . . . . . . . 12:1--12:??
        Alessandra De Paola and   
             Marco Ortolani and   
             Giuseppe Lo Re and   
          Giuseppe Anastasi and   
                   Sajal K. Das   Intelligent Management Systems for
                                  Energy Efficiency in Buildings: a Survey 13:1--13:??
               Joanne Treurniet   A Taxonomy and Survey of Microscopic
                                  Mobility Models from the Mobile
                                  Networking Domain  . . . . . . . . . . . 14:1--14:??

ACM Computing Surveys
Volume 47, Number 2, November, 2014

             Ricardo Campos and   
             Gaël Dias and   
     Alípio M. Jorge and   
                    Adam Jatowt   Survey of Temporal Information Retrieval
                                  and Related Applications . . . . . . . . 15:1--15:??
           Roswitha Gostner and   
            Bianca Baldacci and   
          Melissa J. Morine and   
                 Corrado Priami   Graphical Modeling Tools for Systems
                                  Biology  . . . . . . . . . . . . . . . . 16:1--16:??
            Alexander Thomasian   Analysis of Fork/Join and Related
                                  Queueing Systems . . . . . . . . . . . . 17:1--17:??
       Christoph Bösch and   
              Pieter Hartel and   
              Willem Jonker and   
                  Andreas Peter   A Survey of Provably Secure Searchable
                                  Encryption . . . . . . . . . . . . . . . 18:1--18:??
              Sparsh Mittal and   
              Jeffrey S. Vetter   A Survey of Methods for Analyzing and
                                  Improving GPU Energy Efficiency  . . . . 19:1--19:??
        Shahbaz Akhtar Abid and   
             Mazliza Othman and   
                     Nadir Shah   A Survey on DHT-Based Routing for
                                  Large-Scale Mobile Ad Hoc Networks . . . 20:1--20:??
                   Dong Qiu and   
                   Bixin Li and   
                 Shunhui Ji and   
                  Hareton Leung   Regression Testing of Web Service: a
                                  Systematic Mapping Study . . . . . . . . 21:1--21:??
         Azzedine Boukerche and   
           Amir Darehshoorzadeh   Opportunistic Routing in Wireless
                                  Networks: Models, Algorithms, and
                                  Classifications  . . . . . . . . . . . . 22:1--22:??
                Aron Laszka and   
            Mark Felegyhazi and   
                Levente Buttyan   A Survey of Interdependent Information
                                  Security Games . . . . . . . . . . . . . 23:1--23:??
              Andrew Newell and   
                 Hongyi Yao and   
                 Alex Ryker and   
                  Tracey Ho and   
           Cristina Nita-Rotaru   Node-Capture Resilient Key Establishment
                                  in Sensor Networks: Design Space and New
                                  Protocols  . . . . . . . . . . . . . . . 24:1--24:??
        Francesco Calabrese and   
              Laura Ferrari and   
             Vincent D. Blondel   Urban Sensing Using Mobile Phone Network
                                  Data: a Survey of Research . . . . . . . 25:1--25:??
            Geoffray Bonnin and   
                Dietmar Jannach   Automated Generation of Music Playlists:
                                  Survey and Experiments . . . . . . . . . 26:1--26:??
  Nachikethas A. Jagadeesan and   
         Bhaskar Krishnamachari   Software-Defined Networking Paradigms in
                                  Wireless Networks: a Survey  . . . . . . 27:1--27:??
           Emanuela Marasco and   
                      Arun Ross   A Survey on Antispoofing Schemes for
                                  Fingerprint Recognition Systems  . . . . 28:1--28:??
                    Pujan Ziaie   A Model for Context in the Design of
                                  Open Production Communities  . . . . . . 29:1--29:??
                Fanxin Kong and   
                        Xue Liu   A Survey on Green-Energy-Aware Power
                                  Management for Datacenters . . . . . . . 30:1--30:??
              Andy Cockburn and   
                Carl Gutwin and   
                 Joey Scarr and   
               Sylvain Malacria   Supporting Novice to Expert Transitions
                                  in User Interfaces . . . . . . . . . . . 31:1--31:??
          Jose Caceres-Cruz and   
                  Pol Arias and   
           Daniel Guimarans and   
               Daniel Riera and   
                  Angel A. Juan   Rich Vehicle Routing Problem: Survey . . 32:1--32:??
              Toni Mastelic and   
             Ariel Oleksiak and   
            Holger Claussen and   
              Ivona Brandic and   
          Jean-Marc Pierson and   
        Athanasios V. Vasilakos   Cloud Computing: Survey on Energy
                                  Efficiency . . . . . . . . . . . . . . . 33:1--33:??
                     Xin Li and   
                  S. S. Iyengar   On Computing Mapping of $3$D Objects: a
                                  Survey . . . . . . . . . . . . . . . . . 34:1--34:??
             Daniel Borrajo and   
Anna Roubícková and   
                    Ivan Serina   Progress in Case-Based Planning  . . . . 35:1--35:??
               Xiaowei Zhou and   
                   Can Yang and   
                Hongyu Zhao and   
                    Weichuan Yu   Low-Rank Modeling and Its Applications
                                  in Image Analysis  . . . . . . . . . . . 36:1--36:??
               Felix Siegle and   
          Tanya Vladimirova and   
       Jòrgen Ilstad and   
                      Omar Emam   Mitigation of Radiation Effects in
                                  SRAM-Based FPGAs for Space Applications  37:1--37:??

ACM Computing Surveys
Volume 47, Number 3, April, 2015

       Dimitrios Rodopoulos and   
            Georgia Psychou and   
           Mohamed M. Sabry and   
           Francky Catthoor and   
       Antonis Papanikolaou and   
          Dimitrios Soudris and   
             Tobias G. Noll and   
                  David Atienza   Classification Framework for Analysis
                                  and Modeling of Physically Induced
                                  Reliability Violations . . . . . . . . . 38:1--38:??
   Muhammad Tayyab Chaudhry and   
             Teck Chaw Ling and   
               Atif Manzoor and   
          Syed Asad Hussain and   
                    Jongwon Kim   Thermal-Aware Scheduling in Green Data
                                  Centers  . . . . . . . . . . . . . . . . 39:1--39:??
                Johan Fabry and   
             Tom Dinkelaker and   
        Jacques Noyé and   
             Éric Tanter   A Taxonomy of Domain-Specific Aspect
                                  Languages  . . . . . . . . . . . . . . . 40:1--40:??
                  Arpan Roy and   
             Santonu Sarkar and   
         Rajeshwari Ganesan and   
                   Geetika Goel   Secure the Cloud: From the Perspective
                                  of a Service-Oriented Organization . . . 41:1--41:??
        Robbert Van Renesse and   
               Deniz Altinbuken   Paxos Made Moderately Complex  . . . . . 42:1--42:??
          Sidney K. D'Mello and   
                Jacqueline Kory   A Review and Meta-Analysis of Multimodal
                                  Affect Detection Systems . . . . . . . . 43:1--43:??
               Adrien Maglo and   
    Guillaume Lavoué and   
             Florent Dupont and   
          Céline Hudelot   $3$D Mesh Compression: Survey,
                                  Comparisons, and Emerging Trends . . . . 44:1--44:??
           Yago Díez and   
               Ferran Roure and   
        Xavier Lladó and   
                  Joaquim Salvi   A Qualitative Review on $3$D Coarse
                                  Registration Methods . . . . . . . . . . 45:1--45:??
             Carmelo Ardito and   
                Paolo Buono and   
  Maria Francesca Costabile and   
               Giuseppe Desolda   Interaction with Large Displays: a
                                  Survey . . . . . . . . . . . . . . . . . 46:1--46:??
             Veljko Pejovic and   
                 Mirco Musolesi   Anticipatory Mobile Computing: a Survey
                                  of the State of the Art and Research
                                  Challenges . . . . . . . . . . . . . . . 47:1--47:??
                 Olga Zoidi and   
          Eftychia Fotiadou and   
           Nikos Nikolaidis and   
                  Ioannis Pitas   Graph-Based Label Propagation in Digital
                                  Media: a Review  . . . . . . . . . . . . 48:1--48:??
               Nidhi Tiwari and   
             Santonu Sarkar and   
               Umesh Bellur and   
                 Maria Indrawan   Classification Framework of MapReduce
                                  Scheduling Algorithms  . . . . . . . . . 49:1--49:??
            Steffen Wendzel and   
           Sebastian Zander and   
           Bernhard Fechner and   
               Christian Herdin   Pattern-Based Survey and Categorization
                                  of Network Covert Channel Techniques . . 50:1--50:??
       Ahmad Fadzil M. Hani and   
    Irving Vitra Paputungan and   
             Mohd Fadzil Hassan   Renegotiation in Service Level Agreement
                                  Management for a Cloud-Based System  . . 51:1--51:??
                 Eva Gibaja and   
       Sebastián Ventura   A Tutorial on Multilabel Learning  . . . 52:1--52:??
             Aggeliki Sgora and   
      Dimitrios J. Vergados and   
          Dimitrios D. Vergados   A Survey of TDMA Scheduling Schemes in
                                  Wireless Multihop Networks . . . . . . . 53:1--53:??
                 Zheng Yang and   
                 Chenshu Wu and   
                  Zimu Zhou and   
              Xinglin Zhang and   
                    Xu Wang and   
                     Yunhao Liu   Mobility Increases Localizability: a
                                  Survey on Wireless Indoor Localization
                                  using Inertial Sensors . . . . . . . . . 54:1--54:??

ACM Computing Surveys
Volume 47, Number 4, July, 2015

  Emmanouil Vasilomanolakis and   
         Shankar Karuppayah and   
   Max Mühlhäuser and   
                Mathias Fischer   Taxonomy and Survey of Collaborative
                                  Intrusion Detection  . . . . . . . . . . 55:1--55:??
             Sarvnaz Karimi and   
                  Chen Wang and   
    Alejandro Metke-Jimenez and   
                  Raj Gaire and   
                   Cecile Paris   Text and Data Mining Techniques in
                                  Adverse Drug Reaction Detection  . . . . 56:1--56:??
                    Shu Shi and   
                 Cheng-Hsin Hsu   A Survey of Interactive Remote Rendering
                                  Systems  . . . . . . . . . . . . . . . . 57:1--57:??
                   Sufatrio and   
           Darell J. J. Tan and   
              Tong-Wei Chua and   
           Vrizlynn L. L. Thing   Securing Android: a Survey, Taxonomy,
                                  and Challenges . . . . . . . . . . . . . 58:1--58:??
Diarmuid Ó Coileáin and   
                 Donal O'Mahony   Accounting and Accountability in Content
                                  Distribution Architectures: a Survey . . 59:1--59:??
     B. R. de Araújo and   
            Daniel S. Lopes and   
               Pauline Jepp and   
           Joaquim A. Jorge and   
                   Brian Wyvill   A Survey on Implicit Surface
                                  Polygonization . . . . . . . . . . . . . 60:1--60:??
       Anirban Mukhopadhyay and   
              Ujjwal Maulik and   
      Sanghamitra Bandyopadhyay   A Survey of Multiobjective Evolutionary
                                  Clustering . . . . . . . . . . . . . . . 61:1--61:??
            Mattias De Wael and   
                Stefan Marr and   
            Bruno De Fraine and   
             Tom Van Cutsem and   
             Wolfgang De Meuter   Partitioned Global Address Space
                                  Languages  . . . . . . . . . . . . . . . 62:1--62:??
               Zhi-Hui Zhan and   
              Xiao-Fang Liu and   
              Yue-Jiao Gong and   
                  Jun Zhang and   
       Henry Shu-Hung Chung and   
                         Yun Li   Cloud Computing Resource Scheduling and
                                  a Survey of Its Evolutionary Approaches  63:1--63:??
 Fahimeh Alizadeh Moghaddam and   
              Patricia Lago and   
                   Paola Grosso   Energy-Efficient Networking Solutions in
                                  Cloud-Based Environments: a Systematic
                                  Literature Review  . . . . . . . . . . . 64:1--64:??
              Mehdi Sookhak and   
              Abdullah Gani and   
             Hamid Talebian and   
            Adnan Akhunzada and   
              Samee U. Khan and   
             Rajkumar Buyya and   
               Albert Y. Zomaya   Remote Data Auditing in Cloud Computing
                                  Environments: a Survey, Taxonomy, and
                                  Open Issues  . . . . . . . . . . . . . . 65:1--65:??
       Andrzej Kamisi\'nski and   
               Piotr Cholda and   
              Andrzej Jajszczyk   Assessing the Structural Complexity of
                                  Computer and Communication Networks  . . 66:1--66:??
             Muhammad Imran and   
            Carlos Castillo and   
              Fernando Diaz and   
                   Sarah Vieweg   Processing Social Media Messages in Mass
                                  Emergency: a Survey  . . . . . . . . . . 67:1--67:??
                  Wei Huang and   
             Afshar Ganjali and   
              Beom Heyn Kim and   
                  Sukwon Oh and   
                      David Lie   The State of Public
                                  Infrastructure-as-a-Service Cloud
                                  Security . . . . . . . . . . . . . . . . 68:1--68:??
              Sparsh Mittal and   
              Jeffrey S. Vetter   A Survey of CPU--GPU Heterogeneous
                                  Computing Techniques . . . . . . . . . . 69:1--69:??
                 Tianyin Xu and   
                  Yuanyuan Zhou   Systems Approaches to Tackling
                                  Configuration Errors: a Survey . . . . . 70:1--70:??


ACM Computing Surveys
Volume 48, Number 1, September, 2015

                Guozhu Meng and   
                   Yang Liu and   
                  Jie Zhang and   
          Alexander Pokluda and   
                  Raouf Boutaba   Collaborative Security: a Survey and
                                  Taxonomy . . . . . . . . . . . . . . . . 1:1--1:??
         Claudio A. Ardagna and   
                Rasool Asal and   
            Ernesto Damiani and   
                  Quang Hieu Vu   From Security to Assurance in the Cloud:
                                  a Survey . . . . . . . . . . . . . . . . 2:1--2:??
              Stefan Mitsch and   
       André Platzer and   
      Werner Retschitzegger and   
              Wieland Schwinger   Logic-Based Modeling Approaches for
                                  Qualitative and Hybrid Reasoning in
                                  Dynamic Spatial Systems  . . . . . . . . 3:1--3:??
       Olumuyiwa Ibidunmoye and   
Francisco Hernández-Rodriguez and   
                   Erik Elmroth   Performance Anomaly Detection and
                                  Bottleneck Identification  . . . . . . . 4:1--4:??
             Bisan Alsalibi and   
             Ibrahim Venkat and   
          K. G. Subramanian and   
      Syaheerah Lebai Lutfi and   
              Philippe De Wilde   The Impact of Bio-Inspired Approaches
                                  Toward the Advancement of Face
                                  Recognition  . . . . . . . . . . . . . . 5:1--5:??
            Muhammad Naveed and   
                Erman Ayday and   
           Ellen W. Clayton and   
             Jacques Fellay and   
             Carl A. Gunter and   
         Jean-Pierre Hubaux and   
           Bradley A. Malin and   
                  Xiaofeng Wang   Privacy in the Genomic Era . . . . . . . 6:1--6:??
                    Bin Guo and   
                   Zhu Wang and   
                  Zhiwen Yu and   
                    Yu Wang and   
                Neil Y. Yen and   
                Runhe Huang and   
                   Xingshe Zhou   Mobile Crowd Sensing and Computing: The
                                  Review of an Emerging Human-Powered
                                  Sensing Paradigm . . . . . . . . . . . . 7:1--7:??
              Patricia Ruiz and   
                  Pascal Bouvry   Survey on Broadcast Algorithms for
                                  Mobile Ad Hoc Networks . . . . . . . . . 8:1--8:??
              Hyejeong Hong and   
                  Jaeil Lim and   
                Hyunyul Lim and   
                    Sungho Kang   Lifetime Reliability Enhancement of
                                  Microprocessors: Mitigating the Impact
                                  of Negative Bias Temperature Instability 9:1--9:??
               Erick Bauman and   
             Gbadebo Ayoade and   
                   Zhiqiang Lin   A Survey on Hypervisor-Based Monitoring:
                                  Approaches, Applications, and Evolutions 10:1--10:??
Zoltán Ádám Mann   Allocation of Virtual Machines in Cloud
                                  Data Centers --- A Survey of Problem
                                  Models and Optimization Algorithms . . . 11:1--11:??
      Aleksandar Milenkoski and   
               Marco Vieira and   
              Samuel Kounev and   
           Alberto Avritzer and   
                 Bryan D. Payne   Evaluating Computer Intrusion Detection
                                  Systems: a Survey of Common Practices    12:1--12:??
                Bingdong Li and   
                 Jinlong Li and   
                    Ke Tang and   
                        Xin Yao   Many-Objective Evolutionary Algorithms:
                                  a Survey . . . . . . . . . . . . . . . . 13:1--13:??
          Klaus Schoeffmann and   
          Marco A. Hudelist and   
                   Jochen Huber   Video Interaction Tools: a Survey of
                                  Recent Work  . . . . . . . . . . . . . . 14:1--14:??
            Matthew Edwards and   
               Awais Rashid and   
                    Paul Rayson   A Systematic Survey of Online Data
                                  Mining Technology Intended for Law
                                  Enforcement  . . . . . . . . . . . . . . 15:1--15:??
              Benoit Baudry and   
               Martin Monperrus   The Multiple Facets of Software
                                  Diversity: Recent Developments in Year
                                  2000 and Beyond  . . . . . . . . . . . . 16:1--16:??

ACM Computing Surveys
Volume 48, Number 2, November, 2015

                 Yunji Chen and   
               Shijin Zhang and   
                     Qi Guo and   
                    Ling Li and   
                 Ruiyang Wu and   
                   Tianshi Chen   Deterministic Replay: a Survey . . . . . 17:1--17:47
   Claus Ballegaard Nielsen and   
          Peter Gorm Larsen and   
            John Fitzgerald and   
               Jim Woodcock and   
                    Jan Peleska   Systems of Systems Engineering: Basic
                                  Concepts, Model-Based Techniques, and
                                  Research Directions  . . . . . . . . . . 18:1--18:41
             Brijesh Dongol and   
                   John Derrick   Verifying Linearisability: a Comparative
                                  Survey . . . . . . . . . . . . . . . . . 19:1--19:43
           Naveed Ul Hassan and   
                 Aqsa Naeem and   
       Muhammad Adeel Pasha and   
               Tariq Jadoon and   
                      Chau Yuen   Indoor Positioning Using Visible LED
                                  Lights: a Survey . . . . . . . . . . . . 20:1--20:32
            Eduardo Velloso and   
            Dominik Schmidt and   
            Jason Alexander and   
             Hans Gellersen and   
                Andreas Bulling   The Feet in Human--Computer Interaction:
                                  a Survey of Foot-Based Interaction . . . 21:1--21:35
             Tarandeep Kaur and   
                Inderveer Chana   Energy Efficiency Techniques in Cloud
                                  Computing: a Survey and Taxonomy . . . . 22:1--22:46
               Mingming Guo and   
                  Xinyu Jin and   
              Niki Pissinou and   
         Sebastian Zanlongo and   
            Bogdan Carbunar and   
                  S. S. Iyengar   In-Network Trajectory Privacy
                                  Preservation . . . . . . . . . . . . . . 23:1--23:29
        Vittorio P. Illiano and   
                   Emil C. Lupu   Detecting Malicious Data Injections in
                                  Wireless Sensor Networks: a Survey . . . 24:1--24:33
         Robert Ryan McCune and   
               Tim Weninger and   
                     Greg Madey   Thinking Like a Vertex: a Survey of
                                  Vertex-Centric Frameworks for
                                  Large-Scale Distributed Graph Processing 25:1--25:39
             Jeroen Delvaux and   
               Roel Peeters and   
                    Dawu Gu and   
             Ingrid Verbauwhede   A Survey on Lightweight Entity
                                  Authentication with Strong PUFs  . . . . 26:1--26:42
             Jones Granatyr and   
          Vanderson Botelho and   
        Otto Robert Lessing and   
Edson Emílio Scalabrin and   
        Jean-Paul Barth\`es and   
      Fabrício Enembreck   Trust and Reputation Models for
                                  Multiagent Systems . . . . . . . . . . . 27:1--27:42
                Jin-Hee Cho and   
                 Kevin Chan and   
                    Sibel Adali   A Survey on Trust Modeling . . . . . . . 28:1--28:40
               Mukesh Saini and   
       Abdulhameed Alelaiwi and   
         Abdulmotaleb El Saddik   How Close are We to Realizing a
                                  Pragmatic VANET Solution? A Meta-Survey  29:1--29:40
               Roy Shilkrot and   
               Jochen Huber and   
        Jürgen Steimle and   
        Suranga Nanayakkara and   
                    Pattie Maes   Digital Digits: a Comprehensive Survey
                                  of Finger Augmentation Devices . . . . . 30:1--30:29
        Ramon Hugo De Souza and   
Mário Antônio Ribeiro Dantas   Mapping QoE through QoS in an Approach
                                  to DDB Architectures: Research Analysis
                                  and Conceptualization  . . . . . . . . . 31:1--31:41
           Giovani Gracioli and   
             Ahmed Alhammad and   
             Renato Mancuso and   
Antônio Augusto Fröhlich and   
             Rodolfo Pellizzoni   A Survey on Cache Management Mechanisms
                                  for Real-Time Embedded Systems . . . . . 32:1--32:36

ACM Computing Surveys
Volume 48, Number 3, February, 2016

        Angel Lagares Lemos and   
             Florian Daniel and   
             Boualem Benatallah   Web Service Composition: a Survey of
                                  Techniques and Tools . . . . . . . . . . 33:1--33:??
            Asma Benmansour and   
      Abdelhamid Bouchachia and   
                 Mohammed Feham   Multioccupant Activity Recognition in
                                  Pervasive Smart Home Environments  . . . 34:1--34:??
            Eleni Koutrouli and   
          Aphrodite Tsalgatidou   Reputation Systems Evaluation Survey . . 35:1--35:??
             Simone Brienza and   
          Sena Efsun Cebeci and   
    Seyed Saeid Masoumzadeh and   
             Helmut Hlavacs and   
    Öznur Özkasap and   
              Giuseppe Anastasi   A Survey on Energy Efficiency in P2P
                                  Systems: File Distribution, Content
                                  Streaming, and Epidemics . . . . . . . . 36:1--36:??
            Ryan Heartfield and   
                  George Loukas   A Taxonomy of Attacks and a Survey of
                                  Defence Mechanisms for Semantic Social
                                  Engineering Attacks  . . . . . . . . . . 37:1--37:??
                Andrea Hess and   
          Karin Anna Hummel and   
      Wilfried N. Gansterer and   
             Günter Haring   Data-driven Human Mobility Modeling: a
                                  Survey and Engineering Guidance for
                                  Mobile Networking  . . . . . . . . . . . 38:1--38:??
    Mohammad Ashraful Hoque and   
            Matti Siekkinen and   
          Kashif Nizam Khan and   
                    Yu Xiao and   
                   Sasu Tarkoma   Modeling, Profiling, and Debugging the
                                  Energy Consumption of Mobile Devices . . 39:1--39:??
               John Narayan and   
          Sandeep K. Shukla and   
              T. Charles Clancy   A Survey of Automatic Protocol Reverse
                                  Engineering Tools  . . . . . . . . . . . 40:1--40:??
              Elaheh Momeni and   
              Claire Cardie and   
           Nicholas Diakopoulos   A Survey on Assessment and Ranking
                                  Methodologies for User-Generated Content
                                  on the Web . . . . . . . . . . . . . . . 41:1--41:??
              Sukhpal Singh and   
                Inderveer Chana   QoS-Aware Autonomic Resource Management
                                  in Cloud Computing: a Systematic Review  42:1--42:??
           Funmilade Faniyi and   
                   Rami Bahsoon   A Systematic Review of Service Level
                                  Management in the Cloud  . . . . . . . . 43:1--43:??
            Roberto Natella and   
          Domenico Cotroneo and   
            Henrique S. Madeira   Assessing Dependability with Software
                                  Fault Injection: a Survey  . . . . . . . 44:1--44:??
                  Sparsh Mittal   A Survey of Techniques for Architecting
                                  and Managing Asymmetric Multicore
                                  Processors . . . . . . . . . . . . . . . 45:1--45:??
          Daniele Sgandurra and   
                      Emil Lupu   Evolution of Attacks, Threat Models, and
                                  Solutions for Virtualized Systems  . . . 46:1--46:??
              Gildas Avoine and   
          Antonin Beaujeant and   
     Julio Hernandez-Castro and   
                Louis Demay and   
                Philippe Teuwen   A Survey of Security and Privacy Issues
                                  in ePassport Protocols . . . . . . . . . 47:1--47:??
     Maria Carla Calzarossa and   
              Luisa Massari and   
                Daniele Tessera   Workload Characterization: a Survey
                                  Revisited  . . . . . . . . . . . . . . . 48:1--48:??

ACM Computing Surveys
Volume 48, Number 4, May, 2016

                     Yi Ren and   
                   Ling Liu and   
                   Qi Zhang and   
                  Qingbo Wu and   
                Jianbo Guan and   
                Jinzhu Kong and   
                Huadong Dai and   
                    Lisong Shao   Shared-Memory Optimizations for
                                  Inter-Virtual-Machine Communication  . . 49:1--49:??
               Barsha Mitra and   
               Shamik Sural and   
             Jaideep Vaidya and   
           Vijayalakshmi Atluri   A Survey of Role Mining  . . . . . . . . 50:1--50:??
       Claudio M. De Farias and   
                     Wei Li and   
  Flávia C. Delicato and   
                Luci Pirmez and   
           Albert Y. Zomaya and   
             Paulo F. Pires and   
        José N. De Souza   A Systematic Review of Shared Sensor
                                  Networks . . . . . . . . . . . . . . . . 51:1--51:??
               Marco Crocco and   
             Marco Cristani and   
              Andrea Trucco and   
                Vittorio Murino   Audio Surveillance: a Systematic Review  52:1--52:??
         Halgurd S. Maghdid and   
        Ihsan Alshahib Lami and   
        Kayhan Zrar Ghafoor and   
                   Jaime Lloret   Seamless Outdoors-Indoors Localization
                                  Solutions on Smartphones: Implementation
                                  and Challenges . . . . . . . . . . . . . 53:1--53:??
                  Sparsh Mittal   A Survey of Architectural Techniques for
                                  Managing Process Variation . . . . . . . 54:1--54:??
        Bernd Carsten Stahl and   
             Job Timmermans and   
       Brent Daniel Mittelstadt   The Ethics of Computing: a Survey of the
                                  Computing-Oriented Literature  . . . . . 55:1--55:??
               Niall Murray and   
                  Brian Lee and   
              Yuansong Qiao and   
           Gabriel-Miro Muntean   Olfaction-Enhanced Multimedia: a Survey
                                  of Application Domains, Displays, and
                                  Research Challenges  . . . . . . . . . . 56:1--56:??
           Niklas Palaghias and   
Seyed Amir Hoseinitabatabaei and   
               Michele Nati and   
           Alexander Gluhak and   
                 Klaus Moessner   A Survey on Mobile Social Signal
                                  Processing . . . . . . . . . . . . . . . 57:1--57:??
          David C. Harrison and   
         Winston K. G. Seah and   
                  Ramesh Rayudu   Rare Event Detection and Propagation in
                                  Wireless Sensor Networks . . . . . . . . 58:1--58:??
           Sebastian Werner and   
           Javier Navaridas and   
             Mikel Luján   A Survey on Design Approaches to
                                  Circumvent Permanent Faults in
                                  Networks-on-Chip . . . . . . . . . . . . 59:1--59:??
                   Liang Hu and   
                 Xilong Che and   
                  Si-Qing Zheng   A Closer Look at GPGPU . . . . . . . . . 60:1--60:??
             Marco Platania and   
           Daniel Obenshain and   
            Thomas Tantillo and   
                  Yair Amir and   
                    Neeraj Suri   On Choosing Server- or Client-Side
                                  Solutions for BFT  . . . . . . . . . . . 61:1--61:??
                  Sparsh Mittal   A Survey of Techniques for Approximate
                                  Computing  . . . . . . . . . . . . . . . 62:1--62:??
Edans Flavius De Oliveira Sandes and   
         Azzedine Boukerche and   
Alba Cristina Magalhaes Alves De Melo   Parallel Optimal Pairwise Biological
                                  Sequence Comparison: Algorithms,
                                  Platforms, and Classification  . . . . . 63:1--63:??
            Desmond Schmidt and   
              Kenneth Radke and   
              Seyit Camtepe and   
                 Ernest Foo and   
                     Michal Ren   A Survey and Analysis of the GNSS
                                  Spoofing Threat and Countermeasures  . . 64:1--64:??
             Juan Caballero and   
                   Zhiqiang Lin   Type Inference on Executables  . . . . . 65:1--65:??


ACM Computing Surveys
Volume 49, Number 1, July, 2016

               Junaid Shuja and   
              Abdullah Gani and   
               Kashif Bilal and   
        Atta Ur Rehman Khan and   
           Sajjad A. Madani and   
              Samee U. Khan and   
               Albert Y. Zomaya   A Survey of Mobile Device
                                  Virtualization: Taxonomy and State of
                                  the Art  . . . . . . . . . . . . . . . . 1:1--1:??
       Muhammad Raisul Alam and   
            Marc St-Hilaire and   
                    Thomas Kunz   Computational Methods for Residential
                                  Energy Cost Optimization in Smart Grids:
                                  a Survey . . . . . . . . . . . . . . . . 2:1--2:??
           Hans Hüttel and   
                Ivan Lanese and   
       Vasco T. Vasconcelos and   
         Luís Caires and   
              Marco Carbone and   
Pierre-Malo Deniélou and   
          Dimitris Mostrous and   
              Luca Padovani and   
      António Ravara and   
              Emilio Tuosto and   
         Hugo Torres Vieira and   
            Gianluigi Zavattaro   Foundations of Session Types and
                                  Behavioural Contracts  . . . . . . . . . 3:1--3:??
    Sebastian Schrittwieser and   
       Stefan Katzenbeisser and   
            Johannes Kinder and   
           Georg Merzdovnik and   
                   Edgar Weippl   Protecting Software through Obfuscation:
                                  Can It Keep Pace with Progress in Code
                                  Analysis?  . . . . . . . . . . . . . . . 4:1--4:??
                    Buke Ao and   
               Yongcai Wang and   
                      Lu Yu and   
          Richard R. Brooks and   
                  S. S. Iyengar   On Precision Bound of Distributed
                                  Fault-Tolerant Sensor Fusion Algorithms  5:1--5:??
                 Junbin Liu and   
           Sridha Sridharan and   
                 Clinton Fookes   Recent Advances in Camera Planning for
                                  Large Area Surveillance: a Comprehensive
                                  Review . . . . . . . . . . . . . . . . . 6:1--6:??
               Suleman Khan and   
              Abdullah Gani and   
 Ainuddin Wahid Abdul Wahab and   
      Mustapha Aminu Bagiwa and   
            Muhammad Shiraz and   
              Samee U. Khan and   
             Rajkumar Buyya and   
               Albert Y. Zomaya   Cloud Log Forensics: Foundations, State
                                  of the Art, and Future Directions  . . . 7:1--7:??
       Dada Emmanuel Gbenga and   
          Effirul Ikhwan Ramlan   Understanding the Limitations of
                                  Particle Swarm Algorithm for Dynamic
                                  Optimization Tasks: a Survey Towards the
                                  Singularity of PSO for Swarm Robotic
                                  Applications . . . . . . . . . . . . . . 8:1--8:??
                  Xiang Zuo and   
              Adriana Iamnitchi   A Survey of Socially Aware Peer-to-Peer
                                  Systems  . . . . . . . . . . . . . . . . 9:1--9:??
               Wenjun Jiang and   
                Guojun Wang and   
    Md Zakirul Alam Bhuiyan and   
                         Jie Wu   Understanding Graph-Based Trust
                                  Evaluation in Online Social Networks:
                                  Methodologies and Challenges . . . . . . 10:1--10:??
   Fabrício A. Silva and   
         Azzedine Boukerche and   
    Thais R. M. Braga Silva and   
            Linnyer B. Ruiz and   
          Eduardo Cerqueira and   
         Antonio A. F. Loureiro   Vehicular Networks: a New Challenge for
                                  Content-Delivery-Based Applications  . . 11:1--11:??
                 Ruogu Fang and   
           Samira Pouyanfar and   
                 Yimin Yang and   
             Shu-Ching Chen and   
                  S. S. Iyengar   Computational Health Informatics in the
                                  Big Data Age: a Survey . . . . . . . . . 12:1--12:??
                   Jun Tang and   
                   Yong Cui and   
                      Qi Li and   
                    Kui Ren and   
             Jiangchuan Liu and   
                 Rajkumar Buyya   Ensuring Security and Privacy
                                  Preservation for Cloud Data Services . . 13:1--13:??
                  Xirong Li and   
           Tiberio Uricchio and   
            Lamberto Ballan and   
              Marco Bertini and   
           Cees G. M. Snoek and   
              Alberto Del Bimbo   Socializing the Semantic Gap: a
                                  Comparative Survey on Image Tag
                                  Assignment, Refinement, and Retrieval    14:1--14:??
    Nadia Felix F. Da Silva and   
         Luiz F. S. Coletta and   
            Eduardo R. Hruschka   A Survey and Comparative Study of Tweet
                                  Sentiment Analysis via Semi-Supervised
                                  Learning . . . . . . . . . . . . . . . . 15:1--15:??
             Durgesh Samant and   
                   Umesh Bellur   Handling Boot Storms in Virtualized Data
                                  Centers --- A Survey . . . . . . . . . . 16:1--16:??
              Kaveh Hassani and   
                   Won-Sook Lee   Visualizing Natural Language
                                  Descriptions: a Survey . . . . . . . . . 17:1--17:??
                 Ovidiu Dan and   
               Brian D. Davison   Measuring and Predicting Search Engine
                                  Users' Satisfaction  . . . . . . . . . . 18:1--18:??
               Paolo Viotti and   
                Marko Vukoli\'c   Consistency in Non-Transactional
                                  Distributed Storage Systems  . . . . . . 19:1--19:??
               Junbin Liang and   
               Jiannong Cao and   
                    Rui Liu and   
                         Tao Li   Distributed Intelligent MEMS: a Survey
                                  and a Real-Time Programming Framework    20:1--20:??
              Salman Khwaja and   
              Mohammad Alshayeb   Survey On Software Design-Pattern
                                  Specification Languages  . . . . . . . . 21:1--21:??

ACM Computing Surveys
Volume 49, Number 2, September, 2016

           Alvaro Estebanez and   
            Diego R. Llanos and   
      Arturo Gonzalez-Escribano   A Survey on Thread-Level Speculation
                                  Techniques . . . . . . . . . . . . . . . 22:1--22:??
              Brent Carrara and   
                 Carlisle Adams   Out-of-Band Covert Channels --- A Survey 23:1--23:??
      Ruggero Donida Labati and   
            Angelo Genovese and   
       Enrique Muñoz and   
             Vincenzo Piuri and   
               Fabio Scotti and   
                Gianluca Sforza   Biometric Recognition in Automated
                                  Border Control: a Survey . . . . . . . . 24:1--24:??
                 Jiang Xiao and   
                  Zimu Zhou and   
                  Youwen Yi and   
                   Lionel M. Ni   A Survey on Wireless Indoor Localization
                                  from the Device Perspective  . . . . . . 25:1--25:??
        Panagiotis Kokkinos and   
         Dimitris Kalogeras and   
                 Anna Levin and   
           Emmanouel Varvarigos   Survey: Live Migration and Disaster
                                  Recovery over Long-Distance Networks . . 26:1--26:??
              Emanuel Onica and   
              Pascal Felber and   
             Hugues Mercier and   
              Etienne Rivi\`ere   Confidentiality-Preserving
                                  Publish/Subscribe: a Survey  . . . . . . 27:1--27:??
        Anastasia Giachanou and   
                 Fabio Crestani   Like It or Not: a Survey of Twitter
                                  Sentiment Analysis Methods . . . . . . . 28:1--28:??
                Vini Kanvar and   
                Uday P. Khedker   Heap Abstractions for Static Analysis    29:1--29:??
      Éfren L. Souza and   
        Eduardo F. Nakamura and   
               Richard W. Pazzi   Target Tracking for Sensor Networks: a
                                  Survey . . . . . . . . . . . . . . . . . 30:1--30:??
               Paula Branco and   
          Luís Torgo and   
                Rita P. Ribeiro   A Survey of Predictive Modeling on
                                  Imbalanced Domains . . . . . . . . . . . 31:1--31:??
            Mashael Alsabah and   
                   Ian Goldberg   Performance and Security Improvements
                                  for Tor: a Survey  . . . . . . . . . . . 32:1--32:??
              Shadi Khalifa and   
             Yehia Elshater and   
      Kiran Sundaravarathan and   
                Aparna Bhat and   
             Patrick Martin and   
                 Fahim Imam and   
                   Dan Rope and   
             Mike Mcroberts and   
                 Craig Statchuk   The Six Pillars for Building Big Data
                                  Analytics Ecosystems . . . . . . . . . . 33:1--33:??
                  Sparsh Mittal   A Survey of Recent Prefetching
                                  Techniques for Processor Caches  . . . . 35:1--35:??
           Christoph Kofler and   
              Martha Larson and   
                  Alan Hanjalic   User Intent in Multimedia Search: a
                                  Survey of the State of the Art and
                                  Future Challenges  . . . . . . . . . . . 36:1--36:??
            Efthalia Karydi and   
        Konstantinos Margaritis   Parallel and Distributed Collaborative
                                  Filtering: a Survey  . . . . . . . . . . 37:1--37:??
                    Meng Xu and   
               Chengyu Song and   
                    Yang Ji and   
              Ming-Wei Shih and   
                 Kangjie Lu and   
                 Cong Zheng and   
                 Ruian Duan and   
              Yeongjin Jang and   
            Byoungyoung Lee and   
             Chenxiong Qian and   
                 Sangho Lee and   
                     Taesoo Kim   Toward Engineering a Secure Android
                                  Ecosystem: a Survey of Existing
                                  Techniques . . . . . . . . . . . . . . . 38:1--38:??
       Emerson M. A. Xavier and   
Francisco J. Ariza-López and   
Manuel A. Ureña-Cámara   A Survey of Measures and Methods for
                                  Matching Geospatial Vector Datasets  . . 39:1--39:??
              Tahir Maqsood and   
               Osman Khalid and   
              Rizwana Irfan and   
           Sajjad A. Madani and   
                  Samee U. Khan   Scalability Issues in Online Social
                                  Networks . . . . . . . . . . . . . . . . 40:1--40:??

ACM Computing Surveys
Volume 49, Number 3, November, 2016

          Robert A. Bridges and   
                 Neena Imam and   
               Tiffany M. Mintz   Understanding GPU Power: a Survey of
                                  Profiling, Modeling, and Simulation
                                  Methods  . . . . . . . . . . . . . . . . 41:1--41:??
               Jiliang Tang and   
                   Yi Chang and   
             Charu Aggarwal and   
                       Huan Liu   A Survey of Signed Network Mining in
                                  Social Media . . . . . . . . . . . . . . 42:1--42:??
               Jorge Blasco and   
             Thomas M. Chen and   
              Juan Tapiador and   
              Pedro Peris-Lopez   A Survey of Wearable Biometric
                                  Recognition Systems  . . . . . . . . . . 43:1--43:??
               Roman Trobec and   
      Radivoje Vasiljevi\'c and   
           Milo Tomasevi\'c and   
       Veljko Milutinovi\'c and   
              Ramon Beivide and   
                   Mateo Valero   Interconnection Networks in Petascale
                                  Computer Systems: a Survey . . . . . . . 44:1--44:??
              Jasmeet Singh and   
                   Vishal Gupta   Text Stemming: Approaches, Applications,
                                  and Challenges . . . . . . . . . . . . . 45:1--45:??
           Riccardo Coppola and   
               Maurizio Morisio   Connected Car: Technologies, Issues,
                                  Future Trends  . . . . . . . . . . . . . 46:1--46:??
                 Keewon Cho and   
               Wooheon Kang and   
               Hyungjun Cho and   
              Changwook Lee and   
                    Sungho Kang   A Survey of Repair Analysis Algorithms
                                  for Memories . . . . . . . . . . . . . . 47:1--47:??
          Mateus L. Ribeiro and   
   Henrique Manoel Lederman and   
               Simone Elias and   
      Fátima L. S. Nunes   Techniques and Devices Used in Palpation
                                  Simulation with Haptic Feedback  . . . . 48:1--48:??
                Ilia Pietri and   
              Rizos Sakellariou   Mapping Virtual Machines onto Physical
                                  Machines in Cloud Computing: a Survey    49:1--49:??
                    Rui Shu and   
                Peipei Wang and   
      Sigmund A. Gorski III and   
             Benjamin Andow and   
            Adwait Nadkarni and   
             Luke Deshotels and   
               Jason Gionta and   
               William Enck and   
                     Xiaohui Gu   A Study of Security Isolation Techniques 50:1--50:??
     Rodrigo Vieira Steiner and   
                      Emil Lupu   Attestation in Wireless Sensor Networks:
                                  a Survey . . . . . . . . . . . . . . . . 51:1--51:??
      Pedro Henriques Abreu and   
       Miriam Seoane Santos and   
     Miguel Henriques Abreu and   
              Bruno Andrade and   
            Daniel Castro Silva   Predicting Breast Cancer Recurrence
                                  Using Machine Learning Techniques: a
                                  Systematic Review  . . . . . . . . . . . 52:1--52:??
      Jamshaid Sarwar Malik and   
                   Ahmed Hemani   Gaussian Random Number Generation: a
                                  Survey on Hardware Architectures . . . . 53:1--53:??
            Johann Brault-Baron   Hypergraph Acyclicity Revisited  . . . . 54:1--54:??
             Bradley Reaves and   
             Jasmine Bowers and   
  Sigmund Albert Gorski III and   
              Olabode Anise and   
              Rahul Bobhate and   
                Raymond Cho and   
               Hiranava Das and   
           Sharique Hussain and   
          Hamza Karachiwala and   
               Nolen Scaife and   
               Byron Wright and   
               Kevin Butler and   
               William Enck and   
                Patrick Traynor   *droid: Assessment and Evaluation of
                                  Android Application Analysis Tools . . . 55:1--55:??
              Aldeida Aleti and   
                    Irene Moser   A Systematic Literature Review of
                                  Adaptive Parameter Control Methods for
                                  Evolutionary Algorithms  . . . . . . . . 56:1--56:??
                     Tuo Li and   
        Jude Angelo Ambrose and   
               Roshan Ragel and   
               Sri Parameswaran   Processor Design for Soft Errors:
                                  Challenges and State of the Art  . . . . 57:1--57:??
       Gabriel Martins Dias and   
             Boris Bellalta and   
                 Simon Oechsner   A Survey About Prediction-Based Data
                                  Reduction in Wireless Sensor Networks    58:1--58:??
            Joseph Gardiner and   
               Shishir Nagaraja   On the Security of Machine Learning in
                                  Malware C&C Detection: a Survey . . . . . 59:1--59:??

ACM Computing Surveys
Volume 49, Number 4, February, 2017

              Gilles Bailly and   
             Eric Lecolinet and   
                 Laurence Nigay   Visual Menu Techniques . . . . . . . . . 60:1--60:??
                Sven Kiljan and   
               Koen Simoens and   
              Danny De Cock and   
          Marko Van Eekelen and   
                 Harald Vranken   A Survey of Authentication and
                                  Communications Security in Online
                                  Banking  . . . . . . . . . . . . . . . . 61:1--61:??
           Marcus Pendleton and   
      Richard Garcia-Lebron and   
                Jin-Hee Cho and   
                    Shouhuai Xu   A Survey on Systems Security Metrics . . 62:1--62:??
          Ilche Georgievski and   
                   Marco Aiello   Automated Planning for Ubiquitous
                                  Computing  . . . . . . . . . . . . . . . 63:1--63:??
            Matthias Diener and   
         Eduardo H. M. Cruz and   
          Marco A. Z. Alves and   
      Philippe O. A. Navaux and   
                   Israel Koren   Affinity-Based Thread and Data Mapping
                                  in Shared Memory Systems . . . . . . . . 64:1--64:??
              Daniel Servos and   
               Sylvia L. Osborn   Current Research and Open Problems in
                                  Attribute-Based Access Control . . . . . 65:1--65:??
              Chee Sun Liew and   
        Malcolm P. Atkinson and   
             Michelle Galea and   
               Tan Fong Ang and   
                Paul Martin and   
             Jano I. Van Hemert   Scientific Workflows: Moving Across
                                  Paradigms  . . . . . . . . . . . . . . . 66:1--66:??
         Maximilian Capraro and   
                    Dirk Riehle   Inner Source Definition, Benefits, and
                                  Challenges . . . . . . . . . . . . . . . 67:1--67:??
     Mohammad Hanif Jhaveri and   
                Orcun Cetin and   
 Carlos Gañán and   
                Tyler Moore and   
               Michel Van Eeten   Abuse Reporting and the Fight Against
                                  Cybercrime . . . . . . . . . . . . . . . 68:1--68:??
Víctor Martínez and   
            Fernando Berzal and   
             Juan-Carlos Cubero   A Survey of Link Prediction in Complex
                                  Networks . . . . . . . . . . . . . . . . 69:1--69:??
                 Chii Chang and   
    Satish Narayana Srirama and   
                 Rajkumar Buyya   Mobile Cloud Business Process Management
                                  System for the Internet of Things: a
                                  Survey . . . . . . . . . . . . . . . . . 70:1--70:??
  Peratham Wiriyathammabhum and   
       Douglas Summers-Stay and   
    Cornelia Fermüller and   
              Yiannis Aloimonos   Computer Vision and Natural Language
                                  Processing: Recent Approaches in
                                  Multimedia and Robotics  . . . . . . . . 71:1--71:??
                   G. Pavai and   
                   T. V. Geetha   A Survey on Crossover Operators  . . . . 72:1--72:??
         Azzedine Boukerche and   
          Alexander Magnano and   
                   Noura Aljeri   Mobile IP Handover for Vehicular
                                  Networks: Methods, Models, and
                                  Classifications  . . . . . . . . . . . . 73:1--73:??
              Youngjoo Shin and   
              Dongyoung Koo and   
                    Junbeom Hur   A Survey of Secure Data Deduplication
                                  Schemes for Cloud Storage Systems  . . . 74:1--74:??
              Nour Abura'ed and   
           Faisal Shah Khan and   
                 Harish Bhaskar   Advances in the Quantum Theoretical
                                  Approach to Image Processing
                                  Applications . . . . . . . . . . . . . . 75:1--75:??
               Kimberly Tam and   
              Ali Feizollah and   
           Nor Badrul Anuar and   
               Rosli Salleh and   
              Lorenzo Cavallaro   The Evolution of Android Malware and
                                  Android Analysis Techniques  . . . . . . 76:1--76:??


ACM Computing Surveys
Volume 50, Number 1, April, 2017

                     Tao Li and   
                   Ning Xie and   
               Chunqiu Zeng and   
                 Wubai Zhou and   
                   Li Zheng and   
                 Yexi Jiang and   
                 Yimin Yang and   
                 Hsin-Yu Ha and   
                    Wei Xue and   
                  Yue Huang and   
             Shu-Ching Chen and   
         Jainendra Navlakha and   
                  S. S. Iyengar   Data-Driven Techniques in Disaster
                                  Information Management . . . . . . . . . 1:1--1:??
           Marcello La Rosa and   
    Wil M. P. Van Der Aalst and   
               Marlon Dumas and   
              Fredrik P. Milani   Business Process Variability Modeling: a
                                  Survey . . . . . . . . . . . . . . . . . 2:1--2:??
              Marwa Salayma and   
             Ahmed Al-Dubai and   
              Imed Romdhani and   
                 Youssef Nasser   Wireless Body Area Network (WBAN): a
                                  Survey on Reliability, Fault Tolerance,
                                  and Technologies Coexistence . . . . . . 3:1--3:??
              Sayantan Nath and   
             Sonali Agarwal and   
                   G. N. Pandey   Evaluation of Knowledge Gaps in
                                  Mathematical Applications of Thermal
                                  Image Processing Techniques for Fire
                                  Prevention . . . . . . . . . . . . . . . 4:1--4:??
                    Ting Su and   
                      Ke Wu and   
                Weikai Miao and   
                 Geguang Pu and   
                  Jifeng He and   
                Yuting Chen and   
                    Zhendong Su   A Survey on Data-Flow Testing  . . . . . 5:1--5:??
         Arnab Kumar Biswas and   
               Dipak Ghosal and   
               Shishir Nagaraja   A Survey of Timing Channels and
                                  Countermeasures  . . . . . . . . . . . . 6:1--6:??
                Frank Dylla and   
                Jae Hee Lee and   
           Till Mossakowski and   
           Thomas Schneider and   
    André Van Delden and   
          Jasper Van De Ven and   
                Diedrich Wolter   A Survey of Qualitative Spatial and
                                  Temporal Calculi: Algebraic and
                                  Computational Properties . . . . . . . . 7:1--7:??
    Raghavendra Ramachandra and   
                Christoph Busch   Presentation Attack Detection Methods
                                  for Face Recognition Systems: a
                                  Comprehensive Survey . . . . . . . . . . 8:1--8:??
                 Britta Meixner   Hypervideos and Interactive Multimedia
                                  Presentations  . . . . . . . . . . . . . 9:1--9:??
               Admela Jukan and   
           Xavi Masip-Bruin and   
                      Nina Amla   Smart Computing and Sensing Technologies
                                  for Animal Welfare: a Systematic Review  10:1--10:??
                Lianhua Chi and   
                   Xingquan Zhu   Hashing Techniques: a Survey and
                                  Taxonomy . . . . . . . . . . . . . . . . 11:1--11:36
           Milena Tsvetkova and   
               Taha Yasseri and   
              Eric T. Meyer and   
         J. Brian Pickering and   
               Vegard Engen and   
               Paul Walland and   
         Marika Lüders and   
Asbjòrn Fòlstad and   
                  George Bravos   Understanding Human-Machine Networks: a
                                  Cross-Disciplinary Survey  . . . . . . . 12:1--12:??
          Stefano Calzavara and   
           Riccardo Focardi and   
            Marco Squarcina and   
                 Mauro Tempesta   Surviving the Web: a Journey into Web
                                  Session Security . . . . . . . . . . . . 13:1--13:??
            Rabih Bashroush and   
             Muhammad Garba and   
               Rick Rabiser and   
                Iris Groher and   
               Goetz Botterweck   CASE Tool Support for Variability
                                  Management in Software Product Lines . . 14:1--14:??
     Amparo Soler-Dominguez and   
              Angel A. Juan and   
                  Renatas Kizys   A Survey on Financial Applications of
                                  Metaheuristics . . . . . . . . . . . . . 15:1--15:??
               Nathan Burow and   
              Scott A. Carr and   
                Joseph Nash and   
                 Per Larsen and   
              Michael Franz and   
          Stefan Brunthaler and   
                  Mathias Payer   Control-Flow Integrity: Precision,
                                  Security, and Performance  . . . . . . . 16:1--16:??

ACM Computing Surveys
Volume 50, Number 2, June, 2017

              Faiz ul Muram and   
                   Huy Tran and   
                       Uwe Zdun   Systematic Review of Software Behavioral
                                  Model Consistency Checking . . . . . . . 17:1--17:??
      Quinten David Soetens and   
              Romain Robbes and   
                  Serge Demeyer   Changes as First-Class Citizens: a
                                  Research Perspective on Modern Software
                                  Tooling  . . . . . . . . . . . . . . . . 18:1--18:??
                 Joan Boyar and   
          Lene M. Favrholdt and   
           Christian Kudahl and   
              Kim S. Larsen and   
            Jesper W. Mikkelsen   Online Algorithms with Advice: a Survey  19:1--19:??
        Anastasia Ioannidou and   
        Elisavet Chatzilari and   
        Spiros Nikolopoulos and   
           Ioannis Kompatsiaris   Deep Learning Advances in Computer
                                  Vision with $3$D Data: a Survey  . . . . 20:1--20:??
              Ahmed Hussein and   
       Mohamed Medhat Gaber and   
                 Eyad Elyan and   
                 Chrisina Jayne   Imitation Learning: a Survey of Learning
                                  Methods  . . . . . . . . . . . . . . . . 21:1--21:??
        Joachim Gudmundsson and   
                 Michael Horton   Spatio-Temporal Analysis of Team Sports  22:1--22:??
        Heitor Murilo Gomes and   
          Jean Paul Barddal and   
  Fabrício Enembreck and   
                   Albert Bifet   A Survey on Ensemble Learning for Data
                                  Stream Classification  . . . . . . . . . 23:1--23:??
           Amit Kumar Singh and   
          Piotr Dziurzanski and   
    Hashan Roshantha Mendis and   
       Leandro Soares Indrusiak   A Survey and Comparative Study of Hard
                                  and Soft Real-Time Dynamic Resource
                                  Allocation Strategies for Multi-\slash
                                  Many-Core Systems  . . . . . . . . . . . 24:1--24:??
              Ali Yadollahi and   
  Ameneh Gholipour Shahraki and   
                Osmar R. Zaiane   Current State of Text Sentiment Analysis
                                  from Opinion to Emotion Mining . . . . . 25:1--25:??
            Denis Weerasiri and   
          Moshe Chai Barukh and   
         Boualem Benatallah and   
              Quan Z. Sheng and   
                   Rajiv Ranjan   A Taxonomy and Survey of Cloud Resource
                                  Orchestration Techniques . . . . . . . . 26:1--26:??
                  Sparsh Mittal   A Survey of Techniques for Cache
                                  Partitioning in Multicore Processors . . 27:1--27:??
               Hanjiang Luo and   
                 Kaishun Wu and   
              Rukhsana Ruby and   
                  Feng Hong and   
               Zhongwen Guo and   
                   Lionel M. Ni   Simulation and Experimentation Platforms
                                  for Underwater Acoustic Sensor Networks:
                                  Advancements and Challenges  . . . . . . 28:1--28:??
              Rafaqut Kazmi and   
        Dayang N. A. Jawawi and   
            Radziah Mohamad and   
                    Imran Ghani   Effective Regression Test Case
                                  Selection: a Systematic Literature
                                  Review . . . . . . . . . . . . . . . . . 29:1--29:??
                Cuong T. Do and   
             Nguyen H. Tran and   
            Choongseon Hong and   
         Charles A. Kamhoua and   
             Kevin A. Kwiat and   
                Erik Blasch and   
                Shaolei Ren and   
              Niki Pissinou and   
    Sundaraja Sitharama Iyengar   Game Theory for Cyber Security and
                                  Privacy  . . . . . . . . . . . . . . . . 30:1--30:??
         Mohamed Amine Kafi and   
           Jalel Ben Othman and   
                 Nadjib Badache   A Survey on Reliability Protocols in
                                  Wireless Sensor Networks . . . . . . . . 31:1--31:??

ACM Computing Surveys
Volume 50, Number 3, October, 2017

             Charith Perera and   
                Yongrui Qin and   
          Julio C. Estrella and   
    Stephan Reiff-Marganiec and   
        Athanasios V. Vasilakos   Fog Computing for Sustainable Smart
                                  Cities: a Survey . . . . . . . . . . . . 32:1--32:??
        Baligh M. Al-Helali and   
               Sabri A. Mahmoud   Arabic Online Handwriting Recognition
                                  (AOHR): a Survey . . . . . . . . . . . . 33:1--33:??
          Kok-Lim Alvin Yau and   
               Junaid Qadir and   
             Hooi Ling Khoo and   
              Mee Hong Ling and   
              Peter Komisarczuk   A Survey on Reinforcement Learning
                                  Models and Algorithms for Traffic Signal
                                  Control  . . . . . . . . . . . . . . . . 34:1--34:??
              Cheol-Ho Hong and   
                Ivor Spence and   
      Dimitrios S. Nikolopoulos   GPU Virtualization and Scheduling
                                  Methods: a Comprehensive Survey  . . . . 35:1--35:??
        Muhammad Murad Khan and   
            Roliana Ibrahim and   
                    Imran Ghani   Cross Domain Recommender Systems: a
                                  Systematic Literature Review . . . . . . 36:1--36:??
            Kenneth O'Brien and   
                Ilia Pietri and   
                 Ravi Reddy and   
         Alexey Lastovetsky and   
              Rizos Sakellariou   A Survey of Power and Energy Predictive
                                  Models in HPC Systems and Applications   37:1--37:??
    Astrid Rheinländer and   
                  Ulf Leser and   
                   Goetz Graefe   Optimization of Complex Dataflows with
                                  User-Defined Functions . . . . . . . . . 38:1--38:??
           Ahmad Barforoush and   
            Hossein Shirazi and   
                   Hojjat Emami   A New Classification Framework to
                                  Evaluate the Entity Profiling on the
                                  Web: Past, Present and Future  . . . . . 39:1--39:??
              Geong Sen Poh and   
               Ji-Jian Chin and   
              Wei-Chuen Yau and   
     Kim-Kwang Raymond Choo and   
        Moesfa Soeheila Mohamad   Searchable Symmetric Encryption: Designs
                                  and Challenges . . . . . . . . . . . . . 40:1--40:??
                 Yanfang Ye and   
                     Tao Li and   
             Donald Adjeroh and   
           S. Sitharama Iyengar   A Survey on Malware Detection Using Data
                                  Mining Techniques  . . . . . . . . . . . 41:1--41:??
        Jeroen J. A. Keiren and   
              Peter Fontana and   
               Rance Cleaveland   Corrections to ``A Menagerie of Timed
                                  Automata'' . . . . . . . . . . . . . . . 42:1--42:??
                   Longbing Cao   Data Science: a Comprehensive Overview   43:1--43:??
        Alessandro Acquisti and   
              Idris Adjerid and   
           Rebecca Balebako and   
          Laura Brandimarte and   
        Lorrie Faith Cranor and   
          Saranga Komanduri and   
        Pedro Giovanni Leon and   
               Norman Sadeh and   
             Florian Schaub and   
              Manya Sleeper and   
                  Yang Wang and   
                  Shomir Wilson   Nudges for Privacy and Security:
                                  Understanding and Assisting Users'
                                  Choices Online . . . . . . . . . . . . . 44:1--44:??
                     Tao Li and   
               Chunqiu Zeng and   
                 Yexi Jiang and   
                 Wubai Zhou and   
                 Liang Tang and   
                  Zheng Liu and   
                      Yue Huang   Data-Driven Techniques in Computing
                                  System Management  . . . . . . . . . . . 45:1--45:??
                  Pat Morin and   
            Wolfgang Mulzer and   
                   Tommy Reddad   Encoding Arguments . . . . . . . . . . . 46:1--46:??

ACM Computing Surveys
Volume 50, Number 4, November, 2017

                     Tim Storer   Bridging the Chasm: a Survey of Software
                                  Engineering Practice in Scientific
                                  Programming  . . . . . . . . . . . . . . 47:1--47:??
             Jones Granatyr and   
              Nardine Osman and   
           João Dias and   
Maria Augusta Silveira Netto Nunes and   
            Judith Masthoff and   
  Fabrício Enembreck and   
        Otto Robert Lessing and   
              Carles Sierra and   
            Ana Maria Paiva and   
  Edson Emílio Scalabrin   The Need for Affective Trust Applied to
                                  Trust and Reputation Models  . . . . . . 48:1--48:??
              Kiranbir Kaur and   
             Sandeep Sharma and   
         Karanjeet Singh Kahlon   Interoperability and Portability
                                  Approaches in Inter-Connected Clouds: a
                                  Review . . . . . . . . . . . . . . . . . 49:1--49:??
            Georgia Psychou and   
       Dimitrios Rodopoulos and   
           Mohamed M. Sabry and   
             Tobias Gemmeke and   
              David Atienza and   
             Tobias G. Noll and   
               Francky Catthoor   Classification of Resilience Techniques
                                  Against Functional Errors at Higher
                                  Abstraction Layers of Digital Systems    50:1--50:??
              Laure Soulier and   
                   Lynda Tamine   On the Collaboration Support in
                                  Information Retrieval  . . . . . . . . . 51:1--51:??
         Andreas Schoknecht and   
                 Tom Thaler and   
               Peter Fettke and   
           Andreas Oberweis and   
                      Ralf Laue   Similarity of Business Process Models
                                  --- A State-of-the-Art Analysis  . . . . 52:1--52:??
              Michael Stein and   
            Mathias Fischer and   
         Immanuel Schweizer and   
       Max Mühlhäuser   A Classification of Locality in Network
                                  Research . . . . . . . . . . . . . . . . 53:1--53:??
         Tanmoy Chakraborty and   
              Ayushi Dalmia and   
          Animesh Mukherjee and   
                  Niloy Ganguly   Metrics for Community Analysis: a Survey 54:1--54:??
           Nguyen Khoi Tran and   
              Quan Z. Sheng and   
         Muhammad Ali Babar and   
                       Lina Yao   Searching the Web of Things: State of
                                  the Art, Challenges, and Solutions . . . 55:1--55:??
  Seyed Mohammad Ghaffarian and   
           Hamid Reza Shahriari   Software Vulnerability Analysis and
                                  Discovery Using Machine-Learning and
                                  Data-Mining Techniques: a Survey . . . . 56:1--56:??
             Zain Bin Tariq and   
       Dost Muhammad Cheema and   
      Muhammad Zahir Kamran and   
              Ijaz Haider Naqvi   Non-GPS Positioning Systems: a Survey    57:1--57:??
              Yangdong Deng and   
                   Yufei Ni and   
                 Zonghui Li and   
                   Shuai Mu and   
                   Wenjun Zhang   Toward Real-Time Ray Tracing: a Survey
                                  on Hardware Acceleration and
                                  Microarchitecture Techniques . . . . . . 58:1--58:??
               Kwangwon Sun and   
                   Sukyoung Ryu   Analysis of JavaScript Programs:
                                  Challenges and Research Trends . . . . . 59:1--59:??
           Rafael Caballero and   
       Adrián Riesco and   
                    Josep Silva   A Survey of Algorithmic Debugging  . . . 60:1--60:??
            Padma Jayaraman and   
          Ranjani Parthasarathi   A Survey on Post-Silicon Functional
                                  Validation for Multicore Architectures   61:1--61:??

ACM Computing Surveys
Volume 50, Number 5, November, 2017

         Azzedine Boukerche and   
      Abdul Jabbar Siddiqui and   
             Abdelhamid Mammeri   Automated Vehicle Detection and
                                  Classification: Models, Methods, and
                                  Techniques . . . . . . . . . . . . . . . 62:1--62:??
             Changtao Zhong and   
                Nishanth Sastry   Systems Applications of Social Networks  63:1--63:??
                 Radim Baca and   
Michal Krátký and   
      Irena Holubová and   
      Martin Necaský and   
        Tomás Skopal and   
             Martin Svoboda and   
                    Sherif Sakr   Structural XML Query Processing  . . . . 64:1--64:??
              Pallavi Bagga and   
                     Rahul Hans   Mobile Agents System Security: a
                                  Systematic Survey  . . . . . . . . . . . 65:1--65:??
            Esben Andreasen and   
                 Liang Gong and   
       Anders Mòller and   
             Michael Pradel and   
           Marija Selakovic and   
                Koushik Sen and   
      Cristian-Alexandru Staicu   A Survey of Dynamic Analysis and Test
                                  Generation for JavaScript  . . . . . . . 66:1--66:??
               Niall Murray and   
       Oluwakemi A. Ademoye and   
          Gheorghita Ghinea and   
           Gabriel-Miro Muntean   A Tutorial for Olfaction-Based
                                  Multisensorial Media Application Design
                                  and Evaluation . . . . . . . . . . . . . 67:1--67:??
               Renzo Angles and   
             Marcelo Arenas and   
       Pablo Barceló and   
                Aidan Hogan and   
               Juan Reutter and   
                  Domagoj Vrgoc   Foundations of Modern Query Languages
                                  for Graph Databases  . . . . . . . . . . 68:1--68:??
           Dorien Herremans and   
            Ching-Hua Chuan and   
                    Elaine Chew   A Functional Taxonomy of Music
                                  Generation Systems . . . . . . . . . . . 69:1--69:??
        Oscar Pulido-Prieto and   
Ulises Juárez-Martínez   A Survey of Naturalistic Programming
                                  Technologies . . . . . . . . . . . . . . 70:1--70:??
             Elias Alevizos and   
     Anastasios Skarlatidis and   
          Alexander Artikis and   
             Georgios Paliouras   Probabilistic Complex Event Recognition:
                                  a Survey . . . . . . . . . . . . . . . . 71:1--71:??
     Francisco Martinez-Gil and   
              Miguel Lozano and   
Ignacio García-Fernández and   
      Fernando Fernández   Modeling, Evaluation, and Scale on
                                  Artificial Pedestrians: a Literature
                                  Review . . . . . . . . . . . . . . . . . 72:1--72:??
               Aditya Joshi and   
      Pushpak Bhattacharyya and   
                 Mark J. Carman   Automatic Sarcasm Detection: a Survey    73:1--73:??
      Pablo González and   
     Alberto Castaño and   
           Nitesh V. Chawla and   
       Juan José Del Coz   A Review on Quantification Learning  . . 74:1--74:??
       Jordi Mongay Batalla and   
       Athanasios Vasilakos and   
               Mariusz Gajewski   Secure Smart Homes: Opportunities and
                                  Challenges . . . . . . . . . . . . . . . 75:1--75:??
              Frank De Boer and   
            Vlad Serbanescu and   
         Reiner Hähnle and   
             Ludovic Henrio and   
             Justine Rochas and   
          Crystal Chang Din and   
        Einar Broch Johnsen and   
             Marjan Sirjani and   
          Ehsan Khamespanah and   
       Kiko Fernandez-Reyes and   
            Albert Mingkun Yang   A Survey of Active Object Languages  . . 76:1--76:??
               Stefan Laube and   
              Rainer Böhme   Strategic Aspects of Cyber Risk
                                  Information Sharing  . . . . . . . . . . 77:1--77:??

ACM Computing Surveys
Volume 50, Number 6, January, 2018

Eduardo Felipe Zambom Santana and   
           Ana Paula Chaves and   
       Marco Aurelio Gerosa and   
                  Fabio Kon and   
             Dejan S. Milojicic   Software Platforms for Smart Cities:
                                  Concepts, Requirements, Challenges, and
                                  a Unified Reference Architecture . . . . 78:1--78:??
                Onur Tunali and   
                  Mustafa Altun   A Survey of Fault-Tolerance Algorithms
                                  for Reconfigurable Nano-Crossbar Arrays  79:1--79:??
                  Irina Tal and   
           Gabriel-Miro Muntean   Towards Reasoning Vehicles: a Survey of
                                  Fuzzy Logic-Based Solutions in Vehicular
                                  Networks . . . . . . . . . . . . . . . . 80:1--80:??
                Xuanhua Shi and   
               Zhigao Zheng and   
              Yongluan Zhou and   
                    Hai Jin and   
                  Ligang He and   
                     Bo Liu and   
                Qiang-Sheng Hua   Graph Processing on GPUs: a Survey . . . 81:1--81:??
                 Alan Burns and   
                Robert I. Davis   A Survey of Research into Mixed
                                  Criticality Systems  . . . . . . . . . . 82:1--82:??
              Paulo Martins and   
               Leonel Sousa and   
                  Artur Mariano   A Survey on Fully Homomorphic
                                  Encryption: an Engineering Perspective   83:1--83:??
   Alejandro Torreño and   
               Eva Onaindia and   
     Antonín Komenda and   
                  Michal Stolba   Cooperative Multi-Agent Planning: a
                                  Survey . . . . . . . . . . . . . . . . . 84:1--84:??
              Pranjul Yadav and   
          Michael Steinbach and   
                Vipin Kumar and   
                   Gyorgy Simon   Mining Electronic Health Records (EHRs):
                                  a Survey . . . . . . . . . . . . . . . . 85:1--85:??
              Tempestt Neal and   
     Kalaivani Sundararajan and   
               Aneez Fatima and   
                 Yiming Yan and   
              Yingfei Xiang and   
                  Damon Woodard   Surveying Stylometry Techniques and
                                  Applications . . . . . . . . . . . . . . 86:1--86:??
             Artem Voronkov and   
        Leonardo Horn Iwaya and   
       Leonardo A. Martucci and   
                Stefan Lindskog   Systematic Literature Review on
                                  Usability of Firewall Configuration  . . 87:1--87:??
           Elif Bilge Kavun and   
        Hristina Mihajloska and   
            Tolga Yalçin   A Survey on Authenticated
                                  Encryption--ASIC Designer's Perspective  88:1--88:??
           Sebastian Werner and   
           Javier Navaridas and   
             Mikel Luján   A Survey on Optical Network-on-Chip
                                  Architectures  . . . . . . . . . . . . . 89:1--89:??
            Danial Hooshyar and   
             Moslem Yousefi and   
                   Heuiseok Lim   Data-Driven Approaches to Game Player
                                  Modeling: a Systematic Literature Review 90:1--90:??
             Yaser Mansouri and   
        Adel Nadjaran Toosi and   
                 Rajkumar Buyya   Data Storage Management in Cloud
                                  Environments: Taxonomy, Survey, and
                                  Future Directions  . . . . . . . . . . . 91:1--91:??
           Prakash Shrestha and   
                  Nitesh Saxena   An Offensive and Defensive Exposition of
                                  Wearable Computing . . . . . . . . . . . 92:1--92:??
           Niels Van Berkel and   
            Denzil Ferreira and   
              Vassilis Kostakos   The Experience Sampling Method on Mobile
                                  Devices  . . . . . . . . . . . . . . . . 93:1--93:??
                 Jundong Li and   
                Kewei Cheng and   
                Suhang Wang and   
            Fred Morstatter and   
          Robert P. Trevino and   
               Jiliang Tang and   
                       Huan Liu   Feature Selection: a Data Perspective    94:1--94:??
               Viivi Uurtio and   
    João M. Monteiro and   
                Jaz Kandola and   
          John Shawe-Taylor and   
    Delmiro Fernandez-Reyes and   
                     Juho Rousu   A Tutorial on Canonical Correlation
                                  Methods  . . . . . . . . . . . . . . . . 95:1--95:??
            Richard Skarbez and   
   Frederick P. Brooks, Jr. and   
                Mary C. Whitton   A Survey of Presence and Related
                                  Concepts . . . . . . . . . . . . . . . . 96:1--96:??
                 Suining He and   
                   Kang G. Shin   Geomagnetism for Smartphone-Based Indoor
                                  Localization: Challenges, Advances, and
                                  Comparisons  . . . . . . . . . . . . . . 97:1--97:??
               Jhonny Mertz and   
                   Ingrid Nunes   Understanding Application-Level Caching
                                  in Web Applications: a Comprehensive
                                  Introduction and Survey of
                                  State-of-the-Art Approaches  . . . . . . 98:1--98:??


ACM Computing Surveys
Volume 51, Number 1, April, 2018

              Filipe Betzel and   
          Karen Khatamifard and   
              Harini Suresh and   
             David J. Lilja and   
               John Sartori and   
                  Ulya Karpuzcu   Approximate Communication: Techniques
                                  for Reducing Communication Bottlenecks
                                  in Large-Scale Parallel Systems  . . . . 1:1--1:??
             Miriam Sturdee and   
                Jason Alexander   Analysis and Classification of
                                  Shape-Changing Interfaces for Design and
                                  Application-based Research . . . . . . . 2:1--2:??
               Szymon Wasik and   
             Maciej Antczak and   
                 Jan Badura and   
            Artur Laskowski and   
                 Tomasz Sternal   A Survey on Online Judge Systems and
                                  Their Applications . . . . . . . . . . . 3:1--3:??
            Tsong Yueh Chen and   
              Fei-Ching Kuo and   
                   Huai Liu and   
               Pak-Lok Poon and   
                 Dave Towey and   
                  T. H. Tse and   
                  Zhi Quan Zhou   Metamorphic Testing: a Review of
                                  Challenges and Opportunities . . . . . . 4:1--4:??
         Unaizah Obaidellah and   
           Mohammed Al Haek and   
              Peter C.-H. Cheng   A Survey on the Usage of Eye-Tracking in
                                  Computer Programming . . . . . . . . . . 5:1--5:??
              Federica Paci and   
          Anna Squicciarini and   
                 Nicola Zannone   Survey on Access Control for
                                  Community-Centered Collaborative Systems 6:1--6:??
             Florian Daniel and   
           Pavel Kucherbaev and   
           Cinzia Cappiello and   
         Boualem Benatallah and   
           Mohammad Allahbakhsh   Quality Control in Crowdsourcing: a
                                  Survey of Quality Attributes, Assessment
                                  Techniques, and Assurance Actions  . . . 7:1--7:??
          Marco A. S. Netto and   
       Rodrigo N. Calheiros and   
       Eduardo R. Rodrigues and   
         Renato L. F. Cunha and   
                 Rajkumar Buyya   HPC Cloud for Scientific and Business
                                  Applications: Taxonomy, Vision, and
                                  Research Challenges  . . . . . . . . . . 8:1--8:??
          Eliahu Khalastchi and   
                    Meir Kalech   On Fault Detection and Diagnosis in
                                  Robotic Systems  . . . . . . . . . . . . 9:1--9:??
           Samira Pouyanfar and   
                 Yimin Yang and   
             Shu-Ching Chen and   
              Mei-Ling Shyu and   
                  S. S. Iyengar   Multimedia Big Data Analytics: a Survey  10:1--10:??
         Dimitris Gritzalis and   
              Giulia Iseppi and   
            Alexios Mylonas and   
                Vasilis Stavrou   Exiting the Risk Assessment Maze: a
                                  Meta-Survey  . . . . . . . . . . . . . . 11:1--11:??
               Dalia Nashat and   
                    Ali A. Amer   A Comprehensive Taxonomy of
                                  Fragmentation and Allocation Techniques
                                  in Distributed Database Design . . . . . 12:1--12:??
                 Bowen Zhou and   
                 Rajkumar Buyya   Augmentation Techniques for Mobile Cloud
                                  Computing: a Taxonomy, Survey, and
                                  Future Directions  . . . . . . . . . . . 13:1--13:??
           Jeremy A. Marvel and   
            Roger Bostelman and   
                      Joe Falco   Multi-Robot Assembly Strategies and
                                  Metrics  . . . . . . . . . . . . . . . . 14:1--14:??
    Michal Gaziel-Yablowitz and   
              David G. Schwartz   A Review and Assessment Framework for
                                  Mobile-Based Emergency Intervention Apps 15:1--15:??
     Mohammed Ali Al-Garadi and   
      Kasturi Dewi Varathan and   
            Sri Devi Ravana and   
                 Ejaz Ahmed and   
             Ghulam Mujtaba and   
 Muhammad Usman Shahid Khan and   
                  Samee U. Khan   Analysis of Online Social Network
                                  Connections for Identification of
                                  Influential Users: Survey and Open
                                  Research Issues  . . . . . . . . . . . . 16:1--16:??
               Martin Monperrus   Automatic Software Repair: a
                                  Bibliography . . . . . . . . . . . . . . 17:1--17:??
                Zhijun Ding and   
                 Xiaolun Li and   
             Changjun Jiang and   
                   Mengchu Zhou   Objectives and State-of-the-Art of
                                  Location-Based Social Network
                                  Recommender Systems  . . . . . . . . . . 18:1--18:??
     Rodolfo W. L. Coutinho and   
         Azzedine Boukerche and   
          Luiz F. M. Vieira and   
         Antonio A. F. Loureiro   Underwater Wireless Sensor Networks: a
                                  New Challenge for Topology Control-Based
                                  Systems  . . . . . . . . . . . . . . . . 19:1--19:??
              Rodrigo Bruno and   
                 Paulo Ferreira   A Study on Garbage Collection Algorithms
                                  for Big Data Environments  . . . . . . . 20:1--20:??
           Adriana Draghici and   
              Maarten Van Steen   A Survey of Techniques for Automatically
                                  Sensing the Behavior of a Crowd  . . . . 21:1--21:??
         Alexander Bergmayr and   
     Uwe Breitenbücher and   
              Nicolas Ferry and   
         Alessandro Rossini and   
              Arnor Solberg and   
              Manuel Wimmer and   
               Gerti Kappel and   
                  Frank Leymann   A Systematic Review of Cloud Modeling
                                  Languages  . . . . . . . . . . . . . . . 22:1--22:??

ACM Computing Surveys
Volume 51, Number 2, June, 2018

      Francieli Zanon Boito and   
          Eduardo C. Inacio and   
              Jean Luca Bez and   
      Philippe O. A. Navaux and   
         Mario A. R. Dantas and   
                 Yves Denneulin   A Checkpoint of Research on Parallel I/O
                                  for High-Performance Computing . . . . . 23:1--23:??
               Ivan Brugere and   
            Brian Gallagher and   
           Tanya Y. Berger-Wolf   Network Structure Inference, A Survey:
                                  Motivations, Methods, and Applications   24:1--24:??
               Ligang Zhang and   
              Brijesh Verma and   
         Dian Tjondronegoro and   
                 Vinod Chandran   Facial Expression Analysis under Partial
                                  Occlusion: a Survey  . . . . . . . . . . 25:1--25:??
              Mohamad Gebai and   
             Michel R. Dagenais   Survey and Analysis of Kernel and
                                  Userspace Tracers on Linux: Design,
                                  Implementation, and Overhead . . . . . . 26:1--26:??
                Elisa Rojas and   
    Roberto Doriguzzi-Corin and   
            Sergio Tamurejo and   
               Andres Beato and   
               Arne Schwabe and   
              Kevin Phemius and   
                Carmen Guerrero   Are We Ready to Drive Software-Defined
                                  Networks? A Comprehensive Survey on
                                  Management Tools and Techniques  . . . . 27:1--27:??
               Carolyn Lamb and   
            Daniel G. Brown and   
           Charles L. A. Clarke   Evaluating Computational Creativity: an
                                  Interdisciplinary Tutorial . . . . . . . 28:1--28:??
               Yasmin Fathy and   
             Payam Barnaghi and   
                Rahim Tafazolli   Large-Scale Indexing, Discovery, and
                                  Ranking for the Internet of Things (IoT) 29:1--29:??
         Willington Siabato and   
       Christophe Claramunt and   
              Sergio Ilarri and   
     Miguel Angel Manso-Callejo   A Survey of Modelling Trends in Temporal
                                  GIS  . . . . . . . . . . . . . . . . . . 30:1--30:??
                 Zihao Shan and   
                    Kui Ren and   
             Marina Blanton and   
                      Cong Wang   Practical Secure Computation
                                  Outsourcing: a Survey  . . . . . . . . . 31:1--31:??
            Arkaitz Zubiaga and   
                 Ahmet Aker and   
           Kalina Bontcheva and   
              Maria Liakata and   
                    Rob Procter   Detection and Resolution of Rumours in
                                  Social Media: a Survey . . . . . . . . . 32:1--32:??
          Miyuru Dayarathna and   
                 Srinath Perera   Recent Advancements in Event Processing  33:1--33:??
              Wooi King Soo and   
             Teck-Chaw Ling and   
             Aung Htein Maw and   
                  Su Thawda Win   Survey on Load-Balancing Methods in
                                  802.11 Infrastructure Mode Wireless
                                  Networks for Improving Quality of
                                  Service  . . . . . . . . . . . . . . . . 34:1--34:??
            Giulio Rossetti and   
            Rémy Cazabet   Community Discovery in Dynamic Networks:
                                  a Survey . . . . . . . . . . . . . . . . 35:1--35:??
                  Eran Toch and   
            Claudio Bettini and   
               Erez Shmueli and   
             Laura Radaelli and   
               Andrea Lanzi and   
             Daniele Riboni and   
                    Bruno Lepri   The Privacy Implications of Cyber
                                  Security Systems: a Technological Survey 36:1--36:??
   Muhamad Risqi U. Saputra and   
             Andrew Markham and   
                   Niki Trigoni   Visual SLAM and Structure from Motion in
                                  Dynamic Environments: a Survey . . . . . 37:1--37:??
              Hadi Ghanbari and   
            Tero Vartiainen and   
                  Mikko Siponen   Omission of Quality Software Development
                                  Practices: a Systematic Literature
                                  Review . . . . . . . . . . . . . . . . . 38:1--38:??
                    Chao Li and   
                  Yushu Xue and   
                  Jing Wang and   
              Weigong Zhang and   
                         Tao Li   Edge-Oriented Computing Paradigms: a
                                  Survey on Architecture Design and System
                                  Management . . . . . . . . . . . . . . . 39:1--39:??
              Ali Davoudian and   
                   Liu Chen and   
                    Mengchi Liu   A Survey on NoSQL Stores . . . . . . . . 40:1--40:43
       Davi Silva Rodrigues and   
Márcio Eduardo Delamaro and   
Cléber Gimenez Corrêa and   
      Fátima L. S. Nunes   Using Genetic Algorithms in Test Data
                                  Generation: a Critical Systematic
                                  Mapping  . . . . . . . . . . . . . . . . 41:1--41:??
         Rodolfo S. Antunes and   
           Lucas A. Seewald and   
      Vinicius F. Rodrigues and   
      Cristiano A. Da Costa and   
          Luiz Gonzaga, Jr. and   
           Rodrigo R. Righi and   
              Andreas Maier and   
        Björn Eskofier and   
   Malte Ollenschläger and   
              Farzad Naderi and   
             Rebecca Fahrig and   
            Sebastian Bauer and   
               Sigrun Klein and   
              Gelson Campanatti   A Survey of Sensors in Healthcare
                                  Workflow Monitoring  . . . . . . . . . . 42:1--42:??
             Matteo Turilli and   
             Mark Santcroos and   
                   Shantenu Jha   A Comprehensive Perspective on Pilot-Job
                                  Systems  . . . . . . . . . . . . . . . . 43:1--43:??

ACM Computing Surveys
Volume 51, Number 3, July, 2018

              Tobias Brandt and   
                Marco Grawunder   GeoStreams: a Survey . . . . . . . . . . 44:1--44:??
     Y. V. Srinivasa Murthy and   
        Shashidhar G. Koolagudi   Content-Based Music Information
                                  Retrieval (CB-MIR) and Its Applications
                                  toward the Music Industry: a Review  . . 45:1--45:??
    Konstantia Barmpatsalou and   
                 Tiago Cruz and   
           Edmundo Monteiro and   
                   Paulo Simoes   Current and Future Trends in Mobile
                                  Device Forensics: a Survey . . . . . . . 46:1--46:??
                Nasir Saeed and   
                Haewoon Nam and   
         Mian Imtiaz Ul Haq and   
     Dost Bhatti Muhammad Saqib   A Survey on Multidimensional Scaling . . 47:1--47:??
 Paulo Angelo Alves Resende and   
    André Costa Drummond   A Survey of Random Forest Based Methods
                                  for Intrusion Detection Systems  . . . . 48:1--48:??
       Cláudio Gomes and   
               Casper Thule and   
               David Broman and   
          Peter Gorm Larsen and   
                Hans Vangheluwe   Co-Simulation: a Survey  . . . . . . . . 49:1--49:??
            Roberto Baldoni and   
               Emilio Coppa and   
        Daniele Cono D'Elia and   
           Camil Demetrescu and   
                 Irene Finocchi   A Survey of Symbolic Execution
                                  Techniques . . . . . . . . . . . . . . . 50:1--50:??
            Fatemeh Shirazi and   
        Milivoj Simeonovski and   
     Muhammad Rizwan Asghar and   
             Michael Backes and   
                   Claudia Diaz   A Survey on Routing in Anonymous
                                  Communication Protocols  . . . . . . . . 51:1--51:??
       Niels Van Dijkhuizen and   
             Jeroen Van Der Ham   A Survey of Network Traffic
                                  Anonymisation Techniques and
                                  Implementations  . . . . . . . . . . . . 52:1--52:??
        Wellington Oliveira and   
         Daniel De Oliveira and   
             Vanessa Braganholo   Provenance Analytics for Workflow-Based
                                  Computational Experiments: a Survey  . . 53:1--53:??
             Nathan Hanford and   
               Vishal Ahuja and   
         Matthew K. Farrens and   
              Brian Tierney and   
                   Dipak Ghosal   A Survey of End-System Optimizations for
                                  High-Speed Networks  . . . . . . . . . . 54:1--54:??
        Ali Ahmadian Ramaki and   
        Abbas Rasoolzadegan and   
            Abbas Ghaemi Bafghi   A Systematic Mapping Study on Intrusion
                                  Alert Analysis in Intrusion Detection
                                  Systems  . . . . . . . . . . . . . . . . 55:1--55:??
      Stylianos I. Venieris and   
          Alexandros Kouris and   
       Christos-Savvas Bouganis   Toolflows for Mapping Convolutional
                                  Neural Networks on FPGAs: a Survey and
                                  Future Directions  . . . . . . . . . . . 56:1--56:??
              Isabel Wagner and   
                  David Eckhoff   Technical Privacy Metrics: a Systematic
                                  Survey . . . . . . . . . . . . . . . . . 57:1--57:??
               Ayman Meidan and   
Julián A. García-García and   
               Isabel Ramos and   
María José Escalona   Measuring Software Process: a Systematic
                                  Mapping Study  . . . . . . . . . . . . . 58:1--58:??
                Jungmin Son and   
                 Rajkumar Buyya   A Taxonomy of Software-Defined
                                  Networking (SDN)-Enabled Cloud Computing 59:1--59:??
          Safiollah Heidari and   
             Yogesh Simmhan and   
       Rodrigo N. Calheiros and   
                 Rajkumar Buyya   Scalable Graph Processing Frameworks: a
                                  Taxonomy and Open Challenges . . . . . . 60:1--60:??
                   Tao Chen and   
               Rami Bahsoon and   
                        Xin Yao   A Survey and Taxonomy of Self-Aware and
                                  Self-Adaptive Cloud Autoscaling Systems  61:1--61:??
                   Yike Liu and   
                Tara Safavi and   
             Abhilash Dighe and   
                   Danai Koutra   Graph Summarization Methods and
                                  Applications: a Survey . . . . . . . . . 62:1--62:??
                 Peter Ivie and   
                  Douglas Thain   Reproducibility in Scientific Computing  63:1--63:??
               Jianzhong Qi and   
                  Rui Zhang and   
        Christian S. Jensen and   
     Kotagiri Ramamohanarao and   
                     Jiayuan He   Continuous Spatial Query Processing: a
                                  Survey of Safe Region Based Techniques   64:1--64:??
     Kalaivani Sundararajan and   
               Damon L. Woodard   Deep Learning for Biometrics: a Survey   65:1--65:??

ACM Computing Surveys
Volume 51, Number 4, September, 2018

           Massimo Quadrana and   
            Paolo Cremonesi and   
                Dietmar Jannach   Sequence-Aware Recommender Systems . . . 66:1--66:??
         Yury Zhauniarovich and   
                Issa Khalil and   
                    Ting Yu and   
                    Marc Dacier   A Survey on Malicious Domains Detection
                                  through DNS Data Analysis  . . . . . . . 67:1--67:??
           Mireia FarrÚs   Voice Disguise in Automatic Speaker
                                  Recognition  . . . . . . . . . . . . . . 68:1--68:??
             Marcus Botacin and   
 Paulo Lício De Geus and   
     André Grégio   Who Watches the Watchmen: a
                                  Security-focused Review on Current
                                  State-of-the-art Techniques, Tools, and
                                  Methods for Systems and Binary Analysis
                                  on Modern Platforms  . . . . . . . . . . 69:1--69:??
                Keman Huang and   
             Michael Siegel and   
                 Stuart Madnick   Systematically Understanding the Cyber
                                  Attack Business: a Survey  . . . . . . . 70:1--70:??
         Zahraa S. Abdallah and   
       Mohamed Medhat Gaber and   
            Bala Srinivasan and   
           Shonali Krishnaswamy   Activity Recognition with Evolving Data
                                  Streams: a Review  . . . . . . . . . . . 71:1--71:??
           Kizheppatt Vipin and   
                Suhaib A. Fahmy   FPGA Dynamic and Partial
                                  Reconfiguration: a Survey of
                                  Architectures, Methods, and Applications 72:1--72:??
                 Chenhao Qu and   
       Rodrigo N. Calheiros and   
                 Rajkumar Buyya   Auto-Scaling Web Applications in Clouds:
                                  a Taxonomy and Survey  . . . . . . . . . 73:1--73:??
                Eugene Siow and   
        Thanassis Tiropanis and   
                     Wendy Hall   Analytics for the Internet of Things: a
                                  Survey . . . . . . . . . . . . . . . . . 74:1--74:??
              Peter Ochieng and   
                   Swaib Kyanda   Large-Scale Ontology Matching:
                                  State-of-the-Art Analysis  . . . . . . . 75:1--75:??
              Jairo Giraldo and   
               David Urbina and   
            Alvaro Cardenas and   
              Junia Valente and   
             Mustafa Faisal and   
               Justin Ruths and   
       Nils Ole Tippenhauer and   
            Henrik Sandberg and   
                Richard Candell   A Survey of Physics-Based Attack
                                  Detection in Cyber-Physical Systems  . . 76:1--76:??
                Edward Toth and   
                  Sanjay Chawla   Group Deviation Detection Methods: a
                                  Survey . . . . . . . . . . . . . . . . . 77:1--77:??
               Lynda Tamine and   
                   Mariam Daoud   Evaluation in Contextual Information
                                  Retrieval: Foundations and Recent
                                  Advances within the Challenges of
                                  Context Dynamicity and Data Privacy  . . 78:1--78:??
                 Abbas Acar and   
               Hidayet Aksu and   
          A. Selcuk Uluagac and   
                    Mauro Conti   A Survey on Homomorphic Encryption
                                  Schemes: Theory and Implementation . . . 79:1--79:??
                   Xiao Han and   
                Nizar Kheir and   
              Davide Balzarotti   Deception Techniques in Computer
                                  Security: a Research Perspective . . . . 80:1--80:??
        Miltiadis Allamanis and   
               Earl T. Barr and   
          Premkumar Devanbu and   
                 Charles Sutton   A Survey of Machine Learning for Big
                                  Code and Naturalness . . . . . . . . . . 81:1--81:??
        Harcharan Jit Singh and   
                     Seema Bawa   Scalable Metadata Management Techniques
                                  for Ultra-Large Distributed Storage
                                  Systems --- A Systematic Review  . . . . 82:1--82:??
             Gowtham Atluri and   
              Anuj Karpatne and   
                    Vipin Kumar   Spatio-Temporal Data Mining: a Survey of
                                  Problems and Methods . . . . . . . . . . 83:1--83:??
               Marcin Wylot and   
          Manfred Hauswirth and   
Philippe Cudré-Mauroux and   
                    Sherif Sakr   RDF Data Storage and Query Processing
                                  Schemes: a Survey  . . . . . . . . . . . 84:1--84:??
              Paula Fortuna and   
            Sérgio Nunes   A Survey on Automatic Detection of Hate
                                  Speech in Text . . . . . . . . . . . . . 85:1--85:??
                Adam Czajka and   
                Kevin W. Bowyer   Presentation Attack Detection for Iris
                                  Recognition: an Assessment of the
                                  State-of-the-Art . . . . . . . . . . . . 86:1--86:??
              Nishant Gupta and   
              Vibhash Yadav and   
                   Mayank Singh   Automated Regression Test Case
                                  Generation for Web Application: a Survey 87:1--87:??

ACM Computing Surveys
Volume 51, Number 5, January, 2019

      Mohammad Naim Rastgoo and   
             Bahareh Nakisa and   
        Andry Rakotonirainy and   
             Vinod Chandran and   
             Dian Tjondronegoro   A Critical Review of Proactive Detection
                                  of Driver Stress Levels Based on
                                  Multimodal Measurements  . . . . . . . . 88:1--88:??
             Changsheng Wan and   
                    Li Wang and   
                   Vir V. Phoha   A Survey on Gait Recognition . . . . . . 89:1--89:??
        Christophe Kiennert and   
                Ziad Ismail and   
                Herve Debar and   
                  Jean Leneutre   A Survey on Game-Theoretic Approaches
                                  for Intrusion Detection and Response
                                  Optimization . . . . . . . . . . . . . . 90:1--90:??
           Alexandra Covaci and   
                Longhao Zou and   
                  Irina Tal and   
       Gabriel-Miro Muntean and   
              Gheorghita Ghinea   Is Multimedia Multisensorial? --- A
                                  Review of Mulsemedia Systems . . . . . . 91:1--91:??
           Samira Pouyanfar and   
                 Saad Sadiq and   
                  Yilin Yan and   
                Haiman Tian and   
                 Yudong Tao and   
          Maria Presa Reyes and   
              Mei-Ling Shyu and   
             Shu-Ching Chen and   
                  S. S. Iyengar   A Survey on Deep Learning: Algorithms,
                                  Techniques, and Applications . . . . . . 92:1--92:??
          Riccardo Guidotti and   
              Anna Monreale and   
         Salvatore Ruggieri and   
              Franco Turini and   
            Fosca Giannotti and   
                 Dino Pedreschi   A Survey of Methods for Explaining Black
                                  Box Models . . . . . . . . . . . . . . . 93:1--93:??
              Gildas Avoine and   
   Muhammed Ali Bingöl and   
             Ioana Boureanu and   
              Srdjan Capkun and   
             Gerhard Hancke and   
       Süleyman Kardas and   
              Chong Hee Kim and   
    Cédric Lauradoux and   
            Benjamin Martin and   
              Jorge Munilla and   
            Alberto Peinado and   
     Kasper Bonne Rasmussen and   
       Dave Singelée and   
          Aslan Tchamkerten and   
     Rolando Trujillo-Rasua and   
                 Serge Vaudenay   Security of Distance-Bounding: a Survey  94:1--94:??
              Rui Henriques and   
                Sara C. Madeira   Triclustering Algorithms for
                                  Three-Dimensional Data Analysis: a
                                  Comprehensive Survey . . . . . . . . . . 95:1--95:??
            Amir H. Ashouri and   
            William Killian and   
               John Cavazos and   
           Gianluca Palermo and   
               Cristina Silvano   A Survey on Compiler Autotuning using
                                  Machine Learning . . . . . . . . . . . . 96:1--96:??
               Dileep Kumar and   
            Akash Gandhamal and   
              Sanjay Talbar and   
         Ahmad Fadzil Mohd Hani   Knee Articular Cartilage Segmentation
                                  from MR Images: a Review . . . . . . . . 97:1--97:??
                   Ming Liu and   
                    Zhi Xue and   
                Xianghua Xu and   
             Changmin Zhong and   
                    Jinjun Chen   Host-Based Intrusion Detection System
                                  with System Calls: Review and Future
                                  Trends . . . . . . . . . . . . . . . . . 98:1--98:??
              Kevin Doherty and   
                  Gavin Doherty   Engagement in HCI: Conception, Theory
                                  and Measurement  . . . . . . . . . . . . 99:1--99:??
         Giannis Tziakouris and   
               Rami Bahsoon and   
             Muhammad Ali Babar   A Survey on Self-Adaptive Security for
                                  Large-scale Open Environments  . . . . . 100:1--100:??
    Diego De Siqueira Braga and   
              Marco Niemann and   
          Bernd Hellingrath and   
  Fernando Buarque De Lima Neto   Survey on Computational Trust and
                                  Reputation Models  . . . . . . . . . . . 101:1--101:??
              Felipe Grando and   
      Lisandro Z. Granville and   
                   Luis C. Lamb   Machine Learning in Network Centrality
                                  Measures: Tutorial and Outlook . . . . . 102:1--102:??
              Vaia Moustaka and   
              Athena Vakali and   
        Leonidas G. Anthopoulos   A Systematic Review for Smart City Data
                                  Analytics  . . . . . . . . . . . . . . . 103:1--103:??
         Sukhpal Singh Gill and   
                 Rajkumar Buyya   A Taxonomy and Future Directions for
                                  Sustainable Cloud Computing: 360 Degree
                                  View . . . . . . . . . . . . . . . . . . 104:1--104:??
             Rajkumar Buyya and   
    Satish Narayana Srirama and   
            Giuliano Casale and   
          Rodrigo Calheiros and   
             Yogesh Simmhan and   
           Blesson Varghese and   
               Erol Gelenbe and   
              Bahman Javadi and   
        Luis Miguel Vaquero and   
          Marco A. S. Netto and   
        Adel Nadjaran Toosi and   
  Maria Alejandra Rodriguez and   
        Ignacio M. Llorente and   
Sabrina De Capitani Di Vimercati and   
        Pierangela Samarati and   
            Dejan Milojicic and   
              Carlos Varela and   
               Rami Bahsoon and   
Marcos Dias De Assunção and   
                  Omer Rana and   
                Wanlei Zhou and   
                    Hai Jin and   
          Wolfgang Gentzsch and   
           Albert Y. Zomaya and   
                   Haiying Shen   A Manifesto for Future Generation Cloud
                                  Computing: Research Directions for the
                                  Next Decade  . . . . . . . . . . . . . . 105:1--105:??
             Alisa Smirnova and   
  Philippe Cudré-Mauroux   Relation Extraction Using Distant
                                  Supervision: a Survey  . . . . . . . . . 106:1--106:??
             M. Ziad Nayyer and   
                 Imran Raza and   
              Syed Asad Hussain   A Survey of Cloudlet-Based Mobile
                                  Augmentation Approaches for Resource
                                  Optimization . . . . . . . . . . . . . . 107:1--107:??
Andreas Biòrn-Hansen and   
   Tor-Morten Grònli and   
              Gheorghita Ghinea   A Survey and Taxonomy of Core Concepts
                                  and Research Challenges in
                                  Cross-Platform Mobile Development  . . . 108:1--108:??
          Yasir Imtiaz Khan and   
          Alexandros Konios and   
                 Nicolas Guelfi   A Survey of Petri Nets Slicing . . . . . 109:1--109:??

ACM Computing Surveys
Volume 51, Number 6, February, 2019

                  Ping Wang and   
                     Yan Li and   
               Chandan K. Reddy   Machine Learning for Survival Analysis:
                                  a Survey . . . . . . . . . . . . . . . . 110:1--110:??
            Ana Juan Ferrer and   
      Joan Manuel Marqu\`es and   
                    Josep Jorba   Towards the Decentralised Cloud: Survey
                                  on Approaches and Challenges for Mobile,
                                  Ad hoc, and Edge Computing . . . . . . . 111:1--111:??
                  Qiong Gui and   
      Maria V. Ruiz-Blondet and   
               Sarah Laszlo and   
                   Zhanpeng Jin   A Survey on Brain Biometrics . . . . . . 112:1--112:??
         Brett W. Israelsen and   
                 Nisar R. Ahmed   ``Dave \ldots I can assure you \ldots
                                  that it's going to be all right \ldots''
                                  A Definition, Case for, and Survey of
                                  Algorithmic Assurances in
                                  Human--Autonomy Trust Relationships  . . 113:1--113:??
           Michel S. Bonfim and   
             Kelvin L. Dias and   
         Stenio F. L. Fernandes   Integrated NFV/SDN Architectures: a
                                  Systematic Literature Review . . . . . . 114:1--114:??
             Janibul Bashir and   
              Eldhose Peter and   
              Smruti R. Sarangi   A Survey of On-Chip Optical
                                  Interconnects  . . . . . . . . . . . . . 115:1--115:??
       Jasenka Dizdarevi\'c and   
           Francisco Carpio and   
               Admela Jukan and   
               Xavi Masip-Bruin   A Survey of Communication Protocols for
                                  Internet of Things and Related
                                  Challenges of Fog and Cloud Computing
                                  Integration  . . . . . . . . . . . . . . 116:1--116:??
                Moises Diaz and   
           Miguel A. Ferrer and   
            Donato Impedovo and   
       Muhammad Imran Malik and   
             Giuseppe Pirlo and   
        Réjean Plamondon   A Perspective Analysis of Handwritten
                                  Signature Technology . . . . . . . . . . 117:1--117:??
          MD. Zakir Hossain and   
              Ferdous Sohel and   
    Mohd Fairuz Shiratuddin and   
                     Hamid Laga   A Comprehensive Survey of Deep Learning
                                  for Image Captioning . . . . . . . . . . 118:1--118:??
       Abdessalam Elhabbash and   
              Faiza Samreen and   
               James Hadley and   
                 Yehia Elkhatib   Cloud Brokerage: a Systematic Survey . . 119:1--119:??
                Pawan Kumar and   
                   Rakesh Kumar   Issues and Challenges of Load Balancing
                                  Techniques in Cloud Computing: a Survey  120:1--120:??
            Amani Abu Jabal and   
              Maryam Davari and   
              Elisa Bertino and   
           Christian Makaya and   
              Seraphin Calo and   
               Dinesh Verma and   
           Alessandra Russo and   
           Christopher Williams   Methods and Tools for Policy Analysis    121:1--121:??
              Abdul Manazir and   
                    Khalid Raza   Recent Developments in Cartesian Genetic
                                  Programming and its Variants . . . . . . 122:1--122:??
                  Shirin Tavara   Parallel Computing of Support Vector
                                  Machines: a Survey . . . . . . . . . . . 123:1--123:??
          Rafael Luiz Testa and   
Cléber Gimenez Corrêa and   
        Ariane Machado-Lima and   
      Fátima L. S. Nunes   Synthesis of Facial Expressions in
                                  Photographs: Characteristics,
                                  Approaches, and Challenges . . . . . . . 124:1--124:??
           Marco Patrignani and   
                 Amal Ahmed and   
                    Dave Clarke   Formal Approaches to Secure Compilation:
                                  a Survey of Fully Abstract Compilation
                                  and Related Work . . . . . . . . . . . . 125:1--125:??
       Juan A. Rico-Gallego and   
Juan C. Díaz-Martín and   
       Ravi Reddy Manumachu and   
          Alexey L. Lastovetsky   A Survey of Communication Performance
                                  Models for High-Performance Computing    126:1--126:??
               Niklas Kolbe and   
             Sylvain Kubler and   
Jérémy Robert and   
              Yves Le Traon and   
               Arkady Zaslavsky   Linked Vocabulary Recommendation Tools
                                  for Internet of Things: a Survey . . . . 127:1--127:??
                Jin-Hee Cho and   
                Shouhuai Xu and   
          Patrick M. Hurley and   
             Matthew Mackay and   
            Trevor Benjamin and   
                  Mark Beaumont   STRAM: Measuring the Trustworthiness of
                                  Computer-Based Systems . . . . . . . . . 128:1--128:??
          Hamid Nejatollahi and   
                 Nikil Dutt and   
                 Sandip Ray and   
        Francesco Regazzoni and   
          Indranil Banerjee and   
              Rosario Cammarota   Post-Quantum Lattice-Based Cryptography
                                  Implementations: a Survey  . . . . . . . 129:1--129:??
               Sandro Pinto and   
                    Nuno Santos   Demystifying Arm TrustZone: a
                                  Comprehensive Survey . . . . . . . . . . 130:1--130:??
               Jiajian Xiao and   
        Philipp Andelfinger and   
              David Eckhoff and   
                Wentong Cai and   
                    Alois Knoll   A Survey on Agent-based Simulation Using
                                  Hardware Accelerators  . . . . . . . . . 131:1--131:??


ACM Computing Surveys
Volume 52, Number 1, February, 2019

                Sulav Malla and   
                Ken Christensen   A Survey on Power Management Techniques
                                  for Oversubscription of Multi-Tenant
                                  Data Centers . . . . . . . . . . . . . . 1:1--1:??
                Jianyu Wang and   
                 Jianli Pan and   
            Flavio Esposito and   
              Prasad Calyam and   
              Zhicheng Yang and   
              Prasant Mohapatra   Edge Cloud Offloading Algorithms:
                                  Issues, Methods, and Perspectives  . . . 2:1--2:??
         Vaibhavi Kalgutkar and   
              Ratinder Kaur and   
              Hugo Gonzalez and   
         Natalia Stakhanova and   
               Alina Matyukhina   Code Authorship Attribution: Methods and
                                  Challenges . . . . . . . . . . . . . . . 3:1--3:??
              Walter Didimo and   
            Giuseppe Liotta and   
          Fabrizio Montecchiani   A Survey on Graph Drawing Beyond
                                  Planarity  . . . . . . . . . . . . . . . 4:1--4:??
                Shuai Zhang and   
                   Lina Yao and   
                  Aixin Sun and   
                         Yi Tay   Deep Learning Based Recommender System:
                                  a Survey and New Perspectives  . . . . . 5:1--5:??
Matheus R. F. MendonÇa and   
              Artur Ziviani and   
     AndrÉ M. S. Barreto   Graph-Based Skill Acquisition For
                                  Reinforcement Learning . . . . . . . . . 6:1--6:??
                 Jing Zhang and   
                 Wanqing Li and   
            Philip Ogunbona and   
                        Dong Xu   Recent Advances in Transfer Learning for
                                  Cross-Dataset Visual Recognition: a
                                  Problem-Oriented Perspective . . . . . . 7:1--7:??
                 Minxian Xu and   
                 Rajkumar Buyya   Brownout Approach for Adaptive
                                  Management of Resources and Applications
                                  in Cloud Computing Systems: a Taxonomy
                                  and Future Directions  . . . . . . . . . 8:1--8:??
                  Ping Xiao and   
             Hannu Toivonen and   
                Oskar Gross and   
     Amílcar Cardoso and   
        João Correia and   
           Penousal Machado and   
              Pedro Martins and   
      Hugo Goncalo Oliveira and   
               Rahul Sharma and   
     Alexandre Miguel Pinto and   
        Alberto Díaz and   
         Virginia Francisco and   
        Pablo Gervás and   
       Raquel Hervás and   
         Carlos León and   
                Jamie Forth and   
             Matthew Purver and   
         Geraint A. Wiggins and   
        Dragana Miljkovi\'c and   
               Vid Podpecan and   
               Senja Pollak and   
                  Jan Kralj and   
           Martin Znidarsic and   
              Marko Bohanec and   
                Nada Lavrac and   
             Tanja Urbancic and   
        Frank Van Der Velde and   
               Stuart Battersby   Conceptual Representations for
                                  Computational Concept Creation . . . . . 9:1--9:??
               Yongjun Hong and   
                Uiwon Hwang and   
                Jaeyoon Yoo and   
                   Sungroh Yoon   How Generative Adversarial Networks and
                                  Their Variants Work: an Overview . . . . 10:1--10:??
         Azzedine Boukerche and   
               Shichao Guan and   
            Robson E. De Grande   Sustainable Offloading in Mobile Cloud
                                  Computing: Algorithmic Design and
                                  Implementation . . . . . . . . . . . . . 11:1--11:??
             Rajendra Patil and   
                    Chirag Modi   An Exhaustive Survey on Security
                                  Concerns and Solutions at Different
                                  Components of Virtualization . . . . . . 12:1--12:??
                 Junyu Xuan and   
                     Jie Lu and   
                Guangquan Zhang   A Survey on Bayesian Nonparametric
                                  Learning . . . . . . . . . . . . . . . . 13:1--13:??
       Francisco J. Cazorla and   
          Leonidas Kosmidis and   
            Enrico Mezzetti and   
           Carles Hernandez and   
               Jaume Abella and   
               Tullio Vardanega   Probabilistic Worst-Case Timing
                                  Analysis: Taxonomy and Comprehensive
                                  Survey . . . . . . . . . . . . . . . . . 14:1--14:??
           Karam Abdulahhad and   
           Catherine Berrut and   
      Jean-Pierre Chevallet and   
                 Gabriella Pasi   Modeling Information Retrieval by Formal
                                  Logic: a Survey  . . . . . . . . . . . . 15:1--15:??
             Graham Cormode and   
                Hossein Jowhari   $ L_p $ Samplers and Their Applications:
                                  a Survey . . . . . . . . . . . . . . . . 16:1--16:??
            Thiago H. Silva and   
       Aline Carneiro Viana and   
 Fabrício Benevenuto and   
             Leandro Villas and   
             Juliana Salles and   
           Antonio Loureiro and   
                Daniele Quercia   Urban Computing Leveraging
                                  Location-Based Social Network Data: a
                                  Survey . . . . . . . . . . . . . . . . . 17:1--17:??
        Federico Reghenzani and   
           Giuseppe Massari and   
             William Fornaciari   The Real-Time Linux Kernel: a Survey on
                                  PREEMPT\_RT  . . . . . . . . . . . . . . 18:1--18:??
                Usama Ahmed and   
                 Imran Raza and   
              Syed Asad Hussain   Trust Evaluation in Cross-Cloud
                                  Federation: Survey and Requirement
                                  Analysis . . . . . . . . . . . . . . . . 19:1--19:??
          Annushree Bablani and   
         Damodar Reddy Edla and   
           Diwakar Tripathi and   
         Ramalingaswamy Cheruku   Survey on Brain-Computer Interface: an
                                  Emerging Computational Intelligence
                                  Paradigm . . . . . . . . . . . . . . . . 20:1--20:??
               Parnika Bhat and   
                  Kamlesh Dutta   A Survey on Various Threats and Current
                                  State of Security in Android Platform    21:1--21:??
                Ranran Bian and   
               Yun Sing Koh and   
             Gillian Dobbie and   
                    Anna Divoli   Identifying Top-$k$ Nodes in Social
                                  Networks: a Survey . . . . . . . . . . . 22:1--22:??

ACM Computing Surveys
Volume 52, Number 2, May, 2019

Sai Manoj Pudukotai Dinakarrao and   
               Axel Jantsch and   
              Muhammad Shafique   Computer-aided Arrhythmia Diagnosis with
                                  Bio-signal Processing: a Survey of
                                  Trends and Techniques  . . . . . . . . . 23:1--23:??
            Djamel Djenouri and   
             Roufaida Laidi and   
            Youcef Djenouri and   
            Ilangko Balasingham   Machine Learning for Smart Building
                                  Applications: Review and Taxonomy  . . . 24:1--24:??
   Mihai Gabriel Constantin and   
                Miriam Redi and   
                 Gloria Zen and   
                 Bogdan Ionescu   Computational Understanding of Visual
                                  Interestingness Beyond Semantics:
                                  Literature Survey and Analysis of
                                  Covariates . . . . . . . . . . . . . . . 25:1--25:??
                  Miqing Li and   
                        Xin Yao   Quality Evaluation of Solution Sets in
                                  Multiobjective Optimisation: a Survey    26:1--26:??
                    Isil Oz and   
                   Sanem Arslan   A Survey on Multithreading Alternatives
                                  for Soft Error Fault Tolerance . . . . . 27:1--27:??
               Rochak Swami and   
                Mayank Dave and   
                 Virender Ranga   Software-defined Networking-based DDoS
                                  Defense Mechanisms . . . . . . . . . . . 28:1--28:??
                  Yara Rizk and   
              Mariette Awad and   
              Edward W. Tunstel   Cooperative Heterogeneous Multi-Robot
                                  Systems: a Survey  . . . . . . . . . . . 29:1--29:??
              Ivan Homoliak and   
           Flavio Toffalini and   
              Juan Guarnizo and   
              Yuval Elovici and   
            Martín Ochoa   Insight Into Insiders and IT: a Survey
                                  of Insider Threat Taxonomies, Analysis,
                                  Modeling, and Countermeasures  . . . . . 30:1--30:??
              Thiago Rateke and   
            Karla A. Justen and   
          Vito F. Chiarella and   
     Antonio C. Sobieranski and   
             Eros Comunello and   
            Aldo Von Wangenheim   Passive Vision Region-Based Road
                                  Detection: a Literature Review . . . . . 31:1--31:??
                   Wei Wang and   
                   Longbing Cao   Negative Sequence Analysis: a Review . . 32:1--32:??
             Athira Nambiar and   
       Alexandre Bernardino and   
          Jacinto C. Nascimento   Gait-based Person Re-identification: a
                                  Survey . . . . . . . . . . . . . . . . . 33:1--33:??
         Azzedine Boukerche and   
                       Qi Zhang   Countermeasures against Worm Spreading:
                                  a New Challenge for Vehicular Networks   34:1--34:??
              Milad Afzalan and   
              Farrokh Jazizadeh   Indoor Positioning Based on Visible
                                  Light Communication: a Performance-based
                                  Survey of Real-world Prototypes  . . . . 35:1--35:??
       Henriette Röger and   
                    Ruben Mayer   A Comprehensive Survey on
                                  Parallelization and Elasticity in Stream
                                  Processing . . . . . . . . . . . . . . . 36:1--36:??
               Chadni Islam and   
         Muhammad Ali Babar and   
                    Surya Nepal   A Multi-Vocal Review of Security
                                  Orchestration  . . . . . . . . . . . . . 37:1--37:??
                 Ayman Taha and   
                    Ali S. Hadi   Anomaly Detection Methods for
                                  Categorical Data: a Review . . . . . . . 38:1--38:??
        Aditya Sundararajan and   
             Arif I. Sarwat and   
                 Alexander Pons   A Survey on Modality Characteristics,
                                  Performance Evaluation Metrics, and
                                  Security for Traditional and Wearable
                                  Biometric Systems  . . . . . . . . . . . 39:1--39:??
                 Erwei Wang and   
             James J. Davis and   
                Ruizhe Zhao and   
               Ho-Cheung Ng and   
                  Xinyu Niu and   
                  Wayne Luk and   
         Peter Y. K. Cheung and   
       George A. Constantinides   Deep Neural Network Approximation for
                                  Custom Hardware: Where We've Been, Where
                                  We're Going  . . . . . . . . . . . . . . 40:1--40:??
            Hadi Habibzadeh and   
                 Cem Kaptan and   
               Tolga Soyata and   
             Burak Kantarci and   
             Azzedine Boukerche   Smart City System Design: a
                                  Comprehensive Study of the Application
                                  and Data Planes  . . . . . . . . . . . . 41:1--41:??
            Hameedah Sultan and   
             Anjali Chauhan and   
              Smruti R. Sarangi   A Survey of Chip-level Thermal
                                  Simulators . . . . . . . . . . . . . . . 42:1--42:??
             Mustansar Fiaz and   
               Arif Mahmood and   
                Sajid Javed and   
                   Soon Ki Jung   Handcrafted and Deep Trackers: Recent
                                  Visual Object Tracking Approaches and
                                  Trends . . . . . . . . . . . . . . . . . 43:1--43:??

ACM Computing Surveys
Volume 52, Number 3, July, 2019

               Elisa Mannes and   
                 Carlos Maziero   Naming Content on the Network Layer: a
                                  Security Analysis of the
                                  Information-Centric Network Model  . . . 44:1--44:??
        Tommi Gröndahl and   
                      N. Asokan   Text Analysis in Adversarial Settings:
                                  Does Deception Leave a Stylistic Trace?  45:1--45:??
                 Yongsen Ma and   
                  Gang Zhou and   
                Shuangquan Wang   WiFi Sensing with Channel State
                                  Information: a Survey  . . . . . . . . . 46:1--46:??
João Felipe Pimentel and   
             Juliana Freire and   
             Leonardo Murta and   
             Vanessa Braganholo   A Survey on Collecting, Managing, and
                                  Analyzing Provenance from Scripts  . . . 47:1--47:??
Lucian José Gonçales and   
            Kleinner Farias and   
Toacy Cavalcante De Oliveira and   
                  Murilo Scholl   Comparison of Software Design Models: an
                                  Extended Systematic Mapping Study  . . . 48:1--48:??
             Matthias Wenzl and   
           Georg Merzdovnik and   
            Johanna Ullrich and   
                   Edgar Weippl   From Hack to Elaborate Technique --- a
                                  Survey on Binary Rewriting . . . . . . . 49:1--49:37
          Katerina El Raheb and   
            Marina Stergiou and   
            Akrivi Katifori and   
               Yannis Ioannidis   Dance Interactive Learning Systems: a
                                  Study on Interaction Workflow and
                                  Teaching Approaches  . . . . . . . . . . 50:1--50:??
                  Rui Zhang and   
                    Rui Xue and   
                       Ling Liu   Security and Privacy on Blockchain . . . 51:1--51:??
     Mohammad Bakhshalipour and   
     Seyedali Tabaeiaghdaei and   
        Pejman Lotfi-Kamran and   
             Hamid Sarbazi-Azad   Evaluation of Hardware Data Prefetchers
                                  on Server Processors . . . . . . . . . . 52:1--52:??
    Lorena Gonzalez-Manzano and   
         Jose M. De Fuentes and   
               Arturo Ribagorda   Leveraging User-related Internet of
                                  Things for Continuous Authentication: a
                                  Survey . . . . . . . . . . . . . . . . . 53:1--53:??
             Muhammad Usman and   
             Mian Ahmad Jan and   
               Xiangjian He and   
                    Jinjun Chen   A Survey on Big Multimedia Data
                                  Processing and Management in Smart
                                  Cities . . . . . . . . . . . . . . . . . 54:1--54:??
                 Jiaheng Lu and   
          Irena Holubová   Multi-model Databases: a New Journey to
                                  Handle the Variety of Data . . . . . . . 55:1--55:??
               Claire Maiza and   
               Hamza Rihani and   
              Juan M. Rivas and   
         Joël Goossens and   
         Sebastian Altmeyer and   
                Robert I. Davis   A Survey of Timing Verification
                                  Techniques for Multi-Core Real-Time
                                  Systems  . . . . . . . . . . . . . . . . 56:1--56:??
                   Hu Xiong and   
                     Yan Wu and   
                      Zhenyu Lu   A Survey of Group Key Agreement
                                  Protocols with Constant Rounds . . . . . 57:1--57:??
Estêvão B. Saleme and   
           Alexandra Covaci and   
         Gebremariam Mesfin and   
         Celso A. S. Santos and   
              Gheorghita Ghinea   Mulsemedia DIY: a Survey of Devices and
                                  a Tutorial for Building Your Own
                                  Mulsemedia Environment . . . . . . . . . 58:1--58:??
        Tessema M. Mengistu and   
                     Dunren Che   Survey and Taxonomy of Volunteer
                                  Computing  . . . . . . . . . . . . . . . 59:1--59:??
             Samia Oukemeni and   
         Helena Rif\`a-Pous and   
     Joan Manuel Marqu\`es Puig   Privacy Analysis on Microblogging Online
                                  Social Networks: a Survey  . . . . . . . 60:1--60:??
             Stephan Winter and   
               Martin Tomko and   
            Maria Vasardani and   
        Kai-Florian Richter and   
         Kourosh Khoshelham and   
               Mohsen Kalantari   Infrastructure-Independent Indoor
                                  Localization and Navigation  . . . . . . 61:1--61:??
Roberto Castañeda Lozano and   
              Christian Schulte   Survey on Combinatorial Register
                                  Allocation and Instruction Scheduling    62:1--62:??
             S. Chandrakala and   
              S. L. Jayalakshmi   Environmental Audio Scene and Sound
                                  Event Recognition for Autonomous
                                  Surveillance: a Survey and Comparative
                                  Studies  . . . . . . . . . . . . . . . . 63:1--63:??
                 Fuqiang Gu and   
                    Xuke Hu and   
             Milad Ramezani and   
          Debaditya Acharya and   
         Kourosh Khoshelham and   
            Shahrokh Valaee and   
                   Jianga Shang   Indoor Localization Improved by Spatial
                                  Context --- a Survey . . . . . . . . . . 64:1--64:??

ACM Computing Surveys
Volume 52, Number 4, September, 2019

                Tal Ben-Nun and   
                Torsten Hoefler   Demystifying Parallel and Distributed
                                  Deep Learning: an In-depth Concurrency
                                  Analysis . . . . . . . . . . . . . . . . 65:1--65:??
              Xiaofeng Liao and   
                   Zhiming Zhao   Unsupervised Approaches for Textual
                                  Semantic Annotation, A Survey  . . . . . 66:1--66:??
             Parminder Kaur and   
       Husanbir Singh Pannu and   
              Avleen Kaur Malhi   Comprehensive Study of Continuous
                                  Orthogonal Moments --- a Systematic
                                  Review . . . . . . . . . . . . . . . . . 67:1--67:??
            Mainak Adhikari and   
           Tarachand Amgoth and   
        Satish Narayana Srirama   A Survey on Scheduling Strategies for
                                  Workflows in Cloud Environment and
                                  Emerging Trends  . . . . . . . . . . . . 68:1--68:??
           Rob Van Glabbeek and   
              Peter Höfner   Progress, Justness, and Fairness . . . . 69:1--69:??
           Melinda McDaniel and   
                 Veda C. Storey   Evaluating Domain Ontologies:
                                  Clarification, Classification, and
                                  Challenges . . . . . . . . . . . . . . . 70:1--70:??
             Ching-Ling Fan and   
                Wen-Chih Lo and   
                Yu-Tung Pai and   
                 Cheng-Hsin Hsu   A Survey on $ 360^\circ $ Video
                                  Streaming: Acquisition, Transmission,
                                  and Display  . . . . . . . . . . . . . . 71:1--71:??
           Madalena Ribeiro and   
               Abel J. P. Gomes   Recoloring Algorithms for Colorblind
                                  People: a Survey . . . . . . . . . . . . 72:1--72:??
            Swarnendu Ghosh and   
                Nibaran Das and   
                 Ishita Das and   
                  Ujjwal Maulik   Understanding Deep Learning Techniques
                                  for Image Segmentation . . . . . . . . . 73:1--73:??
            Z. Berkay Celik and   
         Earlence Fernandes and   
                Eric Pauley and   
                   Gang Tan and   
               Patrick McDaniel   Program Analysis of Commodity IoT
                                  Applications for Security and Privacy:
                                  Challenges and Opportunities . . . . . . 74:1--74:??
            Wojciech Wide\l and   
             Maxime Audinot and   
               Barbara Fila and   
               Sophie Pinchinat   Beyond 2014: Formal Methods for Attack
                                  Tree-based Security Modeling . . . . . . 75:1--75:??
              Saeed Rashidi and   
               Majid Jalili and   
             Hamid Sarbazi-Azad   A Survey on PCM Lifetime Enhancement
                                  Schemes  . . . . . . . . . . . . . . . . 76:1--76:??
      Joanna Bergström and   
           Kasper Hornbæk   Human--Computer Interaction on the Skin  77:1--77:??
             Davide Maiorca and   
            Battista Biggio and   
               Giorgio Giacinto   Towards Adversarial Malware Detection:
                                  Lessons Learned from PDF-based Attacks   78:1--78:??
           Harsurinder Kaur and   
       Husanbir Singh Pannu and   
              Avleen Kaur Malhi   A Systematic Review on Imbalanced Data
                                  Challenges in Machine Learning:
                                  Applications and Solutions . . . . . . . 79:1--79:??
    Patricia Arias-Cabarcos and   
        Christian Krupitzer and   
               Christian Becker   A Survey on Adaptive Authentication  . . 80:1--80:??
          Stefanos Georgiou and   
             Stamatia Rizou and   
             Diomidis Spinellis   Software Development Lifecycle for
                                  Energy Efficiency: Techniques and Tools  81:1--81:??
            Jeffrey Pawlick and   
             Edward Colbert and   
                    Quanyan Zhu   A Game-theoretic Taxonomy and Survey of
                                  Defensive Deception for Cybersecurity
                                  and Privacy  . . . . . . . . . . . . . . 82:1--82:??
               Sam Fletcher and   
              Md. Zahidul Islam   Decision Tree Classification with
                                  Differential Privacy: a Survey . . . . . 83:1--83:??
     Sara Kardani Moghaddam and   
             Rajkumar Buyya and   
         Kotagiri Ramamohanarao   Performance-Aware Management of Cloud
                                  Resources: a Taxonomy and Future
                                  Directions . . . . . . . . . . . . . . . 84:1--84:??
                Alistair Moffat   Huffman Coding . . . . . . . . . . . . . 85:1--85:35
           Maria De Marsico and   
                  Alessio Mecca   A Survey on Gait Recognition via
                                  Wearable Sensors . . . . . . . . . . . . 86:1--86:??

ACM Computing Surveys
Volume 52, Number 5, October, 2019

           Mashael Almoqbel and   
                     Songhua Xu   Computational Mining of Social Media to
                                  Curb Terrorism . . . . . . . . . . . . . 87:1--87:??
                Ori Or-Meir and   
                 Nir Nissim and   
              Yuval Elovici and   
                    Lior Rokach   Dynamic Malware Analysis in the Modern
                                  Era --- a State of the Art Survey  . . . 88:1--88:??
            Vincent Labatut and   
                    Xavier Bost   Extraction and Analysis of Fictional
                                  Character Networks: a Survey . . . . . . 89:1--89:??
              Zeineb Rejiba and   
         Xavier Masip-Bruin and   
       Eva Marín-Tordera   A Survey on Mobility-Induced Service
                                  Migration in the Fog, Edge, and Related
                                  Computing Paradigms  . . . . . . . . . . 90:1--90:??
                Farha Jahan and   
                Weiqing Sun and   
               Quamar Niyaz and   
                   Mansoor Alam   Security Modeling of Autonomous Systems:
                                  a Survey . . . . . . . . . . . . . . . . 91:1--91:??
                Weiqing Min and   
             Shuqiang Jiang and   
                  Linhu Liu and   
                   Yong Rui and   
                    Ramesh Jain   A Survey on Food Computing . . . . . . . 92:1--92:??
          Antonia Bertolino and   
       Guglielmo De Angelis and   
             Micael Gallego and   
         Boni García and   
  Francisco Gortázar and   
          Francesca Lonetti and   
                  Eda Marchetti   A Systematic Review on Cloud Testing . . 93:1--93:??
               Thang Le Duc and   
 Rafael García Leiva and   
               Paolo Casari and   
          Per-Olov Östberg   Machine Learning Methods for Reliable
                                  Resource Provisioning in Edge-Cloud
                                  Computing: a Survey  . . . . . . . . . . 94:1--94:??
               Mutaz Barika and   
               Saurabh Garg and   
           Albert Y. Zomaya and   
                 Lizhe Wang and   
            Aad Van Moorsel and   
                   Rajiv Ranjan   Orchestrating Big Data Analysis
                                  Workflows in the Cloud: Research
                                  Challenges, Survey, and Future
                                  Directions . . . . . . . . . . . . . . . 95:1--95:??
   Rodrigo Gonçalves and   
      Carina Friedrich Dorneles   Automated Expertise Retrieval: a
                                  Taxonomy-Based Survey and Open Issues    96:1--96:??
              Cheol-Ho Hong and   
               Blesson Varghese   Resource Management in Fog/Edge
                                  Computing: a Survey on Architectures,
                                  Infrastructure, and Algorithms . . . . . 97:1--97:??
               Ka-Chun Wong and   
                 Jiao Zhang and   
                Shankai Yan and   
                Xiangtao Li and   
                Qiuzhen Lin and   
                  Sam Kwong and   
                    Cheng Liang   DNA Sequencing Technologies: Sequencing
                                  Data Protocols and Bioinformatics Tools  98:1--98:??
              Hong-Ning Dai and   
      Raymond Chi-Wing Wong and   
                   Hao Wang and   
                Zibin Zheng and   
        Athanasios V. Vasilakos   Big Data Analytics for Large-scale
                                  Wireless Networks: Challenges and
                                  Opportunities  . . . . . . . . . . . . . 99:1--99:??
              Matt Luckcuck and   
              Marie Farrell and   
           Louise A. Dennis and   
                Clare Dixon and   
                 Michael Fisher   Formal Specification and Verification of
                                  Autonomous Robotic Systems: a Survey . . 100:1--100:??
              Mike Maksimov and   
               Sahar Kokaly and   
                 Marsha Chechik   A Survey of Tool-supported Assurance
                                  Case Assessment Techniques . . . . . . . 101:1--101:??
      Paulo Henrique Pisani and   
                Abir Mhenni and   
                Romain Giot and   
           Estelle Cherrier and   
                 Norman Poh and   
André Carlos Ponce de Leon Ferreira de Carvalho and   
     Christophe Rosenberger and   
      Najoua Essoukri Ben Amara   Adaptive Biometric Systems: Review and
                                  Perspectives . . . . . . . . . . . . . . 102:1--102:??
    Michalis Mountantonakis and   
               Yannis Tzitzikas   Large-scale Semantic Integration of
                                  Linked Data: a Survey  . . . . . . . . . 103:1--103:??
        Hrishav Bakul Barua and   
         Kartick Chandra Mondal   A Comprehensive Survey on Cloud Data
                                  Mining (CDM) Frameworks and Algorithms   104:1--104:??
           Ioannis Mademlis and   
           Nikos Nikolaidis and   
           Anastasios Tefas and   
              Ioannis Pitas and   
              Tilman Wagner and   
                Alberto Messina   Autonomous UAV Cinematography: a
                                  Tutorial and a Formalized Shot-Type
                                  Taxonomy . . . . . . . . . . . . . . . . 105:1--105:??
             Vivekraj V. K. and   
               Debashis Sen and   
          Balasubramanian Raman   Video Skimming: Taxonomy and
                                  Comprehensive Survey . . . . . . . . . . 106:1--106:??
              Ana C. Lorena and   
   Luís P. F. Garcia and   
               Jens Lehmann and   
       Marcilio C. P. Souto and   
                     Tin Kam Ho   How Complex Is Your Classification
                                  Problem?: a Survey on Measuring
                                  Classification Complexity  . . . . . . . 107:1--107:??

ACM Computing Surveys
Volume 52, Number 6, January, 2020

                  Caesar Wu and   
             Rajkumar Buyya and   
         Kotagiri Ramamohanarao   Cloud Pricing Models: Taxonomy, Survey,
                                  and Interdisciplinary Challenges . . . . 108:1--108:??
      Galal M. Binmakhashen and   
               Sabri A. Mahmoud   Document Layout Analysis: a
                                  Comprehensive Survey . . . . . . . . . . 109:1--109:??
        Jaybie A. De Guzman and   
     Kanchana Thilakarathna and   
              Aruna Seneviratne   Security and Privacy Approaches in Mixed
                                  Reality: a Literature Survey . . . . . . 110:1--110:??
             Muhammad Usman and   
             Mian Ahmad Jan and   
               Xiangjian He and   
                    Jinjun Chen   A Survey on Representation Learning
                                  Efforts in Cybersecurity Domain  . . . . 111:1--111:??
Tomás Foltýnek and   
            Norman Meuschke and   
                      Bela Gipp   Academic Plagiarism Detection: a
                                  Systematic Literature Review . . . . . . 112:1--112:??
               Yannis Lilis and   
                Anthony Savidis   A Survey of Metaprogramming Languages    113:1--113:??
             Anh Cat Le Ngo and   
        Raphaël C.-W. Phan   Seeing the Invisible: Survey of Video
                                  Motion Magnification and Small Motion
                                  Analysis . . . . . . . . . . . . . . . . 114:1--114:??
               Nayyer Aafaq and   
                 Ajmal Mian and   
                    Wei Liu and   
     Syed Zulqarnain Gilani and   
                   Mubarak Shah   Video Description: a Survey of Methods,
                                  Datasets, and Evaluation Metrics . . . . 115:1--115:??
   Madhushree Basavarajaiah and   
                Priyanka Sharma   Survey of Compressed Domain Video
                                  Summarization Techniques . . . . . . . . 116:1--116:29
           Mario Gleirscher and   
               Simon Foster and   
                   Jim Woodcock   New Opportunities for Integrated Formal
                                  Methods  . . . . . . . . . . . . . . . . 117:1--117:??
                  Leibo Liu and   
               Jianfeng Zhu and   
                 Zhaoshi Li and   
                   Yanan Lu and   
              Yangdong Deng and   
                    Jie Han and   
                 Shouyi Yin and   
                    Shaojun Wei   A Survey of Coarse-Grained
                                  Reconfigurable Architecture and Design:
                                  Taxonomy, Challenges, and Applications   118:1--118:??
               Aditya Joshi and   
             Sarvnaz Karimi and   
                Ross Sparks and   
        Cécile Paris and   
             C. Raina Macintyre   Survey of Text-based Epidemic
                                  Intelligence: a Computational
                                  Linguistics Perspective  . . . . . . . . 119:1--119:??
            Mathias Humbert and   
           Benjamin Trubert and   
          Kévin Huguenin   A Survey on Interdependent Privacy . . . 122:1--122:??
                     Ju Ren and   
                 Deyu Zhang and   
                  Shiwen He and   
               Yaoxue Zhang and   
                         Tao Li   A Survey on End-Edge-Cloud Orchestrated
                                  Network Computing Paradigms: Transparent
                                  Computing, Mobile Edge Computing, Fog
                                  Computing, and Cloudlet  . . . . . . . . 125:1--125:??
              Amir Afianian and   
            Salman Niksefat and   
           Babak Sadeghiyan and   
                 David Baptiste   Malware Dynamic Analysis Evasion
                                  Techniques: a Survey . . . . . . . . . . 1--28
             Leonardo Leite and   
                Carla Rocha and   
                  Fabio Kon and   
            Dejan Milojicic and   
                Paulo Meirelles   A Survey of DevOps Concepts and
                                  Challenges . . . . . . . . . . . . . . . 1--35
          Robert A. Bridges and   
  Tarrah R. Glass-Vanderlan and   
       Michael D. Iannacone and   
           Maria S. Vincent and   
          Qian (Guenevere) Chen   A Survey of Intrusion Detection Systems
                                  Leveraging Host Data . . . . . . . . . . 1--35
       Menasha Thilakaratne and   
            Katrina Falkner and   
              Thushari Atapattu   A Systematic Review on Literature-based
                                  Discovery: General Overview,
                                  Methodology, & Statistical Analysis . . . 1--34
         Mukesh Kumar Saini and   
                    Neeraj Goel   How Smart Are Smart Classrooms? A Review
                                  of Smart Classroom Technologies  . . . . 1--28
      Mikhail Drobyshevskiy and   
                 Denis Turdakov   Random Graph Modeling: a Survey of the
                                  Concepts . . . . . . . . . . . . . . . . 1--36


ACM Computing Surveys
Volume 53, Number 1, May, 2020

                  Juhee Bae and   
               Tove Helldin and   
              Maria Riveiro and   
         S\lawomir Nowaczyk and   
    Mohamed-Rafik Bouguelia and   
             Göran Falkman   Interactive Clustering: a Comprehensive
                                  Review . . . . . . . . . . . . . . . . . 1:1--1:39
                 Xinxin Fan and   
                   Ling Liu and   
                  Rui Zhang and   
             Quanliang Jing and   
                    Jingping Bi   Decentralized Trust Management: Risk
                                  Analysis and Trust Aggregation . . . . . 2:1--2:33
                Ruben Mayer and   
             Hans-Arno Jacobsen   Scalable Deep Learning on Distributed
                                  Infrastructures: Challenges, Techniques,
                                  and Tools  . . . . . . . . . . . . . . . 3:1--3:37
                Junjie Chen and   
               Jibesh Patra and   
             Michael Pradel and   
              Yingfei Xiong and   
               Hongyu Zhang and   
                    Dan Hao and   
                       Lu Zhang   A Survey of Compiler Testing . . . . . . 4:1--4:36
                 Allison Randal   The Ideal Versus the Real: Revisiting
                                  the History of Virtual Machines and
                                  Containers . . . . . . . . . . . . . . . 5:1--5:31
               Nuno Paulino and   
 João Canas Ferreira and   
      João M. P. Cardoso   Improving Performance and Energy
                                  Consumption in Embedded Systems via
                                  Binary Acceleration: a Survey  . . . . . 6:1--6:36
            Gerasimos Razis and   
    Ioannis Anagnostopoulos and   
               Sherali Zeadally   Modeling Influence with Semantics in
                                  Social Networks: a Survey  . . . . . . . 7:1--7:38
            Mohammad Etemad and   
Alptekin Küpçü   Generic Dynamic Data Outsourcing
                                  Framework for Integrity Verification . . 8:1--8:32
                  John Kolb and   
         Moustafa AbdelBaky and   
              Randy H. Katz and   
                David E. Culler   Core Concepts, Challenges, and Future
                                  Directions in Blockchain: a Centralized
                                  Tutorial . . . . . . . . . . . . . . . . 9:1--9:39
         Muhammad H. Hilman and   
         Maria A. Rodriguez and   
                 Rajkumar Buyya   Multiple Workflows Scheduling in
                                  Multi-tenant Distributed Systems: a
                                  Taxonomy and Future Directions . . . . . 10:1--10:39
                   Dong Liu and   
                     Yue Li and   
               Jianping Lin and   
                Houqiang Li and   
                        Feng Wu   Deep Learning-Based Video Coding: a
                                  Review and a Case Study  . . . . . . . . 11:1--11:35
Dilek Küçük and   
                      Fazli Can   Stance Detection: a Survey . . . . . . . 12:1--12:37
          Yuri D. V. Yasuda and   
    Luiz Eduardo G. Martins and   
        Fabio A. M. Cappabianco   Autonomous Visual Navigation for Mobile
                                  Robots: a Systematic Literature Review   13:1--13:34
               Shweta Suran and   
       Vishwajeet Pattanaik and   
                   Dirk Draheim   Frameworks for Collective Intelligence:
                                  a Systematic Literature Review . . . . . 14:1--14:36
     Vijini Mallawaarachchi and   
         Lakmal Meegahapola and   
         Roshan Madhushanka and   
              Eranga Heshan and   
           Dulani Meedeniya and   
             Sampath Jayarathna   Change Detection and Notification of Web
                                  Pages: a Survey  . . . . . . . . . . . . 15:1--15:35
        Marcos A. M. Vieira and   
        Matheus S. Castanho and   
Racyus D. G. Pacífico and   
       Elerson R. S. Santos and   
Eduardo P. M. Câmara Júnior and   
              Luiz F. M. Vieira   Fast Packet Processing with eBPF and
                                  XDP: Concepts, Code, Challenges, and
                                  Applications . . . . . . . . . . . . . . 16:1--16:36
                Ofir Landau and   
                 Rami Puzis and   
                     Nir Nissim   Mind Your Mind: EEG-Based
                                  Brain--Computer Interfaces and Their
                                  Security in Cyber Space  . . . . . . . . 17:1--17:38
                 Laphou Lao and   
                 Zecheng Li and   
                Songlin Hou and   
                   Bin Xiao and   
                Songtao Guo and   
                  Yuanyuan Yang   A Survey of IoT Applications in
                                  Blockchain Systems: Architecture,
                                  Consensus, and Traffic Modeling  . . . . 18:1--18:32
                 Hadi Brais and   
       Rajshekar Kalayappan and   
            Preeti Ranjan Panda   A Survey of Cache Simulators . . . . . . 19:1--19:32
           Nektaria Kaloudi and   
                     Jingyue Li   The AI-Based Cyber Threat Landscape: a
                                  Survey . . . . . . . . . . . . . . . . . 20:1--20:34
                    Chu Luo and   
            Jorge Goncalves and   
            Eduardo Velloso and   
              Vassilis Kostakos   A Survey of Context Simulation for
                                  Testing Mobile Context-Aware
                                  Applications . . . . . . . . . . . . . . 21:1--21:39
                 Nevin Cini and   
                   Gulay Yalcin   A Methodology for Comparing the
                                  Reliability of GPU-Based and CPU-Based
                                  HPCs . . . . . . . . . . . . . . . . . . 22:1--22:33

ACM Computing Surveys
Volume 53, Number 2, July, 2020

              Stijn Heldens and   
               Pieter Hijma and   
          Ben Van Werkhoven and   
              Jason Maassen and   
         Adam S. Z. Belloum and   
          Rob V. Van Nieuwpoort   The Landscape of Exascale Research: a
                                  Data-Driven Literature Analysis  . . . . 23:1--23:43
               Sartaj Sahni and   
               Albert Y. Zomaya   In Memoriam Eliezer Dekel (1948--2020)   23:1--23:2
                  Sunny Rai and   
             Shampa Chakraverty   A Survey on Computational Metaphor
                                  Processing . . . . . . . . . . . . . . . 24:1--24:37
João B. F. Sequeiros and   
       Francisco T. Chimuco and   
            Musa G. Samaila and   
     Mário M. Freire and   
      Pedro R. M. Inácio   Attack and System Modeling Applied to
                                  IoT, Cloud, and Mobile Ecosystems:
                                  Embedding Security by Design . . . . . . 25:1--25:32
                Peijin Cong and   
                     Guo Xu and   
               Tongquan Wei and   
                       Keqin Li   A Survey of Profit Optimization
                                  Techniques for Cloud Providers . . . . . 26:1--26:35
Erikson Júlio De Aguiar and   
     Bruno S. Faiçal and   
     Bhaskar Krishnamachari and   
               Jó Ueyama   A Survey of Blockchain-Based Strategies
                                  for Healthcare . . . . . . . . . . . . . 27:1--27:27
                    Jian Wu and   
            Victor S. Sheng and   
                 Jing Zhang and   
                     Hua Li and   
           Tetiana Dadakova and   
     Christine Leon Swisher and   
                Zhiming Cui and   
                  Pengpeng Zhao   Multi-Label Active Learning Algorithms
                                  for Image Classification: Overview and
                                  Future Promise . . . . . . . . . . . . . 28:1--28:35
Jesús Guillermo Falcón-Cardona and   
        Carlos A. Coello Coello   Indicator-based Multi-objective
                                  Evolutionary Algorithms: a Comprehensive
                                  Survey . . . . . . . . . . . . . . . . . 29:1--29:35
           Joost Verbraeken and   
           Matthijs Wolting and   
             Jonathan Katzy and   
         Jeroen Kloppenburg and   
               Tim Verbelen and   
             Jan S. Rellermeyer   A Survey on Distributed Machine Learning 30:1--30:33
           George Papadakis and   
          Dimitrios Skoutas and   
           Emmanouil Thanos and   
                Themis Palpanas   Blocking and Filtering Techniques for
                                  Entity Resolution: a Survey  . . . . . . 31:1--31:42
                Erdem Sahin and   
             Elena Stoykova and   
          Jani Mäkinen and   
                 Atanas Gotchev   Computer-Generated Holograms for $3$D
                                  Imaging: a Survey  . . . . . . . . . . . 32:1--32:35
           Stefano Cherubin and   
                Giovanni Agosta   Tools for Reduced Precision Computation:
                                  a Survey . . . . . . . . . . . . . . . . 33:1--33:35
         Behrouz Zolfaghari and   
          Gautam Srivastava and   
             Swapnoneel Roy and   
            Hamid R. Nemati and   
             Fatemeh Afghah and   
            Takeshi Koshiba and   
              Abolfazl Razi and   
           Khodakhast Bibak and   
               Pinaki Mitra and   
              Brijesh Kumar Rai   Content Delivery Networks: State of the
                                  Art, Trends, and Future Roadmap  . . . . 34:1--34:34
                 Iqbal Alam and   
              Kashif Sharif and   
                     Fan Li and   
               Zohaib Latif and   
                M. M. Karim and   
               Sujit Biswas and   
               Boubakr Nour and   
                        Yu Wang   A Survey of Network Virtualization
                                  Techniques for Internet of Things Using
                                  SDN and NFV  . . . . . . . . . . . . . . 35:1--35:40
            Angela Bonifati and   
      Irena Holubová and   
    Arnau Prat-Pérez and   
                    Sherif Sakr   Graph Generators: State of the Art and
                                  Open Challenges  . . . . . . . . . . . . 36:1--36:30
                    Ying Lu and   
                Lingkun Luo and   
                   Di Huang and   
               Yunhong Wang and   
                    Liming Chen   Knowledge Transfer in Vision
                                  Recognition: a Survey  . . . . . . . . . 37:1--37:35
                Peijin Cong and   
               Junlong Zhou and   
                  Liying Li and   
                    Kun Cao and   
               Tongquan Wei and   
                       Keqin Li   A Survey of Hierarchical Energy
                                  Optimization for Mobile Edge Computing:
                                  a Perspective from End Devices to the
                                  Cloud  . . . . . . . . . . . . . . . . . 38:1--38:44
                Alan Valejo and   
   Vinícius Ferreira and   
              Renato Fabbri and   
Maria Cristina Ferreira de Oliveira and   
         Alneu de Andrade Lopes   A Critical Survey of the Multilevel
                                  Method in Complex Networks . . . . . . . 39:1--39:35
            Jakapan Suaboot and   
                 Adil Fahad and   
                 Zahir Tari and   
                John Grundy and   
        Abdun Naser Mahmood and   
       Abdulmohsen Almalawi and   
           Albert Y. Zomaya and   
                   Khalil Drira   A Taxonomy of Supervised Learning for
                                  IDSs in SCADA Environments . . . . . . . 40:1--40:37
                Guangjie Li and   
                    Hui Liu and   
                Ally S. Nyamawe   A Survey on Renamings of Software
                                  Entities . . . . . . . . . . . . . . . . 41:1--41:38
  Niclas Kannengießer and   
             Sebastian Lins and   
             Tobias Dehling and   
                    Ali Sunyaev   Trade-offs between Distributed Ledger
                                  Technology Characteristics . . . . . . . 42:1--42:37
        Herodotos Herodotou and   
                Yuxing Chen and   
                     Jiaheng Lu   A Survey on Automatic Parameter Tuning
                                  for Big Data Processing Systems  . . . . 43:1--43:37
  Santiago Figueroa-Lorenzo and   
       Javier Añorga and   
             Saioa Arrizabalaga   A Survey of IIoT Protocols: a Measure of
                                  Vulnerability Risk Analysis Based on
                                  CVSS . . . . . . . . . . . . . . . . . . 44:1--44:53
    Federico Sierra-Arriaga and   
             Rodrigo Branco and   
                        Ben Lee   Security Issues and Challenges for
                                  Virtualization Technologies  . . . . . . 45:1--45:37

ACM Computing Surveys
Volume 53, Number 3, July, 2020

                Xuezhi Zeng and   
               Saurabh Garg and   
               Mutaz Barika and   
           Albert Y. Zomaya and   
                 Lizhe Wang and   
            Massimo Villari and   
                   Dan Chen and   
                   Rajiv Ranjan   SLA Management for Big Data Analytical
                                  Applications in Clouds: a Taxonomy Study 46:1--46:40
            Charulata Patil and   
              Manasi Patwardhan   Visual Question Generation: The State of
                                  the Art  . . . . . . . . . . . . . . . . 47:1--47:22
             Ricardo Macedo and   
          João Paulo and   
        José Pereira and   
                Alysson Bessani   A Survey and Classification of
                                  Software-Defined Storage Systems . . . . 48:1--48:38
          A'Aeshah Alhakamy and   
                Mihran Tuceryan   Real-time Illumination and Visual
                                  Coherence for Photorealistic
                                  Augmented/Mixed Reality  . . . . . . . . 49:1--49:34
                 Xunyun Liu and   
                 Rajkumar Buyya   Resource Management and Scheduling in
                                  Distributed Stream Processing Systems: a
                                  Taxonomy, Review, and Future Directions  50:1--50:41
    Phillip Stanley-Marbell and   
               Armin Alaghi and   
             Michael Carbin and   
               Eva Darulova and   
               Lara Dolecek and   
         Andreas Gerstlauer and   
            Ghayoor Gillani and   
            Djordje Jevdjic and   
             Thierry Moreau and   
           Mattia Cacciotti and   
          Alexandros Daglis and   
     Natalie Enright Jerger and   
              Babak Falsafi and   
            Sasa Misailovic and   
             Adrian Sampson and   
                Damien Zufferey   Exploiting Errors for Efficiency: a
                                  Survey from Circuits to Applications . . 51:1--51:39
       Elgìn Akpinar and   
Yelìz Yesìlada and   
    Selìm Temìzer   The Effect of Context on Small Screen
                                  and Wearable Device Users' Performance
                                  --- A Systematic Review  . . . . . . . . 52:1--52:44
         J. Stanley Warford and   
                 David Vega and   
                Scott M. Staley   A Calculational Deductive System for
                                  Linear Temporal Logic  . . . . . . . . . 53:1--53:38
                 Rangan Das and   
                 Sagnik Sen and   
                  Ujjwal Maulik   A Survey on Fuzzy Deep Neural Networks   54:1--54:25
         Azzedine Boukerche and   
               Lining Zheng and   
                   Omar Alfandi   Outlier Detection: Methods, Models, and
                                  Classification . . . . . . . . . . . . . 55:1--55:37
           Olivier Beaumont and   
         Louis-Claude Canon and   
       Lionel Eyraud-Dubois and   
          Giorgio Lucarelli and   
              Loris Marchal and   
   Clément Mommessin and   
             Bertrand Simon and   
                 Denis Trystram   Scheduling on Two Types of Resources: a
                                  Survey . . . . . . . . . . . . . . . . . 56:1--56:36
              Bardh Prenkaj and   
              Paola Velardi and   
             Giovanni Stilo and   
           Damiano Distante and   
                Stefano Faralli   A Survey of Machine Learning Approaches
                                  for Student Dropout Prediction in Online
                                  Courses  . . . . . . . . . . . . . . . . 57:1--57:34
               Leila Ismail and   
                Huned Materwala   Computing Server Power Modeling in a
                                  Data Center: Survey, Taxonomy, and
                                  Performance Evaluation . . . . . . . . . 58:1--58:34
               Thomas Welsh and   
              Elhadj Benkhelifa   On Resilience in Cloud Computing: a
                                  Survey of Techniques across the Cloud
                                  Domain . . . . . . . . . . . . . . . . . 59:1--59:36
                Saeed Anwar and   
                Salman Khan and   
                    Nick Barnes   A Deep Journey into Super-resolution: a
                                  Survey . . . . . . . . . . . . . . . . . 60:1--60:34
            Bert-Jan Butijn and   
         Damian A. Tamburri and   
      Willem-Jan van den Heuvel   Blockchains: a Systematic Multivocal
                                  Literature Review  . . . . . . . . . . . 61:1--61:37
             Triet H. M. Le and   
                   Hao Chen and   
             Muhammad Ali Babar   Deep Learning for Source Code Modeling
                                  and Generation: Models, Applications,
                                  and Challenges . . . . . . . . . . . . . 62:1--62:38
                Yaqing Wang and   
               Quanming Yao and   
              James T. Kwok and   
                   Lionel M. Ni   Generalizing from a Few Examples: a
                                  Survey on Few-shot Learning  . . . . . . 63:1--63:34
             Sebastian Zepf and   
           Javier Hernandez and   
          Alexander Schmitt and   
            Wolfgang Minker and   
             Rosalind W. Picard   Driver Emotion Recognition for
                                  Intelligent Vehicles: a Survey . . . . . 64:1--64:30
        Farah A\"\it Salaht and   
Frédéric Desprez and   
                   Adrien Lebre   An Overview of Service Placement Problem
                                  in Fog and Edge Computing  . . . . . . . 65:1--65:35
                Alex Serban and   
                  Erik Poll and   
                   Joost Visser   Adversarial Examples on Object
                                  Recognition: a Comprehensive Survey  . . 66:1--66:38
               Huashan Chen and   
           Marcus Pendleton and   
             Laurent Njilla and   
                    Shouhuai Xu   A Survey on Ethereum Systems Security:
                                  Vulnerabilities, Attacks, and Defenses   67:1--67:43

ACM Computing Surveys
Volume 53, Number 4, September, 2020

                    Bin Guo and   
                 Yasan Ding and   
                   Lina Yao and   
                Yunji Liang and   
                      Zhiwen Yu   The Future of False Information
                                  Detection on Social Media: New
                                  Perspectives and Trends  . . . . . . . . 68:1--68:36
              Patrick Emami and   
          Panos M. Pardalos and   
          Lily Elefteriadou and   
                   Sanjay Ranka   Machine Learning Methods for Data
                                  Association in Multi-Object Tracking . . 69:1--69:34
             Alexander Wood and   
            Kayvan Najarian and   
              Delaram Kahrobaei   Homomorphic Encryption for Machine
                                  Learning in Medicine and Bioinformatics  70:1--70:35
              Kan Ngamakeur and   
           Sira Yongchareon and   
                    Jian Yu and   
                Saeed Ur Rehman   A Survey on Device-free Indoor
                                  Localization and Tracking in the
                                  Multi-resident Environment . . . . . . . 71:1--71:29
           Isra Mohamed Ali and   
        Maurantonio Caprolu and   
              Roberto Di Pietro   Foundations, Properties, and Security
                                  Applications of Puzzles: a Survey  . . . 72:1--72:38
                 Xincai Fei and   
               Fangming Liu and   
                Qixia Zhang and   
                    Hai Jin and   
                     Hongxin Hu   Paving the Way for NFV Acceleration: a
                                  Taxonomy, Survey and Future Directions   73:1--73:42
           Michael Feldmann and   
       Christian Scheideler and   
                  Stefan Schmid   Survey on Algorithms for
                                  Self-stabilizing Overlay Networks  . . . 74:1--74:24
               Ruocheng Guo and   
                   Lu Cheng and   
                 Jundong Li and   
            P. Richard Hahn and   
                       Huan Liu   A Survey of Learning Causality with
                                  Data: Problems and Methods . . . . . . . 75:1--75:37
        Angeliki Kritikakou and   
             Rafail Psiakis and   
           Francky Catthoor and   
               Olivier Sentieys   Binary Tree Classification of Rigid
                                  Error Detection and Correction
                                  Techniques . . . . . . . . . . . . . . . 76:1--76:38
       Jorge Calvo-Zaragoza and   
              Jan Hajic Jr. and   
                Alexander Pacha   Understanding Optical Music Recognition  77:1--77:35
                 Salvador Lucas   Context-sensitive Rewriting  . . . . . . 78:1--78:36
        Jon Perez Cerrolaza and   
          Roman Obermaisser and   
               Jaume Abella and   
       Francisco J. Cazorla and   
          Kim Grüttner and   
               Irune Agirre and   
         Hamidreza Ahmadian and   
                 Imanol Allende   Multi-core Devices for Safety-critical
                                  Systems: a Survey  . . . . . . . . . . . 79:1--79:38
         Azzedine Boukerche and   
                    Victor Soto   Computation Offloading and Retrieval for
                                  Vehicular Edge Computing: Algorithms,
                                  Models, and Classification . . . . . . . 80:1--80:35
        Pascal Weisenburger and   
             Johannes Wirth and   
              Guido Salvaneschi   A Survey of Multitier Programming  . . . 81:1--81:35
                   Bin Qian and   
                     Jie Su and   
                 Zhenyu Wen and   
           Devki Nandan Jha and   
                  Yinhao Li and   
                    Yu Guan and   
              Deepak Puthal and   
               Philip James and   
                 Renyu Yang and   
           Albert Y. Zomaya and   
                  Omer Rana and   
                 Lizhe Wang and   
              Maciej Koutny and   
                   Rajiv Ranjan   Orchestrating the Development Lifecycle
                                  of Machine Learning-based IoT
                                  Applications: a Taxonomy and Survey  . . 82:1--82:47
              Yinghui Zhang and   
             Robert H. Deng and   
                Shengmin Xu and   
                Jianfei Sun and   
                      Qi Li and   
                     Dong Zheng   Attribute-based Encryption for Cloud
                                  Computing Access Control: a Survey . . . 83:1--83:41
               Yanjiao Chen and   
               Baolin Zheng and   
                Zihan Zhang and   
                  Qian Wang and   
                  Chao Shen and   
                     Qian Zhang   Deep Learning on Mobile and Embedded
                                  Devices: State-of-the-art, Challenges,
                                  and Future Directions  . . . . . . . . . 84:1--84:37
                  Saad Khan and   
            Simon Parkinson and   
                 Liam Grant and   
                     Na Liu and   
                Stephen Mcguire   Biometric Systems Utilising Health Data
                                  from Wearable Devices: Applications and
                                  Future Challenges in Computer Security   85:1--85:29
            Tomohiro Harada and   
                   Enrique Alba   Parallel Genetic Algorithms: a Useful
                                  Survey . . . . . . . . . . . . . . . . . 86:1--86:39
               Adrian Pekar and   
               Jozef Mocnej and   
         Winston K. G. Seah and   
                 Iveta Zolotova   Application Domain-Based Overview of IoT
                                  Network Traffic Characteristics  . . . . 87:1--87:33
             Redowan Mahmud and   
     Kotagiri Ramamohanarao and   
                 Rajkumar Buyya   Application Management in Fog Computing
                                  Environments: a Taxonomy, Review and
                                  Future Directions  . . . . . . . . . . . 88:1--88:43
             Pratima Sharma and   
               Rajni Jindal and   
             Malaya Dutta Borah   Blockchain Technology for Cloud Storage:
                                  a Systematic Literature Review . . . . . 89:1--89:32
              Gexiang Zhang and   
                 Zeyi Shang and   
              Sergey Verlan and   
Miguel Á. Martínez-del-Amor and   
              Chengxun Yuan and   
      Luis Valencia-Cabrera and   
Mario J. Pérez-Jiménez   An Overview of Hardware Implementation
                                  of Membrane Computing Models . . . . . . 90:1--90:38

ACM Computing Surveys
Volume 53, Number 5, October, 2020

Juan A. Álvarez-García and   
       Bozidara Cvetkovi\'c and   
                  Mitja Lustrek   A Survey on Energy Expenditure
                                  Estimation Using Wearable Devices  . . . 91:1--91:35
               Noura Aljeri and   
             Azzedine Boukerche   Mobility Management in $5$G-enabled
                                  Vehicular Networks: Models, Protocols,
                                  and Classification . . . . . . . . . . . 92:1--92:35
              Mariam Khader and   
                Ghazi Al-Naymat   Density-based Algorithms for Big Data
                                  Clustering Using MapReduce Framework: a
                                  Comprehensive Study  . . . . . . . . . . 93:1--93:38
         Roniel S. De Sousa and   
         Azzedine Boukerche and   
         Antonio A. F. Loureiro   Vehicle Trajectory Similarity: Models,
                                  Methods, and Applications  . . . . . . . 94:1--94:32
                Ramon Canal and   
           Carles Hernandez and   
               Rafa Tornero and   
         Alessandro Cilardo and   
           Giuseppe Massari and   
        Federico Reghenzani and   
         William Fornaciari and   
             Marina Zapater and   
              David Atienza and   
             Ariel Oleksiak and   
            Wojciech PiAtek and   
                   Jaume Abella   Predictive Reliability and Fault
                                  Management in Exascale Systems: State of
                                  the Art and Perspectives . . . . . . . . 95:1--95:32
              Miralem Mehic and   
             Marcin Niemiec and   
                Stefan Rass and   
                  Jiajun Ma and   
              Momtchil Peev and   
           Alejandro Aguado and   
             Vicente Martin and   
             Stefan Schauer and   
              Andreas Poppe and   
           Christoph Pacher and   
                Miroslav Voznak   Quantum Key Distribution: a Networking
                                  Perspective  . . . . . . . . . . . . . . 96:1--96:41
           Zeyad A. Al-Odat and   
                 Mazhar Ali and   
                Assad Abbas and   
                  Samee U. Khan   Secure Hash Algorithms and the
                                  Corresponding FPGA Optimization
                                  Techniques . . . . . . . . . . . . . . . 97:1--97:36
               Sagar Uprety and   
           Dimitris Gkoumas and   
                     Dawei Song   A Survey of Quantum Theory Inspired
                                  Approaches to Information Retrieval  . . 98:1--98:39
                  Raj Dabre and   
                Chenhui Chu and   
             Anoop Kunchukuttan   A Survey of Multilingual Neural Machine
                                  Translation  . . . . . . . . . . . . . . 99:1--99:38
                 Weiwei Lin and   
                   Fang Shi and   
                  Wentai Wu and   
                   Keqin Li and   
                Guangxin Wu and   
               Al-Alas Mohammed   A Taxonomy and Survey of Power Models
                                  and Power Modeling for Cloud Servers . . 100:1--100:41
            Deya Chatterjee and   
                    Shrisha Rao   Computational Sustainability: a
                                  Socio-technical Perspective  . . . . . . 101:1--101:29
          Maram Bani Younes and   
             Azzedine Boukerche   Traffic Efficiency Applications over
                                  Downtown Roads: a New Challenge for
                                  Intelligent Connected Vehicles . . . . . 102:1--102:30
María A. Cornejo-Lupa and   
   Regina P. Ticona-Herrera and   
           Yudith Cardinale and   
        Dennis Barrios-Aranibar   A Survey of Ontologies for Simultaneous
                                  Localization and Mapping in Mobile
                                  Robots . . . . . . . . . . . . . . . . . 103:1--103:26
                     Kai Bu and   
                Avery Laird and   
                Yutian Yang and   
              Linfeng Cheng and   
                Jiaqing Luo and   
                 Yingjiu Li and   
                        Kui Ren   Unveiling the Mystery of Internet Packet
                                  Forwarding: a Survey of Network Path
                                  Validation . . . . . . . . . . . . . . . 104:1--104:34
            Gonzalo Navarro and   
           Javiel Rojas-Ledesma   Predecessor Search . . . . . . . . . . . 105:1--105:35
             Yashar Deldjoo and   
              Markus Schedl and   
            Paolo Cremonesi and   
                 Gabriella Pasi   Recommender Systems Leveraging
                                  Multimedia Content . . . . . . . . . . . 106:1--106:38
               Jingwen Wang and   
                Xuyang Jing and   
                  Zheng Yan and   
                  Yulong Fu and   
             Witold Pedrycz and   
               Laurence T. Yang   A Survey on Trust Evaluation Based on
                                  Machine Learning . . . . . . . . . . . . 107:1--107:36
                   Hao Wang and   
                  Dit-Yan Yeung   A Survey on Bayesian Deep Learning . . . 108:1--108:37
                 Xinyi Zhou and   
                  Reza Zafarani   A Survey of Fake News: Fundamental
                                  Theories, Detection Methods, and
                                  Opportunities  . . . . . . . . . . . . . 109:1--109:40
              Ali Davoudian and   
                    Mengchi Liu   Big Data Systems: a Software Engineering
                                  Perspective  . . . . . . . . . . . . . . 110:1--110:39
                     Kui Yu and   
                Xianjie Guo and   
                    Lin Liu and   
                 Jiuyong Li and   
                   Hao Wang and   
              Zhaolong Ling and   
                     Xindong Wu   Causality-based Feature Selection:
                                  Methods and Evaluations  . . . . . . . . 111:1--111:36
               Furkan Alaca and   
           Paul C. Van Oorschot   Comparative Analysis and Framework
                                  Evaluating Web Single Sign-on Systems    112:1--112:34

ACM Computing Surveys
Volume 53, Number 6, February, 2021

               Peter J. Denning   Working Set Analytics  . . . . . . . . . 113:1--113:36
               Albert Y. Zomaya   In Memoriam Sherif Sakr (1979--2020) . . 113e:1--113e:1
       Aditya Singh Rathore and   
              Zhengxiong Li and   
                 Weijin Zhu and   
               Zhanpeng Jin and   
                      Wenyao Xu   A Survey on Heart Biometrics . . . . . . 114:1--114:38
             Sara N. Matheu and   
José L. Hernández-Ramos and   
        Antonio F. Skarmeta and   
              Gianmarco Baldini   A Survey of Cybersecurity Certification
                                  for the Internet of Things . . . . . . . 115:1--115:36
                Jide S. Edu and   
               Jose M. Such and   
        Guillermo Suarez-Tangil   Smart Home Personal Assistants: a
                                  Security and Privacy Review  . . . . . . 116:1--116:36
               Marimuthu C. and   
          K. Chandrasekaran and   
           Sridhar Chimalakonda   Energy Diagnosis of Android
                                  Applications: a Thematic Taxonomy and
                                  Survey . . . . . . . . . . . . . . . . . 117:1--117:36
                Pamela Zave and   
               Jennifer Rexford   Patterns and Interactions in Network
                                  Security . . . . . . . . . . . . . . . . 118:1--118:37
             K. K. Santhosh and   
                D. P. Dogra and   
                      P. P. Roy   Anomaly Detection in Road Traffic Using
                                  Visual Surveillance: a Survey  . . . . . 119:1--119:26
       Elakkiya Ellavarason and   
              Richard Guest and   
              Farzin Deravi and   
        Raul Sanchez-Riello and   
               Barbara Corsetti   Touch-dynamics based Behavioural
                                  Biometrics on Mobile Devices --- A
                                  Review from a Usability and Performance
                                  Perspective  . . . . . . . . . . . . . . 120:1--120:36
           Marco Zimmerling and   
               Luca Mottola and   
                 Silvia Santini   Synchronous Transmissions in Low-Power
                                  Wireless: a Survey of Communication
                                  Protocols and Network Services . . . . . 121:1--121:39
               Nazar Waheed and   
               Xiangjian He and   
             Muhammad Ikram and   
             Muhammad Usman and   
          Saad Sajid Hashmi and   
                 Muhammad Usman   Security and Privacy in IoT Using
                                  Machine Learning and Blockchain: Threats
                                  and Countermeasures  . . . . . . . . . . 122:1--122:37
               Riemer van Rozen   Languages of Games and Play: a
                                  Systematic Mapping Study . . . . . . . . 123:1--123:37
             Michele Coscia and   
       Andres Gomez-Lievano and   
             James Mcnerney and   
                   Frank Neffke   The Node Vector Distance Problem in
                                  Complex Networks . . . . . . . . . . . . 124:1--124:27
      Giulio Ermanno Pibiri and   
              Rossano Venturini   Techniques for Inverted Index
                                  Compression  . . . . . . . . . . . . . . 125:1--125:36
                Junyang Qiu and   
                  Jun Zhang and   
                    Wei Luo and   
                    Lei Pan and   
                Surya Nepal and   
                     Yang Xiang   A Survey of Android Malware Detection
                                  with Deep Neural Models  . . . . . . . . 126:1--126:36
     Vassilis Christophides and   
          Vasilis Efthymiou and   
            Themis Palpanas and   
           George Papadakis and   
              Kostas Stefanidis   An Overview of End-to-End Entity
                                  Resolution for Big Data  . . . . . . . . 127:1--127:42
               Furkan Turan and   
             Ingrid Verbauwhede   Trust in FPGA-accelerated Cloud
                                  Computing  . . . . . . . . . . . . . . . 128:1--128:28
                 Ruba Skaik and   
                   Diana Inkpen   Using Social Media for Mental Health
                                  Surveillance: a Review . . . . . . . . . 129:1--129:31
          Sarah Masud Preum and   
              Sirajum Munir and   
                   Meiyi Ma and   
       Mohammad Samin Yasar and   
             David J. Stone and   
            Ronald Williams and   
             Homa Alemzadeh and   
              John A. Stankovic   A Review of Cognitive Assistants for
                                  Healthcare: Trends, Prospects, and
                                  Future Directions  . . . . . . . . . . . 130:1--130:37
               Maggi Bansal and   
            Inderveer Chana and   
          Siobhán Clarke   A Survey on IoT Big Data: Current
                                  Status, 13 V's Challenges, and Future
                                  Directions . . . . . . . . . . . . . . . 131:1--131:59
          Suzanne Tolmeijer and   
               Markus Kneer and   
           Cristina Sarasua and   
            Markus Christen and   
              Abraham Bernstein   Implementations in Machine Ethics: a
                                  Survey . . . . . . . . . . . . . . . . . 132:1--132:38
               Liehuang Zhu and   
                Md M. Karim and   
              Kashif Sharif and   
                   Chang Xu and   
                     Fan Li and   
               Xiaojiang Du and   
                 Mohsen Guizani   SDN Controllers: a Comprehensive
                                  Analysis and Performance Evaluation
                                  Study  . . . . . . . . . . . . . . . . . 133:1--133:40
         Azzedine Boukerche and   
                       Peng Sun   Design of Algorithms and Protocols for
                                  Underwater Acoustic Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 134:1--134:34


ACM Computing Surveys
Volume 54, Number 1, April, 2021

       Miljana Mladenovi\'c and   
             Vera Osmjanski and   
    Stasa Vujici\'c Stankovi\'c   Cyber-aggression, Cyberbullying, and
                                  Cyber-grooming: a Survey and Research
                                  Challenges . . . . . . . . . . . . . . . 1:1--1:42
                 Avani Vyas and   
                 Sujata Pal and   
               Barun Kumar Saha   Relay-based Communications in WBANs: a
                                  Comprehensive Survey . . . . . . . . . . 2:1--2:34
Ángel Jesús Varela-Vaca and   
      Antonia M. Reina Quintero   Smart Contract Languages: a Multivocal
                                  Mapping Study  . . . . . . . . . . . . . 3:1--3:38
               Hongbo Jiang and   
                     Jie Li and   
                  Ping Zhao and   
                 Fanzi Zeng and   
                   Zhu Xiao and   
                   Arun Iyengar   Location Privacy-preserving Mechanisms
                                  in Location-based Services: a
                                  Comprehensive Survey . . . . . . . . . . 4:1--4:36
         Christopher Wright and   
        William A. Moeglein and   
             Saurabh Bagchi and   
            Milind Kulkarni and   
            Abraham A. Clements   Challenges in Firmware Re-Hosting,
                                  Emulation, and Analysis  . . . . . . . . 5:1--5:36
                  Renjie Gu and   
                Chaoyue Niu and   
                     Fan Wu and   
                Guihai Chen and   
                    Chun Hu and   
               Chengfei Lyu and   
                      Zhihua Wu   From Server-Based to Client-Based
                                  Machine Learning: a Comprehensive Survey 6:1--6:36
             Yisroel Mirsky and   
                      Wenke Lee   The Creation and Detection of Deepfakes:
                                  a Survey . . . . . . . . . . . . . . . . 7:1--7:41
                 Joan Boyar and   
          Lene M. Favrholdt and   
                  Kim S. Larsen   Relative Worst-order Analysis: a Survey  8:1--8:21
              Prasanna Ravi and   
                 James Howe and   
       Anupam Chattopadhyay and   
                  Shivam Bhasin   Lattice-based Key-sharing Schemes: a
                                  Survey . . . . . . . . . . . . . . . . . 9:1--9:39
               Behroz Mirza and   
              Tahir Q. Syed and   
                Behraj Khan and   
                   Yameen Malik   Potential Deep Learning Solutions to
                                  Persistent and Emerging Big Data
                                  Challenges --- a Practitioners' Cookbook 10:1--10:39
 Sergio López Bernal and   
Alberto Huertas Celdrán and   
Gregorio Martínez Pérez and   
     Michael Taynnan Barros and   
     Sasitharan Balasubramaniam   Security in Brain-Computer Interfaces:
                                  State-of-the-Art, Opportunities, and
                                  Future Challenges  . . . . . . . . . . . 11:1--11:35
         Leah Zhang-Kennedy and   
                 Sonia Chiasson   A Systematic Review of Multimedia Tools
                                  for Cybersecurity Awareness and
                                  Education  . . . . . . . . . . . . . . . 12:1--12:39
                Shengming Jiang   Networking in Oceans: a Survey . . . . . 13:1--13:33
                  Weitao Xu and   
              Junqing Zhang and   
               Shunqi Huang and   
               Chengwen Luo and   
                         Wei Li   Key Generation for Internet of Things: a
                                  Contemporary Survey  . . . . . . . . . . 14:1--14:37
           Paolo Bellavista and   
              Luca Foschini and   
                   Alessio Mora   Decentralised Learning in Federated
                                  Deployment Environments: a System-Level
                                  Survey . . . . . . . . . . . . . . . . . 15:1--15:38
       Zarin Tasnim Sandhie and   
      Jill Arvindbhai Patel and   
          Farid Uddin Ahmed and   
             Masud H. Chowdhury   Investigation of Multiple-valued Logic
                                  Technologies for Beyond-binary Era . . . 16:1--16:30
               Rayan Chikhi and   
                  Jan Holub and   
                  Paul Medvedev   Data Structures to Represent a Set of
                                  $k$-long DNA Sequences . . . . . . . . . 17:1--17:22
Víctor Adrián Sosa Hernández and   
         Raúl Monroy and   
Miguel Angel Medina-Pérez and   
Octavio Loyola-González and   
              Francisco Herrera   A Practical Tutorial for Decision Tree
                                  Induction: Evaluation Measures for
                                  Candidate Splits and Opportunities . . . 18:1--18:38
            Stefano Mariani and   
              Giacomo Cabri and   
              Franco Zambonelli   Coordination of Autonomous Vehicles:
                                  Taxonomy and Survey  . . . . . . . . . . 19:1--19:33
                 Zara Nasar and   
          Syed Waqar Jaffry and   
          Muhammad Kamran Malik   Named Entity Recognition and Relation
                                  Extraction: State-of-the-Art . . . . . . 20:1--20:39
                 Emad Aliwa and   
                  Omer Rana and   
             Charith Perera and   
                   Peter Burnap   Cyberattacks and Countermeasures for
                                  In-Vehicle Networks  . . . . . . . . . . 21:1--21:37
               Bosheng Song and   
                   Kenli Li and   
David Orellana-Martín and   
Mario J. Pérez-Jiménez and   
   Ignacio PéRez-Hurtado   A Survey of Nature-Inspired Computing:
                                  Membrane Computing . . . . . . . . . . . 22:1--22:31
               Anna Minaeva and   
         Zdenek Hanzálek   Survey on Periodic Scheduling for
                                  Time-triggered Hard Real-time Systems    23:1--23:32
                 Tobias Distler   Byzantine Fault-tolerant State-machine
                                  Replication from a Systems Perspective   24:1--24:38

ACM Computing Surveys
Volume 54, Number 2, April, 2021

             Abdullah Qasem and   
              Paria Shirani and   
             Mourad Debbabi and   
                Lingyu Wang and   
              Bernard Lebel and   
                 Basile L. Agba   Automatic Vulnerability Detection in
                                  Embedded Devices and Firmware: Survey
                                  and Layered Taxonomies . . . . . . . . . 25:1--25:42
                Gonzalo Navarro   Indexing Highly Repetitive String
                                  Collections, Part II: Compressed Indexes 26:1--26:32
                   Fan Zhou and   
                   Xovee Xu and   
            Goce Trajcevski and   
                  Kunpeng Zhang   A Survey of Information Cascade
                                  Analysis: Models, Predictions, and
                                  Recent Advances  . . . . . . . . . . . . 27:1--27:36
              Pedro Ribeiro and   
              Pedro Paredes and   
         Miguel E. P. Silva and   
             David Aparicio and   
                 Fernando Silva   A Survey on Subgraph Counting: Concepts,
                                  Algorithms, and Applications to Network
                                  Motifs and Graphlets . . . . . . . . . . 28:1--28:36
                Gonzalo Navarro   Indexing Highly Repetitive String
                                  Collections, Part I: Repetitiveness
                                  Measures . . . . . . . . . . . . . . . . 29:1--29:31
         Azzedine Boukerche and   
                     Zhijun Hou   Object Detection Using Deep Learning
                                  Methods in Traffic Scenarios . . . . . . 30:1--30:35
                     Bo Liu and   
                  Ming Ding and   
                Sina Shaham and   
               Wenny Rahayu and   
             Farhad Farokhi and   
                     Zihuai Lin   When Machine Learning Meets Privacy: a
                                  Survey and Outlook . . . . . . . . . . . 31:1--31:36
                Chenning Li and   
                Zhichao Cao and   
                     Yunhao Liu   Deep AI Enabled Ubiquitous Wireless
                                  Sensing: a Survey  . . . . . . . . . . . 32:1--32:35
              Kelsey Harley and   
                  Rodney Cooper   Information Integrity: Are We There Yet? 33:1--33:35
               El-Ghazali Talbi   Automated Design of Deep Neural
                                  Networks: a Survey and Unified Taxonomy  34:1--34:37
             Yashar Deldjoo and   
            Tommaso Di Noia and   
           Felice Antonio Merra   A Survey on Adversarial Recommender
                                  Systems: From Attack/Defense Strategies
                                  to Generative Adversarial Networks . . . 35:1--35:38
             Sarra Bouhenni and   
           Sa\"\id Yahiaoui and   
   Nadia Nouali-Taboudjemat and   
            Hamamache Kheddouci   A Survey on Distributed Graph Pattern
                                  Matching in Massive Graphs . . . . . . . 36:1--36:35
              Zhengwei Wang and   
                     Qi She and   
           Tomás E. Ward   Generative Adversarial Networks in
                                  Computer Vision: a Survey and Taxonomy   37:1--37:38
              Guansong Pang and   
               Chunhua Shen and   
               Longbing Cao and   
           Anton Van Den Hengel   Deep Learning for Anomaly Detection: a
                                  Review . . . . . . . . . . . . . . . . . 38:1--38:38
                 Sheng Wang and   
                Zhifeng Bao and   
         J. Shane Culpepper and   
                       Gao Cong   A Survey on Trajectory Data Management,
                                  Analytics, and Learning  . . . . . . . . 39:1--39:36
         Christian Meurisch and   
       Max Mühlhäuser   Data Protection in AI Services: a Survey 40:1--40:38
      Dhivya Chandrasekaran and   
                     Vijay Mago   Evolution of Semantic Similarity --- a
                                  Survey . . . . . . . . . . . . . . . . . 41:1--41:37
               Xiaoxue Chen and   
                Lianwen Jin and   
                Yuanzhi Zhu and   
                 Canjie Luo and   
                   Tianwei Wang   Text Recognition in the Wild: a Survey   42:1--42:35
        Suha S. Al-Thanyyan and   
                   Aqil M. Azmi   Automated Text Simplification: a Survey  43:1--43:36
               Huawei Huang and   
                   Wei Kong and   
                Sicong Zhou and   
                Zibin Zheng and   
                       Song Guo   A Survey of State-of-the-Art on
                                  Blockchains: Theories, Modelings, and
                                  Tools  . . . . . . . . . . . . . . . . . 44:1--44:42
               Sameen Maruf and   
              Fahimeh Saleh and   
             Gholamreza Haffari   A Survey on Document-level Neural
                                  Machine Translation: Methods and
                                  Evaluation . . . . . . . . . . . . . . . 45:1--45:36
           Arlino Magalhaes and   
        Jose Maria Monteiro and   
                 Angelo Brayner   Main Memory Database Recovery: a Survey  46:1--46:36

ACM Computing Surveys
Volume 54, Number 3, June, 2021

          Mohammed Hassanin and   
                Salman Khan and   
                  Murat Tahtali   Visual Affordance and Function
                                  Understanding: a Survey  . . . . . . . . 47:1--47:35
             Matteo Magnani and   
             Obaida Hanteer and   
        Roberto Interdonato and   
                 Luca Rossi and   
               Andrea Tagarelli   Community Detection in Multiplex
                                  Networks . . . . . . . . . . . . . . . . 48:1--48:35
              Clayson Celes and   
         Azzedine Boukerche and   
         Antonio A. F. Loureiro   Mobility Trace Analysis for Intelligent
                                  Vehicular Networks: Methods, Models, and
                                  Applications . . . . . . . . . . . . . . 49:1--49:38
               Bushra Sabir and   
               Faheem Ullah and   
               M. Ali Babar and   
                      Raj Gaire   Machine Learning for Detecting Data
                                  Exfiltration: a Review . . . . . . . . . 50:1--50:47
               Irfan Ul Haq and   
                 Juan Caballero   A Survey of Binary Code Similarity . . . 51:1--51:38
             Shyamali Mitra and   
                Nibaran Das and   
            Soumyajyoti Dey and   
        Sukanta Chakraborty and   
              Mita Nasipuri and   
            Mrinal Kanti Naskar   Cytology Image Analysis Techniques
                                  Toward Automation: Systematically
                                  Revisited  . . . . . . . . . . . . . . . 52:1--52:41
              Ilona Bluemke and   
           Agnieszka Malanowska   Software Testing Effort Estimation and
                                  Related Problems: a Systematic
                                  Literature Review  . . . . . . . . . . . 53:1--53:38
               Wenjie Xiong and   
                   Jakub Szefer   Survey of Transient Execution Attacks
                                  and Their Mitigations  . . . . . . . . . 54:1--54:36
                Liping Zhao and   
              Waad Alhoshan and   
            Alessio Ferrari and   
        Keletso J. Letsholo and   
          Muideen A. Ajagbe and   
      Erol-Valeriu Chioasca and   
        Riza T. Batista-Navarro   Natural Language Processing for
                                  Requirements Engineering: a Systematic
                                  Mapping Study  . . . . . . . . . . . . . 55:1--55:41
Ane Blázquez-García and   
                Angel Conde and   
                  Usue Mori and   
                 Jose A. Lozano   A Review on Outlier/Anomaly Detection in
                                  Time Series Data . . . . . . . . . . . . 56:1--56:33
   Syed Wasif Abbas Hamdani and   
               Haider Abbas and   
        Abdul Rehman Janjua and   
          Waleed Bin Shahid and   
      Muhammad Faisal Amjad and   
            Jahanzaib Malik and   
        Malik Hamza Murtaza and   
       Mohammed Atiquzzaman and   
              Abdul Waheed Khan   Cybersecurity Standards in the Context
                                  of Operating System: Practical Aspects,
                                  Analysis, and Comparisons  . . . . . . . 57:1--57:36
                      Xi Li and   
                 Zehua Wang and   
         Victor C. M. Leung and   
                    Hong Ji and   
                 Yiming Liu and   
                     Heli Zhang   Blockchain-empowered Data-driven
                                  Networks: a Survey and Outlook . . . . . 58:1--58:38
                Petr Spelda and   
                  Vit Stritecky   Human Induction in Machine Learning: a
                                  Survey of the Nexus  . . . . . . . . . . 59:1--59:18
                  Jun Huang and   
                  Debiao He and   
        Mohammad S. Obaidat and   
          Pandi Vijayakumar and   
                    Min Luo and   
         Kim-Kwang Raymond Choo   The Application of the Blockchain
                                  Technology in Voting Systems: a Review   60:1--60:28
               Boubakr Nour and   
             Hakima Khelifi and   
            Rasheed Hussain and   
        Spyridon Mastorakis and   
                Hassine Moungla   Access Control Mechanisms in Named Data
                                  Networks: a Comprehensive Survey . . . . 61:1--61:35
             Shervin Minaee and   
           Nal Kalchbrenner and   
               Erik Cambria and   
              Narjes Nikzad and   
           Meysam Chenaghlu and   
                   Jianfeng Gao   Deep Learning--based Text
                                  Classification: a Comprehensive Review   62:1--62:40
               Divya Saxena and   
                   Jiannong Cao   Generative Adversarial Networks (GANs):
                                  Challenges, Solutions, and Future
                                  Directions . . . . . . . . . . . . . . . 63:1--63:42
          Zhabiz Gharibshah and   
                   Xingquan Zhu   User Response Prediction in Online
                                  Advertising  . . . . . . . . . . . . . . 64:1--64:43
           Gilberto Astolfi and   
Fábio Prestes Cesar Rezende and   
João Vitor De Andrade Porto and   
    Edson Takashi Matsubara and   
               Hemerson Pistori   Syntactic Pattern Recognition in
                                  Computer Vision: a Systematic Review . . 65:1--65:35
           Blesson Varghese and   
                   Nan Wang and   
             David Bermbach and   
              Cheol-Ho Hong and   
               Eyal De Lara and   
                Weisong Shi and   
            Christopher Stewart   A Survey on Edge Performance
                                  Benchmarking . . . . . . . . . . . . . . 66:1--66:33
               Danilo Avola and   
               Luigi Cinque and   
            Alessio Fagioli and   
           Gianluca Foresti and   
                  Alessio Mecca   Ultrasound Medical Imaging Techniques: a
                                  Survey . . . . . . . . . . . . . . . . . 67:1--67:38
              Khan Muhammad and   
        Mohammad S. Obaidat and   
            Tanveer Hussain and   
             Javier Del Ser and   
               Neeraj Kumar and   
           Mohammad Tanveer and   
                  Faiyaz Doctor   Fuzzy Logic in Surveillance Big Video
                                  Data Analysis: Comprehensive Review,
                                  Challenges, and Research Directions  . . 68:1--68:33
              Ahmed Alharbi and   
                   Hai Dong and   
                     Xun Yi and   
                 Zahir Tari and   
                 Ibrahim Khalil   Social Media Identity Deception
                                  Detection: a Survey  . . . . . . . . . . 69:1--69:35

ACM Computing Surveys
Volume 54, Number 4, July, 2021

           Felipe L. Gewers and   
        Gustavo R. Ferreira and   
      Henrique F. De Arruda and   
            Filipi N. Silva and   
             Cesar H. Comin and   
           Diego R. Amancio and   
             Luciano Da F.Costa   Principal Component Analysis: a Natural
                                  Approach to Data Exploration . . . . . . 70:1--70:34
                Aidan Hogan and   
              Eva Blomqvist and   
             Michael Cochez and   
            Claudia D'amato and   
             Gerard De Melo and   
          Claudio Gutierrez and   
            Sabrina Kirrane and   
José Emilio Labra Gayo and   
            Roberto Navigli and   
         Sebastian Neumaier and   
  Axel-Cyrille Ngonga Ngomo and   
              Axel Polleres and   
           Sabbir M. Rashid and   
                 Anisa Rula and   
         Lukas Schmelzeisen and   
               Juan Sequeda and   
              Steffen Staab and   
             Antoine Zimmermann   Knowledge Graphs . . . . . . . . . . . . 71:1--71:37
            Wen-Huang Cheng and   
                 Sijie Song and   
             Chieh-Yun Chen and   
  Shintami Chusnul Hidayati and   
                    Jiaying Liu   Fashion Meets Computer Vision: a Survey  72:1--72:41
                  Rob Dunne and   
                 Tim Morris and   
                   Simon Harper   A Survey of Ambient Intelligence . . . . 73:1--73:27
           H. M. Dipu Kabir and   
             Abbas Khosravi and   
          Subrota K. Mondal and   
           Mustaneer Rahman and   
            Saeid Nahavandi and   
                 Rajkumar Buyya   Uncertainty-aware Decisions in Cloud
                                  Computing: Foundations and Future
                                  Directions . . . . . . . . . . . . . . . 74:1--74:30
                   Fei Chen and   
                 Duming Luo and   
                  Tao Xiang and   
                  Ping Chen and   
                Junfeng Fan and   
               Hong-Linh Truong   IoT Cloud Security Review: a Case Study
                                  Approach Using Emerging
                                  Consumer-oriented Applications . . . . . 75:1--75:36
               Pengzhen Ren and   
                   Yun Xiao and   
              Xiaojun Chang and   
               Po-yao Huang and   
                  Zhihui Li and   
             Xiaojiang Chen and   
                       Xin Wang   A Comprehensive Survey of Neural
                                  Architecture Search: Challenges and
                                  Solutions  . . . . . . . . . . . . . . . 76:1--76:34
               Kaixuan Chen and   
                Dalin Zhang and   
                   Lina Yao and   
                    Bin Guo and   
                  Zhiwen Yu and   
                     Yunhao Liu   Deep Learning for Sensor-based Human
                                  Activity Recognition: Overview,
                                  Challenges, and Opportunities  . . . . . 77:1--77:40
               Daniel Russo and   
                 Klaas-Jan Stol   PLS-SEM for Software Engineering
                                  Research: an Introduction and Survey . . 78:1--78:38
                Abdus Salam and   
             Rolf Schwitter and   
                Mehmet A. Orgun   Probabilistic Rule Learning Systems: a
                                  Survey . . . . . . . . . . . . . . . . . 79:1--79:16
       Elena Almaraz Luengo and   
Luis Javier García Villalba   Recommendations on Statistical
                                  Randomness Test Batteries for
                                  Cryptographic Purposes . . . . . . . . . 80:1--80:34
              Katie Seaborn and   
         Norihisa P. Miyake and   
          Peter Pennefather and   
          Mihoko Otake-Matsuura   Voice in Human-Agent Interaction: a
                                  Survey . . . . . . . . . . . . . . . . . 81:1--81:43
              Oliver Michel and   
            Roberto Bifulco and   
Gábor Rétvári and   
                  Stefan Schmid   The Programmable Data Plane:
                                  Abstractions, Architectures, Algorithms,
                                  and Applications . . . . . . . . . . . . 82:1--82:36
                     Wei Hu and   
      Armaiti Ardeshiricham and   
                   Ryan Kastner   Hardware Information Flow Tracking . . . 83:1--83:39
         Azzedine Boukerche and   
                       Xiren Ma   Vision-based Autonomous Vehicle
                                  Recognition: a New Challenge for Deep
                                  Learning-based Systems . . . . . . . . . 84:1--84:37
                Bekir Afsar and   
            Kaisa Miettinen and   
                 Francisco Ruiz   Assessing the Performance of Interactive
                                  Multiobjective Optimization Methods: a
                                  Survey . . . . . . . . . . . . . . . . . 85:1--85:27
            Nikhil Tripathi and   
              Neminath Hubballi   Application Layer Denial-of-Service
                                  Attacks and Defense Mechanisms: a Survey 86:1--86:33
                 Yunbo Tang and   
                   Dan Chen and   
                      Xiaoli Li   Dimensionality Reduction Methods for
                                  Brain Imaging Data Analysis  . . . . . . 87:1--87:36
             Matteo Ridolfi and   
                 Abdil Kaya and   
            Rafael Berkvens and   
               Maarten Weyn and   
                Wout Joseph and   
                 Eli De Poorter   Self-calibration and Collaborative
                                  Localization for UWB Positioning
                                  Systems: a Survey and Future Research
                                  Directions . . . . . . . . . . . . . . . 88:1--88:27
            Nuno Laranjeiro and   
         João Agnelo and   
               Jorge Bernardino   A Systematic Review on Software
                                  Robustness Assessment  . . . . . . . . . 89:1--89:65
                Boyuan Chen and   
         Zhen Ming (Jack) Jiang   A Survey of Software Log Instrumentation 90:1--90:34
         Varsha S. Lalapura and   
                  J. Amudha and   
  Hariramn Selvamuruga Satheesh   Recurrent Neural Networks for Edge
                                  Intelligence: a Survey . . . . . . . . . 91:1--91:38

ACM Computing Surveys
Volume 54, Number 5, June, 2021

          Antonia Bertolino and   
             Pietro Braione and   
       Guglielmo De Angelis and   
               Luca Gazzola and   
             Fitsum Kifetew and   
           Leonardo Mariani and   
              Matteo Orr\`u and   
              Mauro Pezz\`e and   
       Roberto Pietrantuono and   
              Stefano Russo and   
                  Paolo Tonella   A Survey of Field-based Testing
                                  Techniques . . . . . . . . . . . . . . . 92:1--92:39
          Jean-Michel Bruel and   
            Sophie Ebersold and   
           Florian Galinier and   
             Manuel Mazzara and   
          Alexandr Naumchev and   
                 Bertrand Meyer   The Role of Formalism in System
                                  Requirements . . . . . . . . . . . . . . 93:1--93:36
                     Liang Zhao   Event Prediction in the Big Data Era: a
                                  Systematic Survey  . . . . . . . . . . . 94:1--94:37
                 Sin Kit Lo and   
                 Qinghua Lu and   
                  Chen Wang and   
             Hye-Young Paik and   
                     Liming Zhu   A Systematic Literature Review on
                                  Federated Machine Learning: From a
                                  Software Engineering Perspective . . . . 95:1--95:39
        Abdulaziz Alashaikh and   
               Eisa Alanazi and   
                  Ala Al-Fuqaha   A Survey on the Use of Preferences for
                                  Virtual Machine Placement in Cloud Data
                                  Centers  . . . . . . . . . . . . . . . . 96:1--96:39
                 Xing Huang and   
                Tsung-Yi Ho and   
               Wenzhong Guo and   
                    Bing Li and   
     Krishnendu Chakrabarty and   
               Ulf Schlichtmann   Computer-aided Design Techniques for
                                  Flow-based Microfluidic Lab-on-a-chip
                                  Systems  . . . . . . . . . . . . . . . . 97:1--97:29
              Jana Dunfield and   
              Neel Krishnaswami   Bidirectional Typing . . . . . . . . . . 98:1--98:38
           Mohanad Abukmeil and   
            Stefano Ferrari and   
            Angelo Genovese and   
             Vincenzo Piuri and   
                   Fabio Scotti   A Survey of Unsupervised Generative
                                  Models for Exploratory Data Analysis and
                                  Representation Learning  . . . . . . . . 99:1--99:40
             Adilla Susungi and   
                 Claude Tadonki   Intermediate Representations for
                                  Explicitly Parallel Programs . . . . . . 100:1--100:24
            Subodha Charles and   
                 Prabhat Mishra   A Survey of Network-on-Chip Security
                                  Attacks and Countermeasures  . . . . . . 101:1--101:36
           Atheer Aljeraisy and   
              Masoud Barati and   
                  Omer Rana and   
                 Charith Perera   Privacy Laws and Privacy by Design
                                  Schemes for the Internet of Things: a
                                  Developer's Perspective  . . . . . . . . 102:1--102:38
          Arwa I. Alhussain and   
                   Aqil M. Azmi   Automatic Story Generation: a Survey of
                                  Approaches . . . . . . . . . . . . . . . 103:1--103:38
          Marie Al-Ghossein and   
           Talel Abdessalem and   
           Anthony Barré   A Survey on Stream-Based Recommender
                                  Systems  . . . . . . . . . . . . . . . . 104:1--104:36
            Dietmar Jannach and   
            Ahtsham Manzoor and   
                Wanling Cai and   
                        Li Chen   A Survey on Conversational Recommender
                                  Systems  . . . . . . . . . . . . . . . . 105:1--105:36
                   Yuan Luo and   
                    Ya Xiao and   
                 Long Cheng and   
                Guojun Peng and   
           Danfeng (Daphne) Yao   Deep Learning-based Anomaly Detection in
                                  Cyber-physical Systems: Progress and
                                  Opportunities  . . . . . . . . . . . . . 106:1--106:36
                 Maya Dotan and   
       Yvonne-Anne Pignolet and   
              Stefan Schmid and   
               Saar Tochner and   
                     Aviv Zohar   Survey on Blockchain Networking:
                                  Context, State-of-the-Art, Challenges    107:1--107:34
            Ishai Rosenberg and   
               Asaf Shabtai and   
              Yuval Elovici and   
                    Lior Rokach   Adversarial Machine Learning Attacks and
                                  Defense Methods in the Cyber Security
                                  Domain . . . . . . . . . . . . . . . . . 108:1--108:36
            Shubham Pateria and   
         Budhitama Subagdja and   
                Ah-hwee Tan and   
                      Chai Quek   Hierarchical Reinforcement Learning: a
                                  Comprehensive Survey . . . . . . . . . . 109:1--109:35
              Vimal Dwivedi and   
       Vishwajeet Pattanaik and   
                Vipin Deval and   
             Abhishek Dixit and   
                 Alex Norta and   
                   Dirk Draheim   Legally Enforceable Smart-Contract
                                  Languages: a Systematic Literature
                                  Review . . . . . . . . . . . . . . . . . 110:1--110:34
                Rob Ashmore and   
             Radu Calinescu and   
                 Colin Paterson   Assuring the Machine Learning Lifecycle:
                                  Desiderata, Methods, and Challenges  . . 111:1--111:39

ACM Computing Surveys
Volume 54, Number 6, July, 2021

            Peter Kietzmann and   
          Thomas C. Schmidt and   
         Matthias Wählisch   A Guideline on Pseudorandom Number
                                  Generation (PRNG) in the IoT . . . . . . 112:1--112:38
                      Eman Badr   Images in Space and Time: Real Big Data
                                  in Healthcare  . . . . . . . . . . . . . 113:1--113:38
              Swati Jaiswal and   
            Uday P. Khedker and   
                   Alan Mycroft   A Unified Model for Context-Sensitive
                                  Program Analyses:: The Blind Men and the
                                  Elephant . . . . . . . . . . . . . . . . 114:1--114:37
            Ninareh Mehrabi and   
            Fred Morstatter and   
            Nripsuta Saxena and   
            Kristina Lerman and   
                  Aram Galstyan   A Survey on Bias and Fairness in Machine
                                  Learning . . . . . . . . . . . . . . . . 115:1--115:35
        Harley Vera-Olivera and   
                 Ruizhe Guo and   
      Ruben Cruz Huacarpuma and   
Ana Paula Bernardi Da Silva and   
           Ari Melo Mariano and   
              Maristela Holanda   Data Modeling and NoSQL Databases --- a
                                  Systematic Mapping Review  . . . . . . . 116:1--116:26
           Routa Moussaileb and   
               Nora Cuppens and   
           Jean-Louis Lanet and   
      Hél\`ene Le Bouder   A Survey on Windows-based Ransomware
                                  Taxonomy and Detection Mechanisms  . . . 117:1--117:36
              Ratnabali Pal and   
            Arif Ahmed Sekh and   
          Debi Prosad Dogra and   
               Samarjit Kar and   
          Partha Pratim Roy and   
                Dilip K. Prasad   Topic-based Video Analysis: a Survey . . 118:1--118:34
       Andreia P. Guerreiro and   
          Carlos M. Fonseca and   
            Luís Paquete   The Hypervolume Indicator: Computational
                                  Problems and Algorithms  . . . . . . . . 119:1--119:42
                  Yuta Itoh and   
            Tobias Langlotz and   
            Jonathan Sutton and   
              Alexander Plopski   Towards Indistinguishable Augmented
                                  Reality: a Survey on Optical See-through
                                  Head-mounted Displays  . . . . . . . . . 120:1--120:36
                 Bilal Rauf and   
               Haider Abbas and   
             Muhammad Usman and   
             Tanveer A. Zia and   
               Waseem Iqbal and   
                Yawar Abbas and   
                   Hammad Afzal   Application Threats to Exploit
                                  Northbound Interface Vulnerabilities in
                                  Software Defined Networks  . . . . . . . 121:1--121:36
               Xiaoxuan Lou and   
              Tianwei Zhang and   
                  Jun Jiang and   
                  Yinqian Zhang   A Survey of Microarchitectural
                                  Side-channel Vulnerabilities, Attacks,
                                  and Defenses in Cryptography . . . . . . 122:1--122:37
         Eva Papadogiannaki and   
              Sotiris Ioannidis   A Survey on Encrypted Network Traffic
                                  Analysis Applications, Techniques, and
                                  Countermeasures  . . . . . . . . . . . . 123:1--123:35
       Thi Tuyet Hai Nguyen and   
                Adam Jatowt and   
           Mickael Coustaty and   
                 Antoine Doucet   Survey of Post-OCR Processing Approaches 124:1--124:37
       Panagiotis Oikonomou and   
              Anna Karanika and   
   Christos Anagnostopoulos and   
             Kostas Kolomvatsos   On the Use of Intelligent Models towards
                                  Meeting the Challenges of the Edge Mesh  125:1--125:42
                 Shufan Fei and   
                  Zheng Yan and   
                Wenxiu Ding and   
                    Haomeng Xie   Security Vulnerabilities of SGX and
                                  Countermeasures: a Survey  . . . . . . . 126:1--126:36
              Sindhu Padakandla   A Survey of Reinforcement Learning
                                  Algorithms for Dynamically Varying
                                  Environments . . . . . . . . . . . . . . 127:1--127:25
  Pádraig Cunningham and   
              Sarah Jane Delany   $k$-Nearest Neighbour Classifiers --- a
                                  Tutorial . . . . . . . . . . . . . . . . 128:1--128:25
               El-Ghazali Talbi   Machine Learning into Metaheuristics: a
                                  Survey and Taxonomy  . . . . . . . . . . 129:1--129:32
                  Shilin He and   
                  Pinjia He and   
             Zhuangbin Chen and   
                Tianyi Yang and   
                   Yuxin Su and   
                 Michael R. Lyu   A Survey on Automated Log Analysis for
                                  Reliability Engineering  . . . . . . . . 130:1--130:37
                 Xuefei Yin and   
                Yanming Zhu and   
                     Jiankun Hu   A Comprehensive Survey of
                                  Privacy-preserving Federated Learning: a
                                  Taxonomy, Review, and Future Directions  131:1--131:36
                Zhipeng Cai and   
               Zuobin Xiong and   
                 Honghui Xu and   
                  Peng Wang and   
                     Wei Li and   
                         Yi Pan   Generative Adversarial Networks: a
                                  Survey Toward Private and Secure
                                  Applications . . . . . . . . . . . . . . 132:1--132:38
         Azzedine Boukerche and   
                    Mingzhi Sha   Design Guidelines on Deep Learning-based
                                  Pedestrian Detection Methods for
                                  Supporting Autonomous Vehicles . . . . . 133:1--133:36
              Thomas PlÖtz   Applying Machine Learning for Sensor
                                  Data Analysis in Interactive Systems:
                                  Common Pitfalls of Pragmatic Use and
                                  Ways to Avoid Them . . . . . . . . . . . 134:1--134:25

ACM Computing Surveys
Volume 54, Number 7, September, 2022

             Ankur Lohachab and   
               Saurabh Garg and   
                Byeong Kang and   
        Muhammad Bilal Amin and   
                 Junmin Lee and   
               Shiping Chen and   
                       Xiwei Xu   Towards Interconnected Blockchains: a
                                  Comprehensive Review of the Role of
                                  Interoperability among Disparate
                                  Blockchains  . . . . . . . . . . . . . . 135:1--135:39
               Lefeng Zhang and   
               Tianqing Zhu and   
                 Ping Xiong and   
                Wanlei Zhou and   
                   Philip S. Yu   More than Privacy: Adopting Differential
                                  Privacy in Game-theoretic Mechanism
                                  Design . . . . . . . . . . . . . . . . . 136:1--136:37
              Michael Braun and   
              Florian Weber and   
                    Florian Alt   Affective Automotive User
                                  Interfaces-Reviewing the State of Driver
                                  Affect Research and Emotion Regulation
                                  in the Car . . . . . . . . . . . . . . . 137:1--137:26
Sophie Dramé-Maigné and   
           Maryline Laurent and   
           Laurent Castillo and   
             Hervé Ganem   Centralized, Distributed, and Everything
                                  in between: Reviewing Access Control
                                  Solutions for the IoT  . . . . . . . . . 138:1--138:34
              Yuantian Miao and   
                  Chao Chen and   
                    Lei Pan and   
              Qing-Long Han and   
                  Jun Zhang and   
                     Yang Xiang   Machine Learning-based Cyber Attacks
                                  Targeting on Controlled Information: a
                                  Survey . . . . . . . . . . . . . . . . . 139:1--139:36
           Luciano Ignaczak and   
      Guilherme Goldschmidt and   
Cristiano André Da Costa and   
          Rodrigo Da Rosa Righi   Text Mining in Cybersecurity: a
                                  Systematic Literature Review . . . . . . 140:1--140:36
          Tharindu Fernando and   
          Harshala Gammulle and   
               Simon Denman and   
           Sridha Sridharan and   
                 Clinton Fookes   Deep Learning for Medical Anomaly
                                  Detection --- a Survey . . . . . . . . . 141:1--141:37
              Salonik Resch and   
               Ulya R. Karpuzcu   Benchmarking Quantum Computers and the
                                  Impact of Quantum Noise  . . . . . . . . 142:1--142:35
               Hugo B. Lima and   
    Carlos G. R. Dos Santos and   
            Bianchi S. Meiguins   A Survey of Music Visualization
                                  Techniques . . . . . . . . . . . . . . . 143:1--143:29
      Yohan Bonescki Gumiel and   
Lucas Emanuel Silva e Oliveira and   
            Vincent Claveau and   
             Natalia Grabar and   
    Emerson Cabrera Paraiso and   
               Claudia Moro and   
       Deborah Ribeiro Carvalho   Temporal Relation Extraction in Clinical
                                  Texts: a Systematic Review . . . . . . . 144:1--144:36
              Uttam Chauhan and   
                    Apurva Shah   Topic Modeling Using Latent Dirichlet
                                  allocation: a Survey . . . . . . . . . . 145:1--145:35
               Lynda Tamine and   
              Lorraine Goeuriot   Semantic Information Retrieval on
                                  Medical Texts: Research Challenges,
                                  Survey, and Open Issues  . . . . . . . . 146:1--146:38
           Christian Berger and   
         Philipp Eichhammer and   
             Hans P. Reiser and   
        Jörg Domaschka and   
             Franz J. Hauck and   
                Gerhard Habiger   A Survey on Resilience in the IoT:
                                  Taxonomy, Classification, and Discussion
                                  of Resilience Mechanisms . . . . . . . . 147:1--147:39
             Palina Tolmach and   
                      Yi Li and   
              Shang-Wei Lin and   
                   Yang Liu and   
                   Zengxiang Li   A Survey of Smart Contract Formal
                                  Specification and Verification . . . . . 148:1--148:38
               Jihyeok Park and   
                 Hongki Lee and   
                   Sukyoung Ryu   A Survey of Parametric Static Analysis   149:1--149:37
    Douglas Paulo De Mattos and   
Débora C. Muchaluat-Saade and   
              Gheorghita Ghinea   Beyond Multimedia Authoring: On the Need
                                  for Mulsemedia Authoring Tools . . . . . 150:1--150:31
                  Jie Zhang and   
                  Zhihao Qu and   
                Chenxi Chen and   
               Haozhao Wang and   
                Yufeng Zhan and   
                  Baoliu Ye and   
                       Song Guo   Edge Learning: The Enabling Technology
                                  for Distributed Big Data Analytics in
                                  the Edge . . . . . . . . . . . . . . . . 151:1--151:36
        Alexandro Baldassin and   
        João Barreto and   
              Daniel Castro and   
                   Paolo Romano   Persistent Memory: a Survey of
                                  Programming Support and Implementations  152:1--152:37
        Julio Juárez and   
     Cipriano (Pano) Santos and   
             Carlos A. Brizuela   A Comprehensive Review and a Taxonomy
                                  Proposal of Team Formation Problems  . . 153:1--153:33
               Shoujin Wang and   
               Longbing Cao and   
                   Yan Wang and   
              Quan Z. Sheng and   
            Mehmet A. Orgun and   
                      Defu Lian   A Survey on Session-based Recommender
                                  Systems  . . . . . . . . . . . . . . . . 154:1--154:38
          Nathan Magrofuoco and   
              Paolo Roselli and   
              Jean Vanderdonckt   Two-dimensional Stroke Gesture
                                  Recognition: a Survey  . . . . . . . . . 155:1--155:36
                Djalel Chefrour   One-Way Delay Measurement From
                                  Traditional Networks to SDN: a Survey    156:1--156:35

ACM Computing Surveys
Volume 54, Number 8, November, 2022

               Abdul Jabbar and   
                      Xi Li and   
                  Bourahla Omar   A Survey on Generative Adversarial
                                  Networks: Variants, Applications, and
                                  Training . . . . . . . . . . . . . . . . 157:1--157:49
               Jianguo Chen and   
                   Kenli Li and   
              Zhaolei Zhang and   
                   Keqin Li and   
                   Philip S. Yu   A Survey on Applications of Artificial
                                  Intelligence in Fighting Against
                                  COVID-19 . . . . . . . . . . . . . . . . 158:1--158:32
              Xingwei Zhang and   
             Xiaolong Zheng and   
                      Wenji Mao   Adversarial Perturbation Defense on Deep
                                  Neural Networks  . . . . . . . . . . . . 159:1--159:36
                Jinglin Zou and   
                  Debiao He and   
           Sherali Zeadally and   
               Neeraj Kumar and   
                Huaqun Wang and   
            Kkwang Raymond Choo   Integrated Blockchain and Cloud
                                  Computing Systems: a Systematic Survey,
                                  Solutions, and Challenges  . . . . . . . 160:1--160:36
             Akbar Telikani and   
      Amirhessam Tahmassebi and   
           Wolfgang Banzhaf and   
                Amir H. Gandomi   Evolutionary Machine Learning: a Survey  161:1--161:35
               Weijia Zhang and   
                 Jiuyong Li and   
                        Lin Liu   A Unified Survey of Treatment Effect
                                  Heterogeneity Modelling and Uplift
                                  Modelling  . . . . . . . . . . . . . . . 162:1--162:36
             Vinicius Souza and   
            Anderson Maciel and   
              Luciana Nedel and   
                   Regis Kopper   Measuring Presence in Virtual
                                  Environments: a Survey . . . . . . . . . 163:1--163:37
           Gopika Ajaykumar and   
             Maureen Steele and   
               Chien-Ming Huang   A Survey on End-User Robot Programming   164:1--164:36
               Lik-Hang Lee and   
              Tristan Braud and   
                 Simo Hosio and   
                        Pan Hui   Towards Augmented Reality Driven
                                  Human-City Interaction: Current Research
                                  on Mobile Headsets and Future Challenges 165:1--165:38
                Satyaki Roy and   
              Preetam Ghosh and   
               Nirnay Ghosh and   
                   Sajal K. Das   Transcriptional Regulatory Network
                                  Topology with Applications to
                                  Bio-inspired Networking: a Survey  . . . 166:1--166:36
                Haiman Tian and   
          Maria Presa-Reyes and   
                 Yudong Tao and   
                Tianyi Wang and   
           Samira Pouyanfar and   
              Alonso Miguel and   
                Steven Luis and   
              Mei-Ling Shyu and   
             Shu-Ching Chen and   
    Sundaraja Sitharama Iyengar   Data Analytics for Air Travel Data: a
                                  Survey and New Perspectives  . . . . . . 167:1--167:35
            Rafael Belchior and   
   André Vasconcelos and   
    Sérgio Guerreiro and   
                 Miguel Correia   A Survey on Blockchain Interoperability:
                                  Past, Present, and Future Trends . . . . 168:1--168:41
                 Royson Lee and   
      Stylianos I. Venieris and   
               Nicholas D. Lane   Deep Neural Network-based Enhancement
                                  for Image and Video Streaming Systems: a
                                  Survey and Future Directions . . . . . . 169:1--169:30
       M. G. Sarwar Murshed and   
         Christopher Murphy and   
                 Daqing Hou and   
                 Nazar Khan and   
    Ganesh Ananthanarayanan and   
                  Faraz Hussain   Machine Learning at the Network Edge: a
                                  Survey . . . . . . . . . . . . . . . . . 170:1--170:37
             Maxime Lamothe and   
Yann-Gaël Guéhéneuc and   
                    Weiyi Shang   A Systematic Review of API Evolution
                                  Literature . . . . . . . . . . . . . . . 171:1--171:36
            Jessica McBroom and   
            Irena Koprinska and   
                   Kalina Yacef   A Survey of Automated Programming Hint
                                  Generation: The HINTS Framework  . . . . 172:1--172:27
           Giuseppe Desolda and   
            Lauren S. Ferro and   
            Andrea Marrella and   
            Tiziana Catarci and   
      Maria Francesca Costabile   Human Factors in Phishing Attacks: a
                                  Systematic Literature Review . . . . . . 173:1--173:35
                    Ye Tian and   
                Langchun Si and   
               Xingyi Zhang and   
                  Ran Cheng and   
                   Cheng He and   
               Kay Chen Tan and   
                     Yaochu Jin   Evolutionary Large-Scale Multi-Objective
                                  Optimization: a Survey . . . . . . . . . 174:1--174:34
Shubhra Kanti Karmaker (``Santu'') and   
          Md. Mahadi Hassan and   
             Micah J. Smith and   
                     Lei Xu and   
            Chengxiang Zhai and   
          Kalyan Veeramachaneni   AutoML to Date and Beyond: Challenges
                                  and Opportunities  . . . . . . . . . . . 175:1--175:36
       Alexandre H. T. Dias and   
        Luiz. H. A. Correia and   
               Neumar Malheiros   A Systematic Literature Review on
                                  Virtual Machine Consolidation  . . . . . 176:1--176:38
                 Fuqiang Gu and   
              Mu-Huan Chung and   
              Mark Chignell and   
            Shahrokh Valaee and   
               Baoding Zhou and   
                        Xue Liu   A Survey on Deep Learning for Human
                                  Activity Recognition . . . . . . . . . . 177:1--177:34

ACM Computing Surveys
Volume 54, Number 9, December, 2022

    Konstantinos Arakadakis and   
       Pavlos Charalampidis and   
     Antonis Makrogiannakis and   
        Alexandros Fragkiadakis   Firmware Over-the-air Programming
                                  Techniques for IoT Networks --- A Survey 178:1--178:36
Lázaro Bustio-Martínez and   
       René Cumplido and   
       Martín Letras and   
Raudel Hernández-León and   
    Claudia Feregrino-Uribe and   
José Hernández-Palancar   FPGA/GPU-based Acceleration for Frequent
                                  Itemsets Mining: a Comprehensive Review  179:1--179:35
               Pengzhen Ren and   
                   Yun Xiao and   
              Xiaojun Chang and   
               Po-Yao Huang and   
                  Zhihui Li and   
              Brij B. Gupta and   
             Xiaojiang Chen and   
                       Xin Wang   A Survey of Deep Active Learning . . . . 180:1--180:40
      Efstratios Kakaletsis and   
     Charalampos Symeonidis and   
              Maria Tzelepi and   
           Ioannis Mademlis and   
           Anastasios Tefas and   
           Nikos Nikolaidis and   
                  Ioannis Pitas   Computer Vision for Autonomous UAV
                                  Flight Safety: an Overview and a
                                  Vision-based Safe Landing Pipeline
                                  Example  . . . . . . . . . . . . . . . . 181:1--181:37
                 Dylan Chou and   
                     Meng Jiang   A Survey on Data-driven Network
                                  Intrusion Detection  . . . . . . . . . . 182:1--182:36
                 Lingxi Xie and   
                   Xin Chen and   
                 Kaifeng Bi and   
                Longhui Wei and   
                   Yuhui Xu and   
                Lanfei Wang and   
               Zhengsu Chen and   
                    An Xiao and   
             Jianlong Chang and   
             Xiaopeng Zhang and   
                        Qi Tian   Weight-Sharing Neural Architecture
                                  Search: a Battle to Shrink the
                                  Optimization Gap . . . . . . . . . . . . 183:1--183:37
             Carlos Bermejo and   
                        Pan Hui   A Survey on Haptic Technologies for
                                  Mobile Augmented Reality . . . . . . . . 184:1--184:35
         Ismaeel Al Ridhawi and   
              Ouns Bouachir and   
            Moayad Aloqaily and   
             Azzedine Boukerche   Design Guidelines for Cooperative
                                  UAV-supported Services and Applications  185:1--185:35
           Pasika Ranaweera and   
                Anca Jurcut and   
            Madhusanka Liyanage   MEC-enabled 5G Use Cases: a Survey on
                                  Security Vulnerabilities and
                                  Countermeasures  . . . . . . . . . . . . 186:1--186:37
               Xiongkuo Min and   
                      Ke Gu and   
              Guangtao Zhai and   
              Xiaokang Yang and   
               Wenjun Zhang and   
          Patrick Le Callet and   
                 Chang Wen Chen   Screen Content Quality Assessment:
                                  Overview, Benchmark, and Beyond  . . . . 187:1--187:36
             Frank Siqueira and   
                Joseph G. Davis   Service Computing for Industry 4.0:
                                  State of the Art, Challenges, and
                                  Research Opportunities . . . . . . . . . 188:1--188:38
   Denise Maria Vecino Sato and   
Sheila Cristiana De Freitas and   
          Jean Paul Barddal and   
         Edson Emilio Scalabrin   A Survey on Concept Drift in Process
                                  Mining . . . . . . . . . . . . . . . . . 189:1--189:38
                 Bing Zhang and   
                 Jingyue Li and   
                Jiadong Ren and   
                   Guoyan Huang   Efficiency and Effectiveness of Web
                                  Application Vulnerability Detection
                                  Approaches: a Review . . . . . . . . . . 190:1--190:35
               Sergi Abadal and   
                Akshay Jain and   
             Robert Guirado and   
  Jorge López-Alonso and   
          Eduard Alarcón   Computing Graph Neural Networks: a
                                  Survey from Algorithms to Accelerators   191:1--191:38
              Meriem Guerar and   
             Luca Verderame and   
            Mauro Migliardi and   
         Francesco Palmieri and   
                  Alessio Merlo   Gotta CAPTCHA 'Em All: a Survey of 20
                                  Years of the Human-or-computer Dilemma   192:1--192:33
           José Mena and   
                Oriol Pujol and   
                 Jordi Vitri\`a   A Survey on Uncertainty Estimation in
                                  Deep Learning Classification Systems
                                  from a Bayesian Perspective  . . . . . . 193:1--193:35
               Josef Schmid and   
           Alfred Höss and   
         Björn W. Schuller   A Survey on Client Throughput Prediction
                                  Algorithms in Wired and Wireless
                                  Networks . . . . . . . . . . . . . . . . 194:1--194:33
                Asma Aloufi and   
                 Peizhao Hu and   
               Yongsoo Song and   
                 Kristin Lauter   Computing Blindfolded on Data
                                  Homomorphically Encrypted under Multiple
                                  Keys: a Survey . . . . . . . . . . . . . 195:1--195:37
                   Chao Liu and   
                    Xin Xia and   
                   David Lo and   
                 Cuiyun Gao and   
                Xiaohu Yang and   
                    John Grundy   Opportunities and Challenges in Code
                                  Search Tools . . . . . . . . . . . . . . 196:1--196:40
           Timothy McIntosh and   
             A. S. M. Kayes and   
        Yi-Ping Phoebe Chen and   
                    Alex Ng and   
                   Paul Watters   Ransomware Mitigation in the Modern Era:
                                  a Comprehensive Review, Research
                                  Challenges, and Future Directions  . . . 197:1--197:36
      René Mayrhofer and   
                   Stephan Sigg   Adversary Models for Mobile Device
                                  Authentication . . . . . . . . . . . . . 198:1--198:35
Gábor E. Gévay and   
                  Juan Soto and   
                   Volker Markl   Handling Iterations in Distributed
                                  Dataflow Systems . . . . . . . . . . . . 199:1--199:38

ACM Computing Surveys
Volume 54, Number 10s, January, 2022

                Salman Khan and   
            Muzammal Naseer and   
              Munawar Hayat and   
           Syed Waqas Zamir and   
         Fahad Shahbaz Khan and   
                   Mubarak Shah   Transformers in Vision: a Survey . . . . 200:1--200:??
    Géraldin Nanfack and   
                Paul Temple and   
        Beno\^\it Frénay   Constraint Enforcement on Decision
                                  Trees: a Survey  . . . . . . . . . . . . 201:1--201:??
               Nhu-Ngoc Dao and   
              Anh-Tien Tran and   
               Ngo Hoang Tu and   
           Tran Thien Thanh and   
         Vo Nguyen Quoc Bao and   
                    Sungrae Cho   A Contemporary Survey on Live Video
                                  Streaming from a Computation-Driven
                                  Perspective  . . . . . . . . . . . . . . 202:1--202:??
              Pablo Messina and   
                 Pablo Pino and   
                Denis Parra and   
                Alvaro Soto and   
               Cecilia Besa and   
               Sergio Uribe and   
     Marcelo And\'ìa and   
             Cristian Tejos and   
             Claudia Prieto and   
                 Daniel Capurro   A Survey on Deep Learning and
                                  Explainability for Automatic Report
                                  Generation from Medical Images . . . . . 203:1--203:??
         Ross Gruetzemacher and   
                 David Paradice   Deep Transfer Learning & Beyond:
                                  Transformer Language Models in
                                  Information Systems Research . . . . . . 204:1--204:??
          Isaac Ronald Ward and   
                Jack Joyner and   
             Casey Lickfold and   
                  Yulan Guo and   
             Mohammed Bennamoun   A Practical Tutorial on Graph Neural
                                  Networks . . . . . . . . . . . . . . . . 205:1--205:??
               Yanming Yang and   
                    Xin Xia and   
                   David Lo and   
                    John Grundy   A Survey on Deep Learning for Software
                                  Engineering  . . . . . . . . . . . . . . 206:1--206:??
                  Ying Zhao and   
                    Jinjun Chen   A Survey on Differential Privacy for
                                  Unstructured Data Content  . . . . . . . 207:1--207:??
         Ms. Aayushi Bansal and   
            Dr. Rewa Sharma and   
             Dr. Mamta Kathuria   A Systematic Review on Data Scarcity
                                  Problem in Deep Learning: Solution and
                                  Applications . . . . . . . . . . . . . . 208:1--208:??
                   Xin Wang and   
                  Sisi Duan and   
               James Clavin and   
                   Haibin Zhang   BFT in Blockchains: From Protocols to
                                  Use Cases  . . . . . . . . . . . . . . . 209:1--209:??
            Torsten Schlett and   
          Christian Rathgeb and   
              Olaf Henniger and   
            Javier Galbally and   
             Julian Fierrez and   
                Christoph Busch   Face Image Quality Assessment: a
                                  Literature Survey  . . . . . . . . . . . 210:1--210:??
          Vijay Kumar Yadav and   
              Nitish Andola and   
              Shekhar Verma and   
                  S. Venkatesan   A Survey of Oblivious Transfer Protocol  211:1--211:??
                    Hang Du and   
                 Hailin Shi and   
                   Dan Zeng and   
            Xiao-Ping Zhang and   
                        Tao Mei   The Elements of End-to-end Deep Face
                                  Recognition: a Survey of Recent Advances 212:1--212:??
Claudio Filipi Gonçalves Dos Santos and   
         João Paulo Papa   Avoiding Overfitting: a Survey on
                                  Regularization Methods for Convolutional
                                  Neural Networks  . . . . . . . . . . . . 213:1--213:??
    Misael C. Júnior and   
        Domenico Amalfitano and   
         Lina Garcés and   
         Anna Rita Fasolino and   
   Stevão A. Andrade and   
         Márcio Delamaro   Dynamic Testing Techniques of
                                  Non-functional Requirements in Mobile
                                  Apps: a Systematic Mapping Study . . . . 214:1--214:??
              Rob Churchill and   
                     Lisa Singh   The Evolution of Topic Modeling  . . . . 215:1--215:??
              Daniel Martin and   
             Sandra Malpica and   
            Diego Gutierrez and   
                Belen Masia and   
                    Ana Serrano   Multimodality in VR: a Survey  . . . . . 216:1--216:??
              Zhiheng Zhong and   
                 Minxian Xu and   
  Maria Alejandra Rodriguez and   
              Chengzhong Xu and   
                 Rajkumar Buyya   Machine Learning-based Orchestration of
                                  Containers: a Taxonomy and Future
                                  Directions . . . . . . . . . . . . . . . 217:1--217:??
            Farkhanda Zafar and   
          Hasan Ali Khattak and   
            Moayad Aloqaily and   
                Rasheed Hussain   Carpooling in Connected and Autonomous
                                  Vehicles: Current Solutions and Future
                                  Directions . . . . . . . . . . . . . . . 218:1--218:??
             Md Mahbub Alam and   
                 Luis Torgo and   
                   Albert Bifet   A Survey on Spatio-temporal Data
                                  Analytics Systems  . . . . . . . . . . . 219:1--219:??
                   Zijun Li and   
                Linsong Guo and   
               Jiagan Cheng and   
                  Quan Chen and   
               Bingsheng He and   
                      Minyi Guo   The Serverless Computing Survey: a
                                  Technical Primer for Design Architecture 220:1--220:??
                   Peng Liu and   
                 Lizhe Wang and   
               Rajiv Ranjan and   
                  Guojin He and   
                       Lei Zhao   A Survey on Active Deep Learning: From
                                  Model Driven to Data Driven  . . . . . . 221:1--221:??

ACM Computing Surveys
Volume 54, Number 11s, January, 2022

            Anupama Mampage and   
       Shanika Karunasekera and   
                 Rajkumar Buyya   A Holistic View on Resource Management
                                  in Serverless Computing Environments:
                                  Taxonomy and Future Directions . . . . . 222:1--222:??
       Pablo Sánchez and   
      Alejandro Bellogín   Point-of-Interest Recommender Systems
                                  Based on Location-Based Social Networks:
                                  a Survey from an Experimental
                                  Perspective  . . . . . . . . . . . . . . 223:1--223:??
       Paula Delgado-Santos and   
        Giuseppe Stragapede and   
             Ruben Tolosana and   
              Richard Guest and   
              Farzin Deravi and   
           Ruben Vera-Rodriguez   A Survey of Privacy Vulnerabilities of
                                  Mobile Device Sensors  . . . . . . . . . 224:1--224:??
           Hasini Witharana and   
                 Yangdi Lyu and   
            Subodha Charles and   
                 Prabhat Mishra   A Survey on Assertion-based Hardware
                                  Verification . . . . . . . . . . . . . . 225:1--225:??
           Fabian Fagerholm and   
           Michael Felderer and   
               Davide Fucci and   
   Michael Unterkalmsteiner and   
          Bogdan Marculescu and   
             Markus Martini and   
Lars Göran Wallgren Tengberg and   
               Robert Feldt and   
       Bettina Lehtelä and   
Balázs Nagyváradi and   
                  Jehan Khattak   Cognition in Software Engineering: a
                                  Taxonomy and Survey of a Half-Century of
                                  Research . . . . . . . . . . . . . . . . 226:1--226:??
                  Wenhao Yu and   
              Chenguang Zhu and   
                 Zaitang Li and   
                 Zhiting Hu and   
               Qingyun Wang and   
                    Heng Ji and   
                     Meng Jiang   A Survey of Knowledge-enhanced Text
                                  Generation . . . . . . . . . . . . . . . 227:1--227:??
             Harindu Korala and   
   Dimitrios Georgakopoulos and   
     Prem Prakash Jayaraman and   
                     Ali Yavari   A Survey of Techniques for Fulfilling
                                  the Time-Bound Requirements of
                                  Time-Sensitive IoT Applications  . . . . 228:1--228:??
                Hakan Kayan and   
              Matthew Nunes and   
                  Omer Rana and   
                Pete Burnap and   
                 Charith Perera   Cybersecurity of Industrial
                                  Cyber-Physical Systems: a Review . . . . 229:1--229:??
               Xiaogang Zhu and   
                  Sheng Wen and   
              Seyit Camtepe and   
                     Yang Xiang   Fuzzing: a Survey for Roadmap  . . . . . 230:1--230:??
Jakub \vZádn\'ìk and   
       Markku Mäkitalo and   
                Jarno Vanne and   
Pekka Jääskeläinen   Image and Video Coding Techniques for
                                  Ultra-low Latency  . . . . . . . . . . . 231:1--231:??
       Anirudh Chandramouli and   
           Ashish Choudhury and   
                   Arpita Patra   A Survey on Perfectly Secure Verifiable
                                  Secret-sharing . . . . . . . . . . . . . 232:1--232:??
               Bushra Jamil and   
               Humaira Ijaz and   
          Mohammad Shojafar and   
               Kashif Munir and   
                 Rajkumar Buyya   Resource Allocation and Task Scheduling
                                  in Fog Computing and Internet of
                                  Everything Environments: a Taxonomy,
                                  Review, and Future Directions  . . . . . 233:1--233:??
                Ajay Mittal and   
             Sabrina Dhalla and   
               Savita Gupta and   
                   Aastha Gupta   Automated Analysis of Blood Smear Images
                                  for Leukemia Detection: a Comprehensive
                                  Review . . . . . . . . . . . . . . . . . 234:1--234:??
               Hongsheng Hu and   
               Zoran Salcic and   
                 Lichao Sun and   
             Gillian Dobbie and   
               Philip S. Yu and   
                    Xuyun Zhang   Membership Inference Attacks on Machine
                                  Learning: a Survey . . . . . . . . . . . 235:1--235:??
          Rajeev Muralidhar and   
      Renata Borovica-Gajic and   
                 Rajkumar Buyya   Energy Efficient Computing Systems:
                                  Architectures, Abstractions and Modeling
                                  to Techniques and Standards  . . . . . . 236:1--236:??
         Valeria Cardellini and   
        Francesco Lo Presti and   
            Matteo Nardelli and   
           Gabriele Russo Russo   Runtime Adaptation of Data Stream
                                  Processing Systems: The State of the Art 237:1--237:??
                   Harun Oz and   
                 Ahmet Aris and   
                Albert Levi and   
              A. Selcuk Uluagac   A Survey on Ransomware: Evolution,
                                  Taxonomy, and Defense Solutions  . . . . 238:1--238:??
            Hossein Shafiei and   
             Ahmad Khonsari and   
                  Payam Mousavi   Serverless Computing: a Survey of
                                  Opportunities, Challenges, and
                                  Applications . . . . . . . . . . . . . . 239:1--239:??
               Sabah Suhail and   
            Rasheed Hussain and   
                Raja Jurdak and   
              Alma Oracevic and   
               Khaled Salah and   
           Choong Seon Hong and   
       Raimundas Matulevi\vcius   Blockchain-Based Digital Twins: Research
                                  Trends, Issues, and Future Challenges    240:1--240:??
      Matheus A. O. Ribeiro and   
      Fátima L. S. Nunes   Left Ventricle Segmentation in Cardiac
                                  MR: a Systematic Mapping of the Past
                                  Decade . . . . . . . . . . . . . . . . . 241:1--241:??
           Simone Antonelli and   
               Danilo Avola and   
               Luigi Cinque and   
          Donato Crisostomi and   
          Gian Luca Foresti and   
              Fabio Galasso and   
         Marco Raoul Marini and   
              Alessio Mecca and   
                Daniele Pannone   Few-Shot Object Detection: a Survey  . . 242:1--242:??
               Shengmei Liu and   
                 Xiaokun Xu and   
                  Mark Claypool   A Survey and Taxonomy of Latency
                                  Compensation Techniques for Network
                                  Computer Games . . . . . . . . . . . . . 243:1--243:??


ACM Computing Surveys
Volume 55, Number 1, January, 2023

                  Shuren Qi and   
                Yushu Zhang and   
                  Chao Wang and   
               Jiantao Zhou and   
                   Xiaochun Cao   A Survey of Orthogonal Moments for Image
                                  Representation: Theory, Implementation,
                                  and Evaluation . . . . . . . . . . . . . 1:1--1:??
               Kinza Sarwar and   
           Sira Yongchareon and   
                    Jian Yu and   
                Saeed Ur Rehman   A Survey on Privacy Preservation in
                                  Fog-Enabled Internet of Things . . . . . 2:1--2:??
            Fabrizio Cicala and   
              Weicheng Wang and   
               Tianhao Wang and   
                 Ninghui Li and   
              Elisa Bertino and   
               Faming Liang and   
                      Yang Yang   PURE: a Framework for Analyzing
                                  Proximity-based Contact Tracing
                                  Protocols  . . . . . . . . . . . . . . . 3:1--3:??
         Rodolfo Meneguette and   
           Robson De Grande and   
                  Jo Ueyama and   
     Geraldo P. Rocha Filho and   
                Edmundo Madeira   Vehicular Edge Computing: Architecture,
                                  Resource Management, Security, and
                                  Challenges . . . . . . . . . . . . . . . 4:1--4:??
                    Chao Yu and   
                 Jiming Liu and   
              Shamim Nemati and   
                   Guosheng Yin   Reinforcement Learning in Healthcare: a
                                  Survey . . . . . . . . . . . . . . . . . 5:1--5:??
                     Fan Xu and   
            Victor S. Sheng and   
                   Mingwen Wang   A Unified Perspective for Disinformation
                                  Detection and Truth Discovery in Social
                                  Sensing: a Survey  . . . . . . . . . . . 6:1--6:??
          Massimiliano Luca and   
           Gianni Barlacchi and   
                Bruno Lepri and   
                Luca Pappalardo   A Survey on Deep Learning for Human
                                  Mobility . . . . . . . . . . . . . . . . 7:1--7:??
    Gabriel Resende Machado and   
        Eugênio Silva and   
    Ronaldo Ribeiro Goldschmidt   Adversarial Machine Learning in Image
                                  Classification: a Survey Toward the
                                  Defender's Perspective . . . . . . . . . 8:1--8:??
             Abhishek Hazra and   
            Mainak Adhikari and   
           Tarachand Amgoth and   
        Satish Narayana Srirama   A Comprehensive Survey on
                                  Interoperability for IIoT: Taxonomy,
                                  Standards, and Future Directions . . . . 9:1--9:??
       Claudio D. T. Barros and   
Matheus R. F. Mendonça and   
             Alex B. Vieira and   
                  Artur Ziviani   A Survey on Embedding Dynamic Graphs . . 10:1--10:??
           Viktor Rosenfeld and   
       Sebastian Breß and   
                   Volker Markl   Query Processing on Heterogeneous
                                  CPU/GPU Systems  . . . . . . . . . . . . 11:1--11:??
           Giannis Bekoulis and   
 Christina Papagiannopoulou and   
              Nikos Deligiannis   A Review on Fact Extraction and
                                  Verification . . . . . . . . . . . . . . 12:1--12:??
               Junjun Jiang and   
              Chenyang Wang and   
               Xianming Liu and   
                       Jiayi Ma   Deep Learning-based Face
                                  Super-resolution: a Survey . . . . . . . 13:1--13:??
                   Wenbo Ge and   
            Pooia Lalbakhsh and   
                 Leigh Isai and   
              Artem Lenskiy and   
                 Hanna Suominen   Neural Network-Based Financial
                                  Volatility Forecasting: a Systematic
                                  Review . . . . . . . . . . . . . . . . . 14:1--14:??
                 Deqiang Li and   
                  Qianmu Li and   
         Yanfang (Fanny) Ye and   
                    Shouhuai Xu   Arms Race in Adversarial Malware
                                  Detection: a Survey  . . . . . . . . . . 15:1--15:??
                Roberto Amadini   A Survey on String Constraint Solving    16:1--16:??
          Christopher Brant and   
           Prakash Shrestha and   
        Benjamin Mixon-Baca and   
                 Kejun Chen and   
             Said Varlioglu and   
              Nelly Elsayed and   
                   Yier Jin and   
          Jedidiah Crandall and   
               Daniela Oliveira   Challenges and Opportunities for
                                  Practical and Effective Dynamic
                                  Information Flow Tracking  . . . . . . . 17:1--17:??
    Alison Fernandez Blanco and   
           Alexandre Bergel and   
    Juan Pablo Sandoval Alcocer   Software Visualizations to Analyze
                                  Memory Consumption: a Literature Review  18:1--18:??
              Saed Alrabaee and   
             Mourad Debbabi and   
                    Lingyu Wang   A Survey of Binary Code Fingerprinting
                                  Approaches: Taxonomy, Methodologies, and
                                  Features . . . . . . . . . . . . . . . . 19:1--19:??
                  Yupeng Hu and   
               Wenxin Kuang and   
                  Zheng Qin and   
                   Kenli Li and   
              Jiliang Zhang and   
                Yansong Gao and   
                  Wenjia Li and   
                       Keqin Li   Artificial Intelligence Security:
                                  Threats and Countermeasures  . . . . . . 20:1--20:??
               Alessio Rugo and   
         Claudio A. Ardagna and   
                 Nabil El Ioini   A Security Review in the UAVNet Era:
                                  Threats, Countermeasures, and Gap
                                  Analysis . . . . . . . . . . . . . . . . 21:1--21:??
                Huacheng Li and   
                 Chunhe Xia and   
                Tianbo Wang and   
                  Sheng Wen and   
                  Chao Chen and   
                     Yang Xiang   Capturing Dynamics of Information
                                  Diffusion in SNS: a Survey of
                                  Methodology and Techniques . . . . . . . 22:1--22:??
          Thanh Tuan Nguyen and   
            Thanh Phuong Nguyen   A Comprehensive Taxonomy of Dynamic
                                  Texture Representation . . . . . . . . . 23:1--23:??

ACM Computing Surveys
Volume 55, Number 2, March, 2023

          Federico Ciccozzi and   
             Lorenzo Addazi and   
   Sara Abbaspour Asadollah and   
          Björn Lisper and   
            Abu Naser Masud and   
                    Saad Mubeen   A Comprehensive Exploration of Languages
                                  for Parallel Computing . . . . . . . . . 24:1--24:??
              Zhao-Rong Lai and   
                  Haisheng Yang   A Survey on Gaps between Mean-Variance
                                  Approach and Exponential Growth Rate
                                  Approach for Portfolio Optimization  . . 25:1--25:??
              Ananya B. Sai and   
     Akash Kumar Mohankumar and   
               Mitesh M. Khapra   A Survey of Evaluation Metrics Used for
                                  NLG Systems  . . . . . . . . . . . . . . 26:1--26:??
         Manzoor Ahmed Khan and   
            Hesham El Sayed and   
               Sumbal Malik and   
                  Talha Zia and   
                 Jalal Khan and   
              Najla Alkaabi and   
                Henry Ignatious   Level-5 Autonomous Driving-Are We There
                                  Yet? A Review of Research Literature . . 27:1--27:??
    Oluwamayowa Ade Adeleke and   
            Nicholas Bastin and   
                   Deniz Gurkan   Network Traffic Generation: a Survey and
                                  Methodology  . . . . . . . . . . . . . . 28:1--28:??
                Breno Costa and   
              Joao Bachiega and   
Leonardo Rebouças de Carvalho and   
           Aleteia P. F. Araujo   Orchestration in Fog Computing: a
                                  Comprehensive Survey . . . . . . . . . . 29:1--29:??
             Nuha Aldausari and   
               Arcot Sowmya and   
              Nadine Marcus and   
              Gelareh Mohammadi   Video Generative Adversarial Networks: a
                                  Review . . . . . . . . . . . . . . . . . 30:1--30:??
                Libing Deng and   
                  Guoqi Xie and   
                   Hong Liu and   
                  Yunbo Han and   
                   Renfa Li and   
                       Keqin Li   A Survey of Real-Time Ethernet Modeling
                                  and Design Methodologies: From AVB to
                                  TSN  . . . . . . . . . . . . . . . . . . 31:1--31:??
                 Omar Hasan and   
              Lionel Brunie and   
                  Elisa Bertino   Privacy-Preserving Reputation Systems
                                  Based on Blockchain and Other
                                  Cryptographic Building Blocks: a Survey  32:1--32:??
             Tabinda Sarwar and   
          Sattar Seifollahi and   
               Jeffrey Chan and   
              Xiuzhen Zhang and   
            Vural Aksakalli and   
               Irene Hudson and   
             Karin Verspoor and   
               Lawrence Cavedon   The Secondary Use of Electronic Health
                                  Records for Data Mining: Data
                                  Characteristics and Challenges . . . . . 33:1--33:??
Claudio Filipi Gonçalves dos Santos and   
    Diego de Souza Oliveira and   
          Leandro A. Passos and   
Rafael Gonçalves Pires and   
 Daniel Felipe Silva Santos and   
       Lucas Pascotti Valem and   
         Thierry P. Moreira and   
  Marcos Cleison S. Santana and   
               Mateus Roder and   
              Jo Paulo Papa and   
                 Danilo Colombo   Gait Recognition Based on Deep Learning:
                                  a Survey . . . . . . . . . . . . . . . . 34:1--34:??
                   Qiao Jin and   
                 Zheng Yuan and   
             Guangzhi Xiong and   
                 Qianlan Yu and   
              Huaiyuan Ying and   
                Chuanqi Tan and   
                 Mosha Chen and   
             Songfang Huang and   
              Xiaozhong Liu and   
                       Sheng Yu   Biomedical Question Answering: a Survey
                                  of Approaches and Challenges . . . . . . 35:1--35:??
                  Yiqun Xie and   
             Shashi Shekhar and   
                         Yan Li   Statistically-Robust Clustering
                                  Techniques for Mapping Spatial Hotspots:
                                  a Survey . . . . . . . . . . . . . . . . 36:1--36:??
                 J. Alemany and   
                 E. Del Val and   
        A. García-Fornes   A Review of Privacy Decision-making
                                  Mechanisms in Online Social Networks . . 37:1--37:??
                Jingya Zhou and   
                   Ling Liu and   
                  Wenqi Wei and   
                     Jianxi Fan   Network Representation Learning: From
                                  Preprocessing, Feature Extraction to
                                  Node Embedding . . . . . . . . . . . . . 38:1--38:??
              Davinder Kaur and   
              Suleyman Uslu and   
        Kaley J. Rittichier and   
                  Arjan Durresi   Trustworthy Artificial Intelligence: a
                                  Review . . . . . . . . . . . . . . . . . 39:1--39:??
                 Conor Fahy and   
            Shengxiang Yang and   
                  Mario Gongora   Scarcity of Labels in Non-Stationary
                                  Data Streams: a Survey . . . . . . . . . 40:1--40:??
José Marcelo Fernandes and   
      Jorge Sá Silva and   
     André Rodrigues and   
               Fernando Boavida   A Survey of Approaches to Unobtrusive
                                  Sensing of Humans  . . . . . . . . . . . 41:1--41:??
              David Rolnick and   
             Priya L. Donti and   
              Lynn H. Kaack and   
            Kelly Kochanski and   
          Alexandre Lacoste and   
              Kris Sankaran and   
         Andrew Slavin Ross and   
    Nikola Milojevic-Dupont and   
             Natasha Jaques and   
         Anna Waldman-Brown and   
   Alexandra Sasha Luccioni and   
              Tegan Maharaj and   
            Evan D. Sherwin and   
      S. Karthik Mukkavilli and   
          Konrad P. Kording and   
             Carla P. Gomes and   
               Andrew Y. Ng and   
             Demis Hassabis and   
              John C. Platt and   
             Felix Creutzig and   
            Jennifer Chayes and   
                  Yoshua Bengio   Tackling Climate Change with Machine
                                  Learning . . . . . . . . . . . . . . . . 42:1--42:??
              Shallu Sharma and   
            Pravat Kumar Mandal   A Comprehensive Report on Machine
                                  Learning-based Early Detection of
                                  Alzheimer's Disease using Multi-modal
                                  Neuroimaging Data  . . . . . . . . . . . 43:1--43:??
              Ankur O. Bang and   
            Udai Pratap Rao and   
            Pallavi Kaliyar and   
                    Mauro Conti   Assessment of Routing Attacks and
                                  Mitigation Techniques with RPL Control
                                  Messages: a Survey . . . . . . . . . . . 44:1--44:??

ACM Computing Surveys
Volume 55, Number 3, April, 2023

         Sanjay Kumar Anand and   
                   Suresh Kumar   Experimental Comparisons of Clustering
                                  Approaches for Data Representation . . . 45:1--45:??
     Tasniem Nasser Alyahya and   
    Mohamed El Bachir Menai and   
                Hassan Mathkour   On the Structure of the Boolean
                                  Satisfiability Problem: a Survey . . . . 46:1--46:??
     Marcos Roberto e Souza and   
     Helena de Almeida Maia and   
                  Helio Pedrini   Survey on Digital Video Stabilization:
                                  Concepts, Methods, and Challenges  . . . 47:1--47:??
              Tukaram Muske and   
           Alexander Serebrenik   Survey of Approaches for Postprocessing
                                  of Static Analysis Alarms  . . . . . . . 48:1--48:??
         Danula Hettiachchi and   
          Vassilis Kostakos and   
                Jorge Goncalves   A Survey on Task Assignment in
                                  Crowdsourcing  . . . . . . . . . . . . . 49:1--49:??
            Raj Mohan Singh and   
        Lalit Kumar Awasthi and   
                    Geeta Sikka   Towards Metaheuristic Scheduling
                                  Techniques in Cloud and Fog: an
                                  Extensive Taxonomic Review . . . . . . . 50:1--50:??
               Dana Pessach and   
                   Erez Shmueli   A Review on Fairness in Machine Learning 51:1--51:??
                Chenning Li and   
                    Zhichao Cao   LoRa Networking Techniques for
                                  Large-scale and Long-term IoT: a
                                  Down-to-top Survey . . . . . . . . . . . 52:1--52:??
          Alexander Plopski and   
              Teresa Hirzle and   
              Nahal Norouzi and   
                  Long Qian and   
                Gerd Bruder and   
                Tobias Langlotz   The Eye in Extended Reality: a Survey on
                                  Gaze Interaction and Eye Tracking in
                                  Head-worn Extended Reality . . . . . . . 53:1--53:??
                     Nan Wu and   
                       Yuan Xie   A Survey of Machine Learning for
                                  Computer Architecture and Systems  . . . 54:1--54:??
           Thomas Reisinger and   
              Isabel Wagner and   
            Eerke Albert Boiten   Security and Privacy in Unified
                                  Communication  . . . . . . . . . . . . . 55:1--55:??
                   Ruiqi Li and   
                 Xiang Zhao and   
           Marie-Francine Moens   A Brief Overview of Universal Sentence
                                  Representation Methods: a Linguistic
                                  View . . . . . . . . . . . . . . . . . . 56:1--56:??
                    Huan Li and   
                     Hua Lu and   
        Christian S. Jensen and   
                    Bo Tang and   
          Muhammad Aamir Cheema   Spatial Data Quality in the Internet of
                                  Things: Management, Exploitation, and
                                  Prospects  . . . . . . . . . . . . . . . 57:1--57:??
            Dina G. Mahmoud and   
            Vincent Lenders and   
           Mirjana Stojilovi\'c   Electrical-Level Attacks on CPUs, FPGAs,
                                  and GPUs: Survey and Implications in the
                                  Heterogeneous Era  . . . . . . . . . . . 58:1--58:??
             Jacopo Soldani and   
                  Antonio Brogi   Anomaly Detection and Failure Root Cause
                                  Analysis in (Micro) Service-Based Cloud
                                  Applications: a Survey . . . . . . . . . 59:1--59:??
             Dinh C. Nguyen and   
             Quoc-Viet Pham and   
        Pubudu N. Pathirana and   
                  Ming Ding and   
          Aruna Seneviratne and   
                 Zihuai Lin and   
              Octavia Dobre and   
                  Won-Joo Hwang   Federated Learning for Smart Healthcare:
                                  a Survey . . . . . . . . . . . . . . . . 60:1--60:??
             Anna Berenberg and   
                    Brad Calder   Deployment Archetypes for Cloud
                                  Applications . . . . . . . . . . . . . . 61:1--61:??
             Voica Gavrilut and   
          Aleksander Pruski and   
    Michael Stübert Berger   Constructive or Optimized: an Overview
                                  of Strategies to Design Networks for
                                  Time-Critical Applications . . . . . . . 62:1--62:??
              Susanne Barth and   
                 Dan Ionita and   
                  Pieter Hartel   Understanding Online Privacy --- a
                                  Systematic Review of Privacy
                                  Visualizations and Privacy by Design
                                  Guidelines . . . . . . . . . . . . . . . 63:1--63:??
                   Longbing Cao   AI in Finance: Challenges, Techniques,
                                  and Opportunities  . . . . . . . . . . . 64:1--64:??

ACM Computing Surveys
Volume 55, Number 4, May, 2023

            Gianni Brauwers and   
              Flavius Frasincar   A Survey on Aspect-Based Sentiment
                                  Classification . . . . . . . . . . . . . 65:1--65:??
              Jared Willard and   
                Xiaowei Jia and   
                Shaoming Xu and   
          Michael Steinbach and   
                    Vipin Kumar   Integrating Scientific Knowledge with
                                  Machine Learning for Engineering and
                                  Environmental Systems  . . . . . . . . . 66:1--66:??
           Daniel S. Santos and   
     Brauner R. N. Oliveira and   
                Rick Kazman and   
              Elisa Y. Nakagawa   Evaluation of Systems-of-Systems
                                  Software Architectures: State of the Art
                                  and Future Perspectives  . . . . . . . . 67:1--67:??
   Thiago L. T. da Silveira and   
          Paulo G. L. Pinto and   
  Jeffri Murrugarra-Llerena and   
         Cláudio R. Jung   $3$D Scene Geometry Estimation from
                                  360${}^\circ $ Imagery: a Survey . . . . 68:1--68:??
            Alessio Ferrari and   
            Maurice H. Ter Beek   Formal Methods in Railways: a Systematic
                                  Mapping Study  . . . . . . . . . . . . . 69:1--69:??
                 Youyang Qu and   
            Md Palash Uddin and   
               Chenquan Gan and   
                 Yong Xiang and   
              Longxiang Gao and   
                  John Yearwood   Blockchain-enabled Federated Learning: a
                                  Survey . . . . . . . . . . . . . . . . . 70:1--70:??
   Marios Evangelos Kanakis and   
              Ramin Khalili and   
                       Lin Wang   Machine Learning for Computer Systems
                                  and Networking: a Survey . . . . . . . . 71:1--71:??
               Javier Troya and   
              Sergio Segura and   
       Lola Burgueño and   
                  Manuel Wimmer   Model Transformation Testing and
                                  Debugging: a Survey  . . . . . . . . . . 72:1--72:??
                 Arif Husen and   
 Muhammad Hasanain Chaudary and   
                   Farooq Ahmad   A Survey on Requirements of Future
                                  Intelligent Networks: Solutions and
                                  Future Research Directions . . . . . . . 73:1--73:??
                 Yingan Cui and   
                     Xue Li and   
                 Junhuai Li and   
               Huaijun Wang and   
                  Xiaogang Chen   A Survey of Sampling Method for Social
                                  Media Embeddedness Relationship  . . . . 74:1--74:??
        Heitor Murilo Gomes and   
             Maciej Grzenda and   
              Rodrigo Mello and   
                 Jesse Read and   
       Minh Huong Le Nguyen and   
                   Albert Bifet   A Survey on Semi-supervised Learning for
                                  Delayed Partially Labelled Data Streams  75:1--75:??
             Shouyong Jiang and   
                   Juan Zou and   
            Shengxiang Yang and   
                        Xin Yao   Evolutionary Dynamic Multi-objective
                                  Optimisation: a Survey . . . . . . . . . 76:1--76:??
            Rabindra Lamsal and   
              Aaron Harwood and   
           Maria Rodriguez Read   Socially Enhanced Situation Awareness
                                  from Microblogs Using Artificial
                                  Intelligence: a Survey . . . . . . . . . 77:1--77:??
Krishna Teja Chitty-Venkata and   
                 Arun K. Somani   Neural Architecture Search Survey: a
                                  Hardware Perspective . . . . . . . . . . 78:1--78:??
                   Xiang Li and   
               Yazhou Zhang and   
              Prayag Tiwari and   
                 Dawei Song and   
                     Bin Hu and   
               Meihong Yang and   
               Zhigang Zhao and   
               Neeraj Kumar and   
                Pekka Marttinen   EEG Based Emotion Recognition: a
                                  Tutorial and Review  . . . . . . . . . . 79:1--79:??
                     Wu Liu and   
                   Qian Bao and   
                     Yu Sun and   
                        Tao Mei   Recent Advances of Monocular $2$D and
                                  $3$D Human Pose Estimation: a Deep
                                  Learning Perspective . . . . . . . . . . 80:1--80:??
                Zhaoxin Fan and   
                  Yazhi Zhu and   
                   Yulin He and   
                     Qi Sun and   
                Hongyan Liu and   
                         Jun He   Deep Learning on Monocular Object Pose
                                  Detection and Tracking: a Comprehensive
                                  Overview . . . . . . . . . . . . . . . . 81:1--81:??
          Matthew J. Vowels and   
        Necati Cihan Camgoz and   
                 Richard Bowden   D'ya Like DAGs? A Survey on Structure
                                  Learning and Causal Discovery  . . . . . 82:1--82:??
         Giorgos Armeniakos and   
          Georgios Zervakis and   
          Dimitrios Soudris and   
               Jörg Henkel   Hardware Approximate Techniques for Deep
                                  Neural Network Accelerators: a Survey    83:1--83:??
                   Chen Yan and   
                  Xiaoyu Ji and   
                   Kai Wang and   
              Qinhong Jiang and   
                  Zizhi Jin and   
                     Wenyuan Xu   A Survey on Voice Assistant Security:
                                  Attacks and Countermeasures  . . . . . . 84:1--84:??
           Elena Almaraz Luengo   Gamma Pseudo Random Number Generators    85:1--85:33
              Anubhab Baksi and   
              Shivam Bhasin and   
               Jakub Breier and   
               Dirmanto Jap and   
                    Dhiman Saha   A Survey on Fault Attacks on Symmetric
                                  Key Cryptosystems  . . . . . . . . . . . 86:1--86:??

ACM Computing Surveys
Volume 55, Number 5, June, 2023

             Kalia Orphanou and   
          Jahna Otterbacher and   
        Styliani Kleanthous and   
      Khuyagbaatar Batsuren and   
         Fausto Giunchiglia and   
            Veronika Bogina and   
         Avital Shulner Tal and   
               Alan Hartman and   
                    Tsvi Kuflik   Mitigating Bias in Algorithmic Systems
                                  --- a Fish-eye View  . . . . . . . . . . 87:1--87:??
                 Jiang Xiao and   
                Huichuwu Li and   
                  Minrui Wu and   
                    Hai Jin and   
              M. Jamal Deen and   
                   Jiannong Cao   A Survey on Wireless Device-free Human
                                  Sensing: Application Scenarios, Current
                                  Solutions, and Open Issues . . . . . . . 88:1--88:??
                    Yuan He and   
                Xiuzhen Guo and   
             Xiaolong Zheng and   
                   Zihao Yu and   
                  Jia Zhang and   
              Haotian Jiang and   
                     Xin Na and   
                 Jiacheng Zhang   Cross-Technology Communication for the
                                  Internet of Things: a Survey . . . . . . 89:1--89:??
        Yoshitomo Matsubara and   
             Marco Levorato and   
            Francesco Restuccia   Split Computing and Early Exiting for
                                  Deep Learning Applications: Survey and
                                  Research Challenges  . . . . . . . . . . 90:1--90:??
                Quim Motger and   
              Xavier Franch and   
                    Jordi Marco   Software-Based Dialogue Systems: Survey,
                                  Taxonomy, and Challenges . . . . . . . . 91:1--91:??
               George A. Vouros   Explainable Deep Reinforcement Learning:
                                  State of the Art and Challenges  . . . . 92:1--92:??
            Bushra Alhijawi and   
              Arafat Awajan and   
                  Salam Fraihat   Survey on the Objectives of Recommender
                                  Systems: Measures, Solutions, Evaluation
                                  Methodology, and New Perspectives  . . . 93:1--93:??
              Amina Kammoun and   
                  Rim Slama and   
                 Hedi Tabia and   
                 Tarek Ouni and   
                    Mohmed Abid   Generative Adversarial Networks for Face
                                  Generation: a Survey . . . . . . . . . . 94:1--94:??
        Amir-Hossein Karimi and   
              Gilles Barthe and   
    Bernhard Schölkopf and   
                  Isabel Valera   A Survey of Algorithmic Recourse:
                                  Contrastive Explanations and
                                  Consequential Recommendations  . . . . . 95:1--95:??
               Manal Alamir and   
                 Manal Alghamdi   The Role of Generative Adversarial
                                  Network in Medical Image Analysis: an
                                  In-depth Survey  . . . . . . . . . . . . 96:1--96:??
                  Shiwen Wu and   
                    Fei Sun and   
               Wentao Zhang and   
                     Xu Xie and   
                        Bin Cui   Graph Neural Networks in Recommender
                                  Systems: a Survey  . . . . . . . . . . . 97:1--97:??
      Fabio Valerio Massoli and   
             Lucia Vadicamo and   
             Giuseppe Amato and   
                Fabrizio Falchi   A Leap among Quantum Computing and
                                  Quantum Neural Networks: a Survey  . . . 98:1--98:??
                 Pedro Cruz and   
               Nadjib Achir and   
           Aline Carneiro Viana   On the Edge of the Deployment: a Survey
                                  on Multi-access Edge Computing . . . . . 99:1--99:??
             Triet H. M. Le and   
               Huaming Chen and   
                   M. Ali Babar   A Survey on Data-driven Software
                                  Vulnerability Assessment and
                                  Prioritization . . . . . . . . . . . . . 100:1--100:??
               Darren Yates and   
               Md Zahidul Islam   Data Mining on Smartphones: an
                                  Introduction and Survey  . . . . . . . . 101:1--101:??
                  Congbo Ma and   
             Wei Emma Zhang and   
                 Mingyu Guo and   
                    Hu Wang and   
                  Quan Z. Sheng   Multi-document Summarization via Deep
                                  Learning Techniques: a Survey  . . . . . 102:1--102:??
              Julia El Zini and   
                  Mariette Awad   On the Explainability of Natural
                                  Language Processing Deep Models  . . . . 103:1--103:??
                 Hansoo Lee and   
             Joonyoung Park and   
                     Uichin Lee   A Systematic Survey on Android API Usage
                                  for Data-driven Analytics with
                                  Smartphones  . . . . . . . . . . . . . . 104:1--104:??
                Zhiyan Chen and   
                 Jinxin Liu and   
                    Yu Shen and   
               Murat Simsek and   
             Burak Kantarci and   
         Hussein T. Mouftah and   
                   Petar Djukic   Machine Learning-Enabled IoT Security:
                                  Open Issues and Challenges Under
                                  Advanced Persistent Threats  . . . . . . 105:1--105:??
         Emanuele Del Sozzo and   
          Davide Conficconi and   
               Alberto Zeni and   
              Mirko Salaris and   
           Donatella Sciuto and   
          Marco D. Santambrogio   Pushing the Level of Abstraction of
                                  Digital System Design: a Survey on How
                                  to Program FPGAs . . . . . . . . . . . . 106:1--106:??
          Hooman Alavizadeh and   
        Julian Jang-Jaccard and   
          Simon Yusuf Enoch and   
            Harith Al-Sahaf and   
                  Ian Welch and   
           Seyit A. Camtepe and   
              Dan Dongseong Kim   A Survey on Cyber Situation-awareness
                                  Systems: Framework, Techniques, and
                                  Insights . . . . . . . . . . . . . . . . 107:1--107:??
     Trivikram Muralidharan and   
                Aviad Cohen and   
                 Noa Gerson and   
                     Nir Nissim   File Packing from the Malware
                                  Perspective: Techniques, Analysis
                                  Approaches, and Directions for
                                  Enhancements . . . . . . . . . . . . . . 108:1--108:??

ACM Computing Surveys
Volume 55, Number 6, July, 2023

                     Yi Tay and   
           Mostafa Dehghani and   
                 Dara Bahri and   
                 Donald Metzler   Efficient Transformers: a Survey . . . . 109:1--109:??
             Mahdi Fahmideh and   
                John Grundy and   
               Aakash Ahmad and   
                   Jun Shen and   
                    Jun Yan and   
            Davoud Mougouei and   
                  Peng Wang and   
               Aditya Ghose and   
       Anuradha Gunawardana and   
               Uwe Aickelin and   
                   Babak Abedin   Engineering Blockchain-based Software
                                  Systems: Foundations, Survey, and Future
                                  Directions . . . . . . . . . . . . . . . 110:1--110:??
                Binglei Guo and   
                   Jiong Yu and   
                Dexian Yang and   
              Hongyong Leng and   
                       Bin Liao   Energy-Efficient Database Systems: a
                                  Systematic Survey  . . . . . . . . . . . 111:1--111:??
                 Shanto Roy and   
              Nazia Sharmin and   
            Jaime C. Acosta and   
    Christopher Kiekintveld and   
                    Aron Laszka   Survey and Taxonomy of Adversarial
                                  Reconnaissance Techniques  . . . . . . . 112:1--112:??
                    Dan Xia and   
                 Chun Jiang and   
                  Jiafu Wan and   
                  Jiong Jin and   
         Victor C. M. Leung and   
Miguel Martínez-García   Heterogeneous Network Access and Fusion
                                  in Smart Factory: a Survey . . . . . . . 113:1--113:??
             Andrei Paleyes and   
         Raoul-Gabriel Urma and   
               Neil D. Lawrence   Challenges in Deploying Machine
                                  Learning: a Survey of Case Studies . . . 114:1--114:??
 Guilherme Gonçalves and   
                Hugo Coelho and   
             Pedro Monteiro and   
                Miguel Melo and   
                 Maximino Bessa   Systematic Review of Comparative Studies
                                  of the Impact of Realism in Immersive
                                  Virtual Experiences  . . . . . . . . . . 115:1--115:??
     Alexander Schäfer and   
                  Gerd Reis and   
                Didier Stricker   A Survey on Synchronous Augmented,
                                  Virtual, and Mixed Reality Remote
                                  Collaboration Systems  . . . . . . . . . 116:1--116:??
              Meike Zehlike and   
                    Ke Yang and   
              Julia Stoyanovich   Fairness in Ranking, Part II:
                                  Learning-to-Rank and Recommender Systems 117:1--117:??
              Meike Zehlike and   
                    Ke Yang and   
              Julia Stoyanovich   Fairness in Ranking, Part I: Score-Based
                                  Ranking  . . . . . . . . . . . . . . . . 118:1--118:??
                 Hakan Erdogmus   Bayesian Hypothesis Testing Illustrated:
                                  an Introduction for Software Engineering
                                  Researchers  . . . . . . . . . . . . . . 119:1--119:??
             Luke K. Topham and   
                 Wasiq Khan and   
           Dhiya Al-Jumeily and   
                   Abir Hussain   Human Body Pose Estimation for Gait
                                  Identification: a Comprehensive Survey
                                  of Datasets and Models . . . . . . . . . 120:1--120:??
       Konstantinos Benidis and   
    Syama Sundar Rangapuram and   
          Valentin Flunkert and   
                Yuyang Wang and   
            Danielle Maddix and   
              Caner Turkmen and   
               Jan Gasthaus and   
   Michael Bohlke-Schneider and   
              David Salinas and   
             Lorenzo Stella and   
François-Xavier Aubet and   
             Laurent Callot and   
               Tim Januschowski   Deep Learning for Time Series
                                  Forecasting: Tutorial and Literature
                                  Survey . . . . . . . . . . . . . . . . . 121:1--121:??
          Jongkil Jay Jeong and   
          Yevhen Zolotavkin and   
                     Robin Doss   Examining the Current Status and
                                  Emerging Trends in Continuous
                                  Authentication Technologies through
                                  Citation Network Analysis  . . . . . . . 122:1--122:??
            Simon Parkinson and   
                      Saad Khan   A Survey on Empirical Security Analysis
                                  of Access-control Systems: a Real-world
                                  Perspective  . . . . . . . . . . . . . . 123:1--123:??
                Samuel Jero and   
               Nathan Burow and   
                 Bryan Ward and   
            Richard Skowyra and   
               Roger Khazan and   
              Howard Shrobe and   
                  Hamed Okhravi   TAG: Tagged Architecture Guide . . . . . 124:1--124:??
             Rodrigo Branco and   
                        Ben Lee   Cache-related Hardware Capabilities and
                                  Their Impact on Information Security . . 125:1--125:??
          Temitayo Olugbade and   
        Marta Bie\'nkiewicz and   
         Giulia Barbareschi and   
           Vincenzo D'amato and   
                 Luca Oneto and   
            Antonio Camurri and   
         Catherine Holloway and   
 Mårten Björkman and   
               Peter Keller and   
             Martin Clayton and   
   Amanda C. De C. Williams and   
               Nicolas Gold and   
           Cristina Becchio and   
            Beno\^\it Bardy and   
        Nadia Bianchi-Berthouze   Human Movement Datasets: an
                                  Interdisciplinary Scoping Review . . . . 126:1--126:??
               Johan Arcile and   
    Étienne André   Timed Automata as a Formalism for
                                  Expressing Security: a Survey on Theory
                                  and Practice . . . . . . . . . . . . . . 127:1--127:??
                    Lu Chen and   
                 Yunjun Gao and   
                  Xuan Song and   
                   Zheng Li and   
                  Yifan Zhu and   
                Xiaoye Miao and   
            Christian S. Jensen   Indexing Metric Spaces for Exact
                                  Similarity Search  . . . . . . . . . . . 128:1--128:??
              Kimiya Keyvan and   
            Jimmy Xiangji Huang   How to Approach Ambiguous Queries in
                                  Conversational Search: a Survey of
                                  Techniques, Approaches, Tools, and
                                  Challenges . . . . . . . . . . . . . . . 129:1--129:??
               Denis Kleyko and   
      Dmitri A. Rachkovskij and   
              Evgeny Osipov and   
                   Abbas Rahimi   A Survey on Hyperdimensional Computing
                                  aka Vector Symbolic Architectures, Part
                                  I: Models and Data Transformations . . . 130:1--130:??

ACM Computing Surveys
Volume 55, Number 7, July, 2023

        Lucas H. Sallaberry and   
                Romero Tori and   
      Fátima L. S. Nunes   Automatic Performance Assessment in
                                  Three-dimensional Interactive Haptic
                                  Medical Simulators: a Systematic Review  131:1--131:??
Siva Uday Sampreeth Chebolu and   
                Paolo Rosso and   
                Sudipta Kar and   
                 Thamar Solorio   Survey on Aspect Category Detection  . . 132:1--132:??
            Deepak Adhikari and   
                  Wei Jiang and   
                 Jinyu Zhan and   
                 Zhiyuan He and   
             Danda B. Rawat and   
               Uwe Aickelin and   
              Hadi A. Khorshidi   A Comprehensive Survey on Imputation of
                                  Missing Data in Internet of Things . . . 133:1--133:??
                 Zhibo Wang and   
                Jingjing Ma and   
                   Xue Wang and   
                  Jiahui Hu and   
                   Zhan Qin and   
                        Kui Ren   Threats to Training: a Survey of
                                  Poisoning Attacks and Defenses on
                                  Machine Learning Systems . . . . . . . . 134:1--134:??
           Michael Zipperle and   
           Florian Gottwalt and   
            Elizabeth Chang and   
                  Tharam Dillon   Provenance-based Intrusion Detection
                                  Systems: a Survey  . . . . . . . . . . . 135:1--135:??
                   Rong Han and   
                  Zheng Yan and   
               Xueqin Liang and   
               Laurence T. Yang   How Can Incentive Mechanisms and
                                  Blockchain Benefit with Each Other? A
                                  Survey . . . . . . . . . . . . . . . . . 136:1--136:??
                Joobeom Yun and   
          Fayozbek Rustamov and   
                 Juhwan Kim and   
                  Youngjoo Shin   Fuzzing of Embedded Systems: a Survey    137:1--137:??
          Carmen Carrión   Kubernetes Scheduling: Taxonomy, Ongoing
                                  Issues and Challenges  . . . . . . . . . 138:1--138:??
            Ahmed Benmoussa and   
  Chaker Abdelaziz Kerrache and   
          Nasreddine Lagraa and   
        Spyridon Mastorakis and   
         Abderrahmane Lakas and   
          Abdou El Karim Tahari   Interest Flooding Attacks in Named Data
                                  Networking: Survey of Existing
                                  Solutions, Open Issues, Requirements,
                                  and Future Directions  . . . . . . . . . 139:1--139:??
          Andreas L. Opdahl and   
            Tareq Al-Moslmi and   
       Duc-Tien Dang-Nguyen and   
Marc Gallofré Ocaña and   
      Bjòrnar Tessem and   
                    Csaba Veres   Semantic Knowledge Graphs for the News:
                                  a Review . . . . . . . . . . . . . . . . 140:1--140:??
                 Yudong Tao and   
                Chuang Yang and   
                Tianyi Wang and   
                Erik Coltey and   
                 Yanxiu Jin and   
                Yinghao Liu and   
                Renhe Jiang and   
                  Zipei Fan and   
                  Xuan Song and   
          Ryosuke Shibasaki and   
             Shu-Ching Chen and   
              Mei-Ling Shyu and   
                    Steven Luis   A Survey on Data-driven COVID-19 and
                                  Future Pandemic Management . . . . . . . 141:1--141:??
       Hoda Naghibijouybari and   
Esmaeil Mohammadian Koruyeh and   
              Nael Abu-Ghazaleh   Microarchitectural Attacks in
                                  Heterogeneous Systems: a Survey  . . . . 142:1--142:??
        Zhanna Sarsenbayeva and   
           Niels Van Berkel and   
            Eduardo Velloso and   
            Jorge Goncalves and   
              Vassilis Kostakos   Methodological Standards in
                                  Accessibility Research on Motor
                                  Impairments: a Survey  . . . . . . . . . 143:1--143:??
               Samuel Idowu and   
        Daniel Strüber and   
                Thorsten Berger   Asset Management in Machine Learning:
                                  State-of-research and State-of-practice  144:1--144:??
             M. Mehdi Afsar and   
             Trafford Crump and   
                    Behrouz Far   Reinforcement Learning based Recommender
                                  Systems: a Survey  . . . . . . . . . . . 145:1--145:??
               Markus Bayer and   
 Marc-André Kaufhold and   
               Christian Reuter   A Survey on Data Augmentation for Text
                                  Classification . . . . . . . . . . . . . 146:1--146:??
        Jon Perez-Cerrolaza and   
               Jaume Abella and   
          Leonidas Kosmidis and   
      Alejandro J. Calderon and   
          Francisco Cazorla and   
               Jose Luis Flores   GPU Devices for Safety-Critical Systems:
                                  a Survey . . . . . . . . . . . . . . . . 147:1--147:??
             Tung Minh Tran and   
                   Tu N. Vu and   
               Nguyen D. Vo and   
              Tam V. Nguyen and   
                   Khang Nguyen   Anomaly Analysis in Images and Videos: a
                                  Comprehensive Review . . . . . . . . . . 148:1--148:??
                     Li Liu and   
                    Fanzhang Li   A Survey on Dynamic Fuzzy Machine
                                  Learning . . . . . . . . . . . . . . . . 149:1--149:??
         William C. Sleeman and   
             Rishabh Kapoor and   
                  Preetam Ghosh   Multimodal Classification: Current
                                  Landscape, Taxonomy and Future
                                  Directions . . . . . . . . . . . . . . . 150:1--150:??
              Zeineb Rejiba and   
                Javad Chamanara   Custom Scheduling in Kubernetes: a
                                  Survey on Common Problems and Solution
                                  Approaches . . . . . . . . . . . . . . . 151:1--151:??
          Mohammad Goudarzi and   
      Marimuthu Palaniswami and   
                 Rajkumar Buyya   Scheduling IoT Applications in Edge and
                                  Fog Computing Environments: a Taxonomy
                                  and Future Directions  . . . . . . . . . 152:1--152:??

ACM Computing Surveys
Volume 55, Number 8, August, 2023

                    Yue Liu and   
  Chakkrit Tantithamthavorn and   
                      Li Li and   
                     Yepang Liu   Deep Learning for Android Malware
                                  Defenses: a Systematic Literature Review 153:1--153:??
               Huan Yee Koh and   
                  Jiaxin Ju and   
                   Ming Liu and   
                     Shirui Pan   An Empirical Survey on Long Document
                                  Summarization: Datasets, Models, and
                                  Metrics  . . . . . . . . . . . . . . . . 154:1--154:??
             Andreas Madsen and   
                 Siva Reddy and   
                 Sarath Chandar   Post-hoc Interpretability for Neural
                                  NLP: a Survey  . . . . . . . . . . . . . 155:1--155:??
                 Henry Weld and   
               Xiaoqi Huang and   
                  Siqu Long and   
                Josiah Poon and   
               Soyeon Caren Han   A Survey of Joint Intent Detection and
                                  Slot Filling Models in Natural Language
                                  Understanding  . . . . . . . . . . . . . 156:1--156:??
               Sina Mohseni and   
                Haotao Wang and   
               Chaowei Xiao and   
                 Zhiding Yu and   
             Zhangyang Wang and   
                     Jay Yadawa   Taxonomy of Machine Learning Safety: a
                                  Survey and Primer  . . . . . . . . . . . 157:1--157:??
         Nishan Gunawardena and   
     Jeewani Anupama Ginige and   
                  Bahman Javadi   Eye-tracking Technologies in Mobile
                                  Devices Using Edge Computing: a
                                  Systematic Review  . . . . . . . . . . . 158:1--158:??
             Tariq Abdullah and   
                    Ahmed Ahmet   Deep Learning in Sentiment Analysis:
                                  Recent Architectures . . . . . . . . . . 159:1--159:??
    Alberto Blanco-Justicia and   
       David Sánchez and   
       Josep Domingo-Ferrer and   
        Krishnamurty Muralidhar   A Critical Review on the Use (and
                                  Misuse) of Differential Privacy in
                                  Machine Learning . . . . . . . . . . . . 160:1--160:??
                    Chi Liu and   
               Tianqing Zhu and   
                  Jun Zhang and   
                    Wanlei Zhou   Privacy Intelligence: a Survey on Image
                                  Privacy in Online Social Networks  . . . 161:1--161:??
                Minzhao Lyu and   
  Hassan Habibi Gharakheili and   
                Vijay Sivaraman   A Survey on DNS Encryption: Current
                                  Development, Malware Misuse, and
                                  Inference Techniques . . . . . . . . . . 162:1--162:??
                 Shuai Zhou and   
                    Chi Liu and   
                  Dayong Ye and   
               Tianqing Zhu and   
                Wanlei Zhou and   
                   Philip S. Yu   Adversarial Attacks and Defenses in Deep
                                  Learning: From a Perspective of
                                  Cybersecurity  . . . . . . . . . . . . . 163:1--163:??
          Manuel A. Serrano and   
  José A. Cruz-Lemus and   
     Ricardo Perez-Castillo and   
                 Mario Piattini   Quantum Software Components and
                                  Platforms: Overview and Quality
                                  Assessment . . . . . . . . . . . . . . . 164:1--164:??
           Divya Velayudhan and   
              Taimur Hassan and   
            Ernesto Damiani and   
                 Naoufel Werghi   Recent Advances in Baggage Threat
                                  Detection: a Comprehensive and
                                  Systematic Survey  . . . . . . . . . . . 165:1--165:??
                 Zhiyi Tian and   
                    Lei Cui and   
                  Jie Liang and   
                        Shui Yu   A Comprehensive Survey on Poisoning
                                  Attacks and Countermeasures in Machine
                                  Learning . . . . . . . . . . . . . . . . 166:1--166:??
           Michael P. Heinl and   
            Simon Gölz and   
           Christoph Bösch   Remote Electronic Voting in Uncontrolled
                                  Environments: a Classifying Survey . . . 167:1--167:??
               Sarah Roscoe and   
               Minal Khatri and   
               Adam Voshall and   
             Surinder Batra and   
            Sukhwinder Kaur and   
                Jitender Deogun   Formal Concept Analysis Applications in
                                  Bioinformatics . . . . . . . . . . . . . 168:1--168:??
         Nilesh Chakraborty and   
               Jianqiang Li and   
         Victor C. M. Leung and   
              Samrat Mondal and   
                     Yi Pan and   
               Chengwen Luo and   
               Mithun Mukherjee   Honeyword-based Authentication
                                  Techniques for Protecting Passwords: a
                                  Survey . . . . . . . . . . . . . . . . . 169:1--169:??
               Eva Zangerle and   
                Christine Bauer   Evaluating Recommender Systems: Survey
                                  and Framework  . . . . . . . . . . . . . 170:1--170:??
André Lu\'ìs Barroso Almeida and   
     Joubert de Castro Lima and   
      Marco Antonio M. Carvalho   Systematic Literature Review on Parallel
                                  Trajectory-based Metaheuristics  . . . . 171:1--171:??
               Tianbao Yang and   
                    Yiming Ying   AUC Maximization in the Era of Big Data
                                  and AI: a Survey . . . . . . . . . . . . 172:1--172:??
                Chenhe Dong and   
                 Yinghui Li and   
                Haifan Gong and   
               Miaoxin Chen and   
                  Junxin Li and   
                  Ying Shen and   
                       Min Yang   A Survey of Natural Language Generation  173:1--173:??
                Linghe Kong and   
                 Jinlin Tan and   
               Junqin Huang and   
                Guihai Chen and   
             Shuaitian Wang and   
                     Xi Jin and   
                  Peng Zeng and   
              Muhammad Khan and   
                   Sajal K. Das   Edge-computing-driven Internet of
                                  Things: a Survey . . . . . . . . . . . . 174:1--174:??

ACM Computing Surveys
Volume 55, Number 9, September, 2023

               Denis Kleyko and   
         Dmitri Rachkovskij and   
              Evgeny Osipov and   
                   Abbas Rahimi   A Survey on Hyperdimensional Computing
                                  aka Vector Symbolic Architectures, Part
                                  II: Applications, Cognitive Models, and
                                  Challenges . . . . . . . . . . . . . . . 175:1--175:??
                  Daniel McDuff   Camera Measurement of Physiological
                                  Vital Signs  . . . . . . . . . . . . . . 176:1--176:??
                      Bo Li and   
                    Peng Qi and   
                     Bo Liu and   
                   Shuai Di and   
                 Jingen Liu and   
                 Jiquan Pei and   
                 Jinfeng Yi and   
                     Bowen Zhou   Trustworthy AI: From Principles to
                                  Practices  . . . . . . . . . . . . . . . 177:1--177:??
             Luca Benedetto and   
            Paolo Cremonesi and   
              Andrew Caines and   
              Paula Buttery and   
            Andrea Cappelli and   
            Andrea Giussani and   
                 Roberto Turrin   A Survey on Recent Approaches to
                                  Question Difficulty Estimation from Text 178:1--178:??
                  Kai North and   
            Marcos Zampieri and   
               Matthew Shardlow   Lexical Complexity Prediction: an
                                  Overview . . . . . . . . . . . . . . . . 179:1--179:??
           Nandita Pattnaik and   
                  Shujun Li and   
              Jason R. C. Nurse   A Survey of User Perspectives on
                                  Security and Privacy in a Home
                                  Networking Environment . . . . . . . . . 180:1--180:??
               Eun Hee Park and   
                 Veda C. Storey   Emotion Ontology Studies: a Framework
                                  for Expressing Feelings Digitally and
                                  its Application to Sentiment Analysis    181:1--181:??
                Lidia Fotia and   
     Flávia Delicato and   
              Giancarlo Fortino   Trust in Edge-based Internet of Things
                                  Architectures: State of the Art and
                                  Research Challenges  . . . . . . . . . . 182:1--182:??
                 Ron Bitton and   
                Nadav Maman and   
            Inderjeet Singh and   
            Satoru Momiyama and   
              Yuval Elovici and   
                   Asaf Shabtai   Evaluating the Cybersecurity Risk of
                                  Real-world, Machine Learning Production
                                  Systems  . . . . . . . . . . . . . . . . 183:1--183:??
                Haochen Hua and   
                  Yutong Li and   
                Tonghe Wang and   
               Nanqing Dong and   
                     Wei Li and   
                     Junwei Cao   Edge Computing with Artificial
                                  Intelligence: a Machine Learning
                                  Perspective  . . . . . . . . . . . . . . 184:1--184:??
         Takahito Yoshizawa and   
       Dave Singelée and   
       Jan Tobias Muehlberg and   
          Stephane Delbruel and   
            Amir Taherkordi and   
               Danny Hughes and   
                   Bart Preneel   A Survey of Security and Privacy Issues
                                  in V2X Communication Systems . . . . . . 185:1--185:??
        Athanasios Liatifis and   
   Panagiotis Sarigiannidis and   
         Vasileios Argyriou and   
                  Thomas Lagkas   Advancing SDN from OpenFlow to P4: a
                                  Survey . . . . . . . . . . . . . . . . . 186:1--186:??
          Janaka Senanayake and   
          Harsha Kalutarage and   
          Mhd Omar Al-Kadri and   
           Andrei Petrovski and   
                     Luca Piras   Android Source Code Vulnerability
                                  Detection: a Systematic Literature
                                  Review . . . . . . . . . . . . . . . . . 187:1--187:??
                   Meng Liu and   
                Liqiang Nie and   
               Yunxiao Wang and   
                  Meng Wang and   
                       Yong Rui   A Survey on Video Moment Localization    188:1--188:??
                  Jacky Cao and   
               Kit-Yung Lam and   
               Lik-Hang Lee and   
                 Xiaoli Liu and   
                    Pan Hui and   
                       Xiang Su   Mobile Augmented Reality: User
                                  Interfaces, Frameworks, and Intelligence 189:1--189:??
                 Junsik Sim and   
              Beomjoong Kim and   
                Kiseok Jeon and   
                 Moonho Joo and   
                  Jihun Lim and   
                Junghee Lee and   
         Kim-Kwang Raymond Choo   Technical Requirements and Approaches in
                                  Personal Data Control  . . . . . . . . . 190:1--190:??
                  Wael Issa and   
              Nour Moustafa and   
          Benjamin Turnbull and   
             Nasrin Sohrabi and   
                     Zahir Tari   Blockchain-Based Federated Learning for
                                  Securing Internet of Things: a
                                  Comprehensive Survey . . . . . . . . . . 191:1--191:??
              Hussain Ahmad and   
           Isuru Dharmadasa and   
               Faheem Ullah and   
             Muhammad Ali Babar   A Review on C3I Systems' Security:
                                  Vulnerabilities, Attacks, and
                                  Countermeasures  . . . . . . . . . . . . 192:1--192:??
                 Junhai Luo and   
                Zhiyan Wang and   
                   Ming Xia and   
                 Linyong Wu and   
                 Yuxin Tian and   
                        Yu Chen   Path Planning for UAV Communication
                                  Networks: Related Technologies,
                                  Solutions, and Opportunities . . . . . . 193:1--193:??
            Rudresh Dwivedi and   
                 Devam Dave and   
                   Het Naik and   
              Smiti Singhal and   
                  Rana Omer and   
              Pankesh Patel and   
                   Bin Qian and   
                 Zhenyu Wen and   
                 Tejal Shah and   
              Graham Morgan and   
                   Rajiv Ranjan   Explainable AI (XAI): Core Ideas,
                                  Techniques, and Solutions  . . . . . . . 194:1--194:??
                Pengfei Liu and   
                Weizhe Yuan and   
                  Jinlan Fu and   
             Zhengbao Jiang and   
            Hiroaki Hayashi and   
                  Graham Neubig   Pre-train, Prompt, and Predict: a
                                  Systematic Survey of Prompting Methods
                                  in Natural Language Processing . . . . . 195:1--195:??
                  Ping Wang and   
               Haichang Gao and   
                Xiaoyan Guo and   
              Chenxuan Xiao and   
                    Fuqi Qi and   
                      Zheng Yan   An Experimental Investigation of
                                  Text-based CAPTCHA Attacks and Their
                                  Robustness . . . . . . . . . . . . . . . 196:1--196:??

ACM Computing Surveys
Volume 55, Number 10, October, 2023

                Anna Rogers and   
               Matt Gardner and   
            Isabelle Augenstein   QA Dataset Explosion: a Taxonomy of NLP
                                  Resources for Question Answering and
                                  Reading Comprehension  . . . . . . . . . 197:1--197:??
            Giacomo Chiarot and   
              Claudio Silvestri   Time Series Compression Survey . . . . . 198:1--198:??
                Eoin Brophy and   
              Zhengwei Wang and   
                     Qi She and   
              Tomás Ward   Generative Adversarial Networks in Time
                                  Series: a Systematic Literature Review   199:1--199:??
           Fath U Min Ullah and   
        Mohammad S. Obaidat and   
                 Amin Ullah and   
              Khan Muhammad and   
             Mohammad Hijji and   
                 Sung Wook Baik   A Comprehensive Review on Vision-Based
                                  Violence Detection in Surveillance
                                  Videos . . . . . . . . . . . . . . . . . 200:1--200:??
                Yunhua Zhao and   
          Kostadin Damevski and   
                       Hui Chen   A Systematic Survey of Just-in-Time
                                  Software Defect Prediction . . . . . . . 201:1--201:??
  Antonio Quiña-Mera and   
            Pablo Fernandez and   
José Mar\'ìa Garc\'ìa and   
     Antonio Ruiz-Cortés   GraphQL: a Systematic Mapping Study  . . 202:1--202:??
             Nils Rethmeier and   
            Isabelle Augenstein   A Primer on Contrastive Pretraining in
                                  Language Processing: Methods, Lessons
                                  Learned, and Perspectives  . . . . . . . 203:1--203:??
Iyyakutti Iyappan Ganapathi and   
             Syed Sadaf Ali and   
              Surya Prakash and   
                Ngoc-Son Vu and   
                 Naoufel Werghi   A Survey of $3$D Ear Recognition
                                  Techniques . . . . . . . . . . . . . . . 204:1--204:??
            Jitendra Parmar and   
          Satyendra Chouhan and   
        Vaskar Raychoudhury and   
                Santosh Rathore   Open-world Machine Learning:
                                  Applications, Challenges, and
                                  Opportunities  . . . . . . . . . . . . . 205:1--205:??
               Rami Ibrahim and   
                M. Omair Shafiq   Explainable Convolutional Neural
                                  Networks: a Taxonomy, Review, and Future
                                  Directions . . . . . . . . . . . . . . . 206:1--206:??
                   Ling Sun and   
                   Yuan Rao and   
                 Lianwei Wu and   
              Xiangbo Zhang and   
                 Yuqian Lan and   
                  Ambreen Nazir   Fighting False Information from
                                  Propagation Process: a Survey  . . . . . 207:1--207:??
        Amirmohammad Pasdar and   
            Young Choon Lee and   
                   Zhongli Dong   Connect API with Blockchain: a Survey on
                                  Blockchain Oracle Implementation . . . . 208:1--208:??
              Fabio Catania and   
              Micol Spitale and   
                Franca Garzotto   Conversational Agents in Therapeutic
                                  Interventions for Neurodevelopmental
                                  Disorders: a Survey  . . . . . . . . . . 209:1--209:??
              Laure Gonnord and   
             Ludovic Henrio and   
               Lionel Morel and   
                Gabriel Radanne   A Survey on Parallelism and Determinism  210:1--210:??
                 Fatai Sado and   
              Chu Kiong Loo and   
            Wei Shiung Liew and   
            Matthias Kerzel and   
                 Stefan Wermter   Explainable Goal-driven Agents and
                                  Robots --- a Comprehensive Review  . . . 211:1--211:??
                Jou-An Chen and   
                    Wei Niu and   
                    Bin Ren and   
                Yanzhi Wang and   
                    Xipeng Shen   Survey: Exploiting Data Redundancy for
                                  Optimization of Deep Learning  . . . . . 212:1--212:??
            Luke Antonyshyn and   
         Jefferson Silveira and   
              Sidney Givigi and   
                Joshua Marshall   Multiple Mobile Robot Task and Motion
                                  Planning: a Survey . . . . . . . . . . . 213:1--213:??
Tainã Ribeiro de Oliveira and   
 Brenda Biancardi Rodrigues and   
     Matheus Moura da Silva and   
Rafael Antonio N. Spinassé and   
       Gabriel Giesen Ludke and   
   Mateus Ruy Soares Gaudio and   
Guilherme Iglesias Rocha Gomes and   
           Luan Guio Cotini and   
    Daniel da Silva Vargens and   
   Marcelo Queiroz Schimidt and   
Rodrigo Varejão Andreão and   
           Mário Mestria   Virtual Reality Solutions Employing
                                  Artificial Intelligence Methods: a
                                  Systematic Literature Review . . . . . . 214:1--214:??
     Muhammad Nouman Nafees and   
             Neetesh Saxena and   
            Alvaro Cardenas and   
          Santiago Grijalva and   
                    Pete Burnap   Smart Grid Cyber-Physical Situational
                                  Awareness of Complex Operational
                                  Technology Attacks: a Review . . . . . . 215:1--215:??
    Kostas Papagiannopoulos and   
        Ognjen Glamo\vcanin and   
           Melissa Azouaoui and   
                 Dorian Ros and   
        Francesco Regazzoni and   
           Mirjana Stojilovi\'c   The Side-channel Metrics Cheat Sheet . . 216:1--216:??
             Elyssa Boulila and   
                    Marc Dacier   WPAD: Waiting Patiently for an Announced
                                  Disaster . . . . . . . . . . . . . . . . 217:1--217:??
             Gongsheng Yuan and   
                 Jiaheng Lu and   
              Zhengtong Yan and   
                         Sai Wu   A Survey on Mapping Semi-Structured Data
                                  and Graph Data to Relational Data  . . . 218:1--218:??

ACM Computing Surveys
Volume 55, Number 11, November, 2023

      Dimitrios Georgoulias and   
        Jens Myrup Pedersen and   
               Morten Falch and   
      Emmanouil Vasilomanolakis   Botnet Business Models, Takedown
                                  Attempts, and the Darkweb Market: a
                                  Survey . . . . . . . . . . . . . . . . . 219:1--219:??
             Luca Di Grazia and   
                 Michael Pradel   Code Search: a Survey of Techniques for
                                  Finding Code . . . . . . . . . . . . . . 220:1--220:??
              Roberto Viola and   
Ángel Mart\'ìn and   
             Mikel Zorrilla and   
       Jon Montalbán and   
             Pablo Angueira and   
           Gabriel-Miro Muntean   A Survey on Virtual Network Functions
                                  for Media Streaming: Solutions and
                                  Future Challenges  . . . . . . . . . . . 221:1--221:??
José Mar\'ìa Jorquera Valero and   
Pedro Miguel Sánchez Sánchez and   
    Manuel Gil Pérez and   
Alberto Huertas Celdrán and   
        Gregorio Martinez Perez   Cutting-Edge Assets for Trust in 5G and
                                  Beyond: Requirements, State of the Art,
                                  Trends, and Challenges . . . . . . . . . 222:1--222:??
        Priyankar Choudhary and   
                Neeraj Goel and   
                   Mukesh Saini   A Survey on Seismic Sensor based Target
                                  Detection, Localization, Identification,
                                  and Activity Recognition . . . . . . . . 223:1--223:??
         Ghodai Abdelrahman and   
                  Qing Wang and   
                 Bernardo Nunes   Knowledge Tracing: a Survey  . . . . . . 224:1--224:??
                 Jonas Dann and   
              Daniel Ritter and   
            Holger Fröning   Non-relational Databases on FPGAs:
                                  Survey, Design Decisions, Challenges . . 225:1--225:??
                    Yang Li and   
            Michael Purcell and   
      Thierry Rakotoarivelo and   
                David Smith and   
          Thilina Ranbaduge and   
                   Kee Siong Ng   Private Graph Data Release: a Survey . . 226:1--226:??
              Stjepan Picek and   
            Guilherme Perin and   
                Luca Mariot and   
                  Lichao Wu and   
                   Lejla Batina   SoK: Deep Learning-based Physical
                                  Side-channel Analysis  . . . . . . . . . 227:1--227:??
            Michael Seifert and   
            Stephan Kuehnel and   
                Stefan Sackmann   Hybrid Clouds Arising from Software as a
                                  Service Adoption: Challenges, Solutions,
                                  and Future Research Directions . . . . . 228:1--228:??
       Surangika Ranathunga and   
         En-Shiun Annie Lee and   
    Marjana Prifti Skenduli and   
               Ravi Shekhar and   
               Mehreen Alam and   
                 Rishemjit Kaur   Neural Machine Translation for
                                  Low-resource Languages: a Survey . . . . 229:1--229:??
                   Bo Huang and   
               Mengchu Zhou and   
             Xiaoyu Sean Lu and   
             Abdullah Abusorrah   Scheduling of Resource Allocation
                                  Systems with Timed Petri Nets: a Survey  230:1--230:??
                  Chen Chen and   
                  Gang Zhou and   
                    Youfang Lin   Cross-Domain WiFi Sensing with Channel
                                  State Information: a Survey  . . . . . . 231:1--231:??
                 Ziqiang Li and   
             Muhammad Usman and   
                 Rentuo Tao and   
                Pengfei Xia and   
               Chaoyue Wang and   
              Huanhuan Chen and   
                         Bin Li   A Systematic Survey of Regularization
                                  and Normalization in GANs  . . . . . . . 232:1--232:??
               Rahul Mishra and   
                     Hari Gupta   Transforming Large-Size to Lightweight
                                  Deep Neural Networks for IoT
                                  Applications . . . . . . . . . . . . . . 233:1--233:??
              Michael Jones and   
            Soufiene Djahel and   
               Kristopher Welsh   Path-Planning for Unmanned Aerial
                                  Vehicles with Environment Complexity
                                  Considerations: a Survey . . . . . . . . 234:1--234:??
             Li-Hsiang Shen and   
               Kai-Ten Feng and   
                    Lajos Hanzo   Five Facets of 6G: Research Challenges
                                  and Opportunities  . . . . . . . . . . . 235:1--235:??
          Christian Legaard and   
             Thomas Schranz and   
           Gerald Schweiger and   
        Ján Drgo\vna and   
                Basak Falay and   
       Cláudio Gomes and   
       Alexandros Iosifidis and   
                Mahdi Abkar and   
                   Peter Larsen   Constructing Neural Network Based Models
                                  for Simulating Dynamical Systems . . . . 236:1--236:??
         Sampath Rajapaksha and   
          Harsha Kalutarage and   
           M. Omar Al-Kadri and   
           Andrei Petrovski and   
          Garikayi Madzudzo and   
                 Madeline Cheah   AI-Based Intrusion Detection Systems for
                                  In-Vehicle Networks: a Survey  . . . . . 237:1--237:??
                  Jiahua Xu and   
           Krzysztof Paruch and   
             Simon Cousaert and   
                      Yebo Feng   SoK: Decentralized Exchanges (DEX) with
                                  Automated Market Maker (AMM) Protocols   238:1--238:??
               Pieter Hijma and   
              Stijn Heldens and   
            Alessio Sclocco and   
          Ben van Werkhoven and   
                   Henri E. Bal   Optimization Techniques for GPU
                                  Programming  . . . . . . . . . . . . . . 239:1--239:??
                 Juncen Zhu and   
               Jiannong Cao and   
               Divya Saxena and   
                 Shan Jiang and   
                  Houda Ferradi   Blockchain-empowered Federated Learning:
                                  Challenges, Solutions, and Future
                                  Directions . . . . . . . . . . . . . . . 240:1--240:??

ACM Computing Surveys
Volume 55, Number 12, December, 2023

         Md Rayhanur Rahman and   
     Rezvan Mahdavi Hezaveh and   
                Laurie Williams   What Are the Attackers Doing Now?
                                  Automating Cyberthreat Intelligence
                                  Extraction from Text on Pace with the
                                  Changing Threat Landscape: a Survey  . . 241:1--241:??
        Rathinaraja Jeyaraj and   
 Anandkumar Balasubramaniam and   
          Ajay Kumara M. A. and   
              Nadra Guizani and   
                     Anand Paul   Resource Management in Cloud and
                                  Cloud-influenced Technologies for
                                  Internet of Things Applications  . . . . 242:1--242:??
                Nitin Rathi and   
       Indranil Chakraborty and   
               Adarsh Kosta and   
          Abhronil Sengupta and   
               Aayush Ankit and   
        Priyadarshini Panda and   
                    Kaushik Roy   Exploring Neuromorphic Computing Based
                                  on Spiking Neural Networks: Algorithms
                                  to Hardware  . . . . . . . . . . . . . . 243:1--243:??
                Jianhua Gao and   
                 Weixing Ji and   
               Fangli Chang and   
                  Shiyu Han and   
                Bingxin Wei and   
                 Zeming Liu and   
                    Yizhuo Wang   A Systematic Survey of General Sparse
                                  Matrix--Matrix Multiplication  . . . . . 244:1--244:??
                  Yun Zhang and   
                 Linwei Zhu and   
               Gangyi Jiang and   
                  Sam Kwong and   
                  C.-C. Jay Kuo   A Survey on Perceptually Optimized Video
                                  Coding . . . . . . . . . . . . . . . . . 245:1--245:??
              Jayashree Dey and   
                    Ratna Dutta   Progress in Multivariate Cryptography:
                                  Systematic Review, Challenges, and
                                  Research Directions  . . . . . . . . . . 246:1--246:??
              Arash Heidari and   
     Nima Jafari Navimipour and   
                Mehmet Unal and   
                   Guodao Zhang   Machine Learning Applications in
                                  Internet-of-Drones: Systematic Review,
                                  Recent Deployments, and Open Issues  . . 247:1--247:??
                   Ziwei Ji and   
                 Nayeon Lee and   
               Rita Frieske and   
                Tiezheng Yu and   
                     Dan Su and   
                     Yan Xu and   
               Etsuko Ishii and   
                Ye Jin Bang and   
             Andrea Madotto and   
                   Pascale Fung   Survey of Hallucination in Natural
                                  Language Generation  . . . . . . . . . . 248:1--248:??
Antonio López Mart\'ìnez and   
    Manuel Gil Pérez and   
 Antonio Ruiz-Mart\'ìnez   A Comprehensive Review of the
                                  State-of-the-Art on Security and Privacy
                                  Issues in Healthcare . . . . . . . . . . 249:1--249:??
                  Caesar Wu and   
                  Rui Zhang and   
     Ramamohanarao Kotagiri and   
                  Pascal Bouvry   Strategic Decisions: Survey, Taxonomy,
                                  and Future Directions from Artificial
                                  Intelligence Perspective . . . . . . . . 250:1--250:??
               Maxime Buser and   
             Rafael Dowsley and   
             Muhammed Esgin and   
   Clémentine Gritti and   
  Shabnam Kasra Kermanshahi and   
            Veronika Kuchta and   
               Jason Legrow and   
                 Joseph Liu and   
          Raphaël Phan and   
                Amin Sakzad and   
              Ron Steinfeld and   
                   Jiangshan Yu   A Survey on Exotic Signatures for
                                  Post-quantum Blockchain: Challenges and
                                  Research Directions  . . . . . . . . . . 251:1--251:??
       Hans Jakob Damsgaard and   
           Aleksandr Ometov and   
                     Jari Nurmi   Approximation Opportunities in Edge
                                  Computing Hardware: a Systematic
                                  Literature Review  . . . . . . . . . . . 252:1--252:??
Ümit Çatalyürek and   
               Karen Devine and   
              Marcelo Faraj and   
      Lars Gottesbüren and   
               Tobias Heuer and   
         Henning Meyerhenke and   
              Peter Sanders and   
           Sebastian Schlag and   
           Christian Schulz and   
            Daniel Seemaier and   
                Dorothea Wagner   More Recent Advances in (Hyper)Graph
                                  Partitioning . . . . . . . . . . . . . . 253:1--253:??
                 Weiwei Lin and   
             Chennian Xiong and   
                  Wentai Wu and   
                   Fang Shi and   
                   Keqin Li and   
                     Minxian Xu   Performance Interference of Virtual
                                  Machines: a Survey . . . . . . . . . . . 254:1--254:??
           Kate Smith-Miles and   
Mario Andrés Muñoz   Instance Space Analysis for Algorithm
                                  Testing: Methodology and Software Tools  255:1--255:??
                  Zoe Kotti and   
       Rafaila Galanopoulou and   
             Diomidis Spinellis   Machine Learning for Software
                                  Engineering: a Tertiary Study  . . . . . 256:1--256:??
                   Tong Sha and   
                  Wei Zhang and   
                  Tong Shen and   
                 Zhoujun Li and   
                        Tao Mei   Deep Person Generation: a Survey from
                                  the Perspective of Face, Pose, and Cloth
                                  Synthesis  . . . . . . . . . . . . . . . 257:1--257:??
                  Wei Xiang and   
                      Bang Wang   A Survey of Implicit Discourse Relation
                                  Recognition  . . . . . . . . . . . . . . 258:1--258:??
                Gaurav Menghani   Efficient Deep Learning: a Survey on
                                  Making Deep Learning Models Smaller,
                                  Faster, and Better . . . . . . . . . . . 259:1--259:??
              Robert Hertel and   
                Rachid Benlamri   Deep Learning Techniques for COVID-19
                                  Diagnosis and Prognosis Based on
                                  Radiological Imaging . . . . . . . . . . 260:1--260:??
                   Qin Wang and   
               Jiangshan Yu and   
               Shiping Chen and   
                     Yang Xiang   SoK: DAG-based Blockchain Systems  . . . 261:1--261:??
         Behrouz Zolfaghari and   
           Leila Mirsadeghi and   
           Khodakhast Bibak and   
                  Kaveh Kavousi   Cancer Prognosis and Diagnosis Methods
                                  Based on Ensemble Learning . . . . . . . 262:1--262:??

ACM Computing Surveys
Volume 55, Number 13s, December, 2023

               Xiaojie Wang and   
                 Jiameng Li and   
              Zhaolong Ning and   
              Qingyang Song and   
                    Lei Guo and   
                   Song Guo and   
            Mohammad S. Obaidat   Wireless Powered Mobile Edge Computing
                                  Networks: a Survey . . . . . . . . . . . 263:1--263:??
                Tanmay Garg and   
                Sarah Masud and   
              Tharun Suresh and   
             Tanmoy Chakraborty   Handling Bias in Toxic Speech Detection:
                                  a Survey . . . . . . . . . . . . . . . . 264:1--264:??
           Washington Cunha and   
              Felipe Viegas and   
        Celso França and   
              Thierson Rosa and   
             Leonardo Rocha and   
Marcos André Gonçalves   A Comparative Survey of Instance
                                  Selection Methods applied to Non-Neural
                                  and Transformer-Based Text
                                  Classification . . . . . . . . . . . . . 265:1--265:??
                 Mingyu Liu and   
                     Li Pan and   
                     Shijun Liu   Cost Optimization for Cloud Storage from
                                  User Perspectives: Recent Advances,
                                  Taxonomy, and Survey . . . . . . . . . . 266:1--266:??
           Jovani Dalzochio and   
               Rafael Kunst and   
Jorge Luis Victória Barbosa and   
Pedro Clarindo da Silva Neto and   
            Edison Pignaton and   
 Carla Schwengber ten Caten and   
  Alex de Lima Teodoro da Penha   Predictive Maintenance in the Military
                                  Domain: a Systematic Review of the
                                  Literature . . . . . . . . . . . . . . . 267:1--267:??
Salma P. González-Sabbagh and   
           Antonio Robles-Kelly   A Survey on Underwater Computer Vision   268:1--268:??
Xavier de Carné de Carnavalet and   
           Paul C. van Oorschot   A Survey and Analysis of TLS
                                  Interception Mechanisms and Motivations:
                                  Exploring how end-to-end TLS is made
                                  ``end-to-me'' for web traffic  . . . . . 269:1--269:??
                 Ringki Das and   
            Thoudam Doren Singh   Multimodal Sentiment Analysis: a Survey
                                  of Methods, Trends, and Challenges . . . 270:1--270:??
               Yisheng Song and   
                  Ting Wang and   
                   Puyu Cai and   
          Subrota K. Mondal and   
            Jyoti Prakash Sahoo   A Comprehensive Survey of Few-shot
                                  Learning: Evolution, Applications,
                                  Challenges, and Opportunities  . . . . . 271:1--271:??
          Harshala Gammulle and   
   David Ahmedt-Aristizabal and   
               Simon Denman and   
      Lachlan Tychsen-Smith and   
             Lars Petersson and   
                 Clinton Fookes   Continuous Human Action Recognition for
                                  Human-machine Interaction: a Review  . . 272:1--272:??
               Haider Abbas and   
             Naina Emmanuel and   
      Muhammad Faisal Amjad and   
             Tahreem Yaqoob and   
       Mohammed Atiquzzaman and   
                Zafar Iqbal and   
            Narmeen Shafqat and   
          Waleed Bin Shahid and   
                Ali Tanveer and   
                    Umer Ashfaq   Security Assessment and Evaluation of
                                  VPNs: a Comprehensive Survey . . . . . . 273:1--273:??
                Renan Greca and   
              Breno Miranda and   
              Antonia Bertolino   State of Practical Applicability of
                                  Regression Testing Research: a Live
                                  Systematic Literature Review . . . . . . 274:1--274:??
                Roberto Casadei   Macroprogramming: Concepts, State of the
                                  Art, and Opportunities of Macroscopic
                                  Behaviour Modelling  . . . . . . . . . . 275:1--275:??
                 JunKyu Lee and   
               Lev Mukhanov and   
  Amir Sabbagh Molahosseini and   
                Umar Minhas and   
                   Yang Hua and   
  Jesus Martinez del Rincon and   
               Kiril Dichev and   
              Cheol-Ho Hong and   
            Hans Vandierendonck   Resource-Efficient Convolutional
                                  Networks: a Survey on Model-,
                                  Arithmetic-, and Implementation-Level
                                  Techniques . . . . . . . . . . . . . . . 276:1--276:??
Étienne André and   
                 Shuang Liu and   
                   Yang Liu and   
           Christine Choppy and   
                    Jun Sun and   
                  Jin Song Dong   Formalizing UML State Machines for
                                  Automated Verification --- a Survey  . . 277:1--277:??
                     Jie Xu and   
                  Cong Wang and   
                    Xiaohua Jia   A Survey of Blockchain Consensus
                                  Protocols  . . . . . . . . . . . . . . . 278:1--278:??
                    Jie Gui and   
              Xiaofeng Cong and   
                   Yuan Cao and   
                  Wenqi Ren and   
                  Jun Zhang and   
                 Jing Zhang and   
                 Jiuxin Cao and   
                    Dacheng Tao   A Comprehensive Survey and Taxonomy on
                                  Single Image Dehazing Based on Deep
                                  Learning . . . . . . . . . . . . . . . . 279:1--279:??
                Tiago Veiga and   
                Jennifer Renoux   From Reactive to Active Sensing: a
                                  Survey on Information Gathering in
                                  Decision-theoretic Planning  . . . . . . 280:1--280:??
                  Tian Wang and   
                Yuzhu Liang and   
                Xuewei Shen and   
                   Xi Zheng and   
              Adnan Mahmood and   
                  Quan Z. Sheng   Edge Computing and Sensor-Cloud:
                                  Overview, Solutions, and Directions  . . 281:1--281:??
            Visal Rajapakse and   
         Ishan Karunanayake and   
                   Nadeem Ahmed   Intelligence at the Extreme Edge: a
                                  Survey on Reformable TinyML  . . . . . . 282:1--282:??
               Thomas Kosch and   
              Jakob Karolus and   
         Johannes Zagermann and   
            Harald Reiterer and   
           Albrecht Schmidt and   
            Pawe\l W. Wo\'zniak   A Survey on Measuring Cognitive Workload
                                  in Human-Computer Interaction  . . . . . 283:1--283:??
Ma\lgorzata B. Starzy\'nska-Grze\'s and   
              Robin Roussel and   
                 Sam Jacoby and   
                  Ali Asadipour   Computer Vision-based Analysis of
                                  Buildings and Built Environments: a
                                  Systematic Review of Current Approaches  284:1--284:??
                  Chang Liu and   
                         Han Yu   AI-Empowered Persuasive Video
                                  Generation: a Survey . . . . . . . . . . 285:1--285:??
            Md Rezwan Hasan and   
              Richard Guest and   
                  Farzin Deravi   Presentation-level Privacy Protection
                                  Techniques for Automated Face
                                  Recognition --- a Survey . . . . . . . . 286:1--286:??
                  Xilu Wang and   
                 Yaochu Jin and   
          Sebastian Schmitt and   
                 Markus Olhofer   Recent Advances in Bayesian Optimization 287:1--287:??
       Madeline C. Schiappa and   
            Yogesh S. Rawat and   
                   Mubarak Shah   Self-Supervised Learning for Videos: a
                                  Survey . . . . . . . . . . . . . . . . . 288:1--288:??
                 Huihui Guo and   
                     Fan Wu and   
               Yunchuan Qin and   
                  Ruihui Li and   
                   Keqin Li and   
                       Kenli Li   Recent Trends in Task and Motion
                                  Planning for Robotics: a Survey  . . . . 289:1--289:??
                  Gang Wang and   
                   Qin Wang and   
                   Shiping Chen   Exploring Blockchains Interoperability:
                                  a Systematic Survey  . . . . . . . . . . 290:1--290:??
              Xiaojie Zhang and   
               Saptarshi Debroy   Resource Management in Mobile Edge
                                  Computing: a Comprehensive Survey  . . . 291:1--291:??
              Yogesh Sharma and   
              Deval Bhamare and   
            Nishanth Sastry and   
              Bahman Javadi and   
                 Rajkumar Buyya   SLA Management in Intent-Driven Service
                                  Management Systems: a Taxonomy and
                                  Future Directions  . . . . . . . . . . . 292:1--292:??

ACM Computing Surveys
Volume 55, Number 14s, December, 2023

Brian Felipe Keith Norambuena and   
            Tanushree Mitra and   
                    Chris North   A Survey on Event-Based News Narrative
                                  Extraction . . . . . . . . . . . . . . . 300:1--300:??
               Zhiwei Zhong and   
               Xianming Liu and   
               Junjun Jiang and   
                 Debin Zhao and   
                   Xiangyang Ji   Guided Depth Map Super-Resolution: a
                                  Survey . . . . . . . . . . . . . . . . . 301:1--301:??
                Vijay Kumar and   
                     Kolin Paul   Device Fingerprinting for Cyber-Physical
                                  Systems: a Survey  . . . . . . . . . . . 302:1--302:??
              Mu-Huan Chung and   
                Yuhong Yang and   
                    Lu Wang and   
                 Greg Cento and   
              Khilan Jerath and   
                Abhay Raman and   
                  David Lie and   
               Mark H. Chignell   Implementing Data Exfiltration Defense
                                  in Situ: a Survey of Countermeasures and
                                  Human Involvement  . . . . . . . . . . . 303:1--303:??
           Quentin Fournier and   
Gaétan Marceau Caron and   
                  Daniel Aloise   A Practical Survey on Faster and Lighter
                                  Transformers . . . . . . . . . . . . . . 304:1--304:??
                 Karl Olson and   
               Jack Wampler and   
                    Eric Keller   Doomed to Repeat with IPv6?
                                  Characterization of NAT-centric Security
                                  in SOHO Routers  . . . . . . . . . . . . 305:1--305:??
        Federico Reghenzani and   
                Zhishan Guo and   
             William Fornaciari   Software Fault Tolerance in Real-Time
                                  Systems: Identifying the Future Research
                                  Questions  . . . . . . . . . . . . . . . 306:1--306:??
                Jiepin Ding and   
              Mingsong Chen and   
                  Ting Wang and   
               Junlong Zhou and   
                     Xin Fu and   
                       Keqin Li   A Survey of AI-enabled Dynamic
                                  Manufacturing Scheduling: From Directed
                                  Heuristics to Autonomous Learning  . . . 307:1--307:??
             Cornelius Ihle and   
           Dennis Trautwein and   
            Moritz Schubotz and   
            Norman Meuschke and   
                      Bela Gipp   Incentive Mechanisms in Peer-to-Peer
                                  Networks --- a Systematic Literature
                                  Review . . . . . . . . . . . . . . . . . 308:1--308:??
       Tânia Carvalho and   
                 Nuno Moniz and   
                Pedro Faria and   
          Lu\'ìs Antunes   Survey on Privacy-Preserving Techniques
                                  for Microdata Publication  . . . . . . . 309:1--309:??
            Tommaso Fulcini and   
           Riccardo Coppola and   
                Luca Ardito and   
                Marco Torchiano   A Review on Tools, Mechanics, Benefits,
                                  and Challenges of Gamified Software
                                  Testing  . . . . . . . . . . . . . . . . 310:1--310:??
       Arun Kumar Kalakanti and   
                    Shrisha Rao   Computational Challenges and Approaches
                                  for Electric Vehicles  . . . . . . . . . 311:1--311:??
         Nikiforos Pittaras and   
      George Giannakopoulos and   
   Panagiotis Stamatopoulos and   
           Vangelis Karkaletsis   Content-based and Knowledge-enriched
                                  Representations for Classification
                                  Across Modalities: a Survey  . . . . . . 312:1--312:??
                 Anna Breit and   
        Laura Waltersdorfer and   
          Fajar J. Ekaputra and   
                Marta Sabou and   
           Andreas Ekelhart and   
               Andreea Iana and   
             Heiko Paulheim and   
               Jan Portisch and   
              Artem Revenko and   
          Annette Ten Teije and   
             Frank Van Harmelen   Combining Machine Learning and Semantic
                                  Web: a Systematic Mapping Study  . . . . 313:1--313:??
          Abdulaziz Al-Meer and   
                 Saif Al-Kuwari   Physical Unclonable Functions (PUF) for
                                  IoT Devices  . . . . . . . . . . . . . . 314:1--314:??
              Shalini Saini and   
                  Nitesh Saxena   A Survey of Threats to Research
                                  Literature-dependent Medical AI
                                  Solutions  . . . . . . . . . . . . . . . 315:1--315:??
                Badis Hammi and   
           Sherali Zeadally and   
                   Jamel Nebhen   Security Threats, Countermeasures, and
                                  Challenges of Digital Supply Chains  . . 316:1--316:??
             Veda C. Storey and   
           Roman Lukyanenko and   
             Arturo Castellanos   Conceptual Modeling: Topics, Themes, and
                                  Technology Trends  . . . . . . . . . . . 317:1--317:??
            Sahraoui Dhelim and   
                Liming Chen and   
               Sajal K. Das and   
             Huansheng Ning and   
               Chris Nugent and   
              Gerard Leavey and   
                 Dirk Pesch and   
       Eleanor Bantry-White and   
                    Devin Burns   Detecting Mental Distresses Using Social
                                  Behavior Analysis in the Context of
                                  COVID-19: a Survey . . . . . . . . . . . 318:1--318:??
               Jarod Govers and   
             Philip Feldman and   
                 Aaron Dant and   
                   Panos Patros   Down the Rabbit Hole: Detecting Online
                                  Extremism, Radicalisation, and
                                  Politicised Hate Speech  . . . . . . . . 319:1--319:??
          Leysan Nurgalieva and   
                 Alisa Frik and   
                  Gavin Doherty   A Narrative Review of Factors Affecting
                                  the Implementation of Privacy and
                                  Security Practices in Software
                                  Development  . . . . . . . . . . . . . . 320:1--320:??
         Samodha Pallewatta and   
          Vassilis Kostakos and   
                 Rajkumar Buyya   Placement of Microservices-based IoT
                                  Applications in Fog Computing: a
                                  Taxonomy and Future Directions . . . . . 321:1--321:??
             Newton C. Will and   
              Carlos A. Maziero   Intel Software Guard Extensions
                                  Applications: a Survey . . . . . . . . . 322:1--322:??
                 Bofeng Pan and   
         Natalia Stakhanova and   
                     Suprio Ray   Data Provenance in Security and Privacy  323:1--323:??
             Daryna Oliynyk and   
               Rudolf Mayer and   
                 Andreas Rauber   I Know What You Trained Last Summer: a
                                  Survey on Stealing Machine Learning
                                  Models and Defences  . . . . . . . . . . 324:1--324:??
                Davide Zoni and   
          Andrea Galimberti and   
             William Fornaciari   A Survey on Run-time Power Monitors at
                                  the Edge . . . . . . . . . . . . . . . . 325:1--325:??
             Nikolay Ivanov and   
                Chenning Li and   
                  Qiben Yan and   
                Zhiyuan Sun and   
                Zhichao Cao and   
                      Xiapu Luo   Security Threat Mitigation for Smart
                                  Contracts: a Comprehensive Survey  . . . 326:1--326:??
                Arda Goknil and   
                 Phu Nguyen and   
                  Sagar Sen and   
           Dimitra Politaki and   
              Harris Niavis and   
         Karl John Pedersen and   
           Abdillah Suyuthi and   
             Abhilash Anand and   
               Amina Ziegenbein   A Systematic Review of Data Quality in
                                  CPS and IoT for Industry 4.0 . . . . . . 327:1--327:??
                 Sicong Han and   
                Chenhao Lin and   
                  Chao Shen and   
                  Qian Wang and   
                  Xiaohong Guan   Interpreting Adversarial Examples in
                                  Deep Learning: a Review  . . . . . . . . 328:1--328:??
                 Xiao Zhang and   
          Griffin Klevering and   
                  Xinyu Lei and   
                   Yiwen Hu and   
                    Li Xiao and   
                    Guan-Hua Tu   The Security in Optical Wireless
                                  Communication: a Survey  . . . . . . . . 329:1--329:??


ACM Computing Surveys
Volume 56, Number 1, January, 2024

             Janice Klaiber and   
            Clemens Van Dinther   Deep Learning for Variable Renewable
                                  Energy: a Systematic Review  . . . . . . 1:1--1:??
Héléne Coullon and   
             Ludovic Henrio and   
Frédéric Loulergue and   
                Simon Robillard   Component-based Distributed Software
                                  Reconfiguration: a Verification-oriented
                                  Survey . . . . . . . . . . . . . . . . . 2:1--2:??
    Mohamed Ahzam Amanullah and   
               Seng W. Loke and   
      Mohan Baruwal Chhetri and   
                     Robin Doss   A Taxonomy and Analysis of Misbehaviour
                                  Detection in Cooperative Intelligent
                                  Transport Systems: a Systematic Review   3:1--3:??
                Sabine Houy and   
             Philipp Schmid and   
               Alexandre Bartel   Security Aspects of Cryptocurrency
                                  Wallets --- a Systematic Literature
                                  Review . . . . . . . . . . . . . . . . . 4:1--4:??
             Prasenjeet Roy and   
                    Suman Kundu   Review on Query-focused Multi-document
                                  Summarization (QMDS) with Comparative
                                  Analysis . . . . . . . . . . . . . . . . 5:1--5:??
                Jana Vatter and   
                Ruben Mayer and   
             Hans-Arno Jacobsen   The Evolution of Distributed Systems for
                                  Graph Neural Networks and Their Origin
                                  in Graph Processing and Deep Learning: a
                                  Survey . . . . . . . . . . . . . . . . . 6:1--6:??
                  Shulei Ji and   
                 Xinyu Yang and   
                       Jing Luo   A Survey on Deep Learning for Symbolic
                                  Music Generation: Representations,
                                  Algorithms, Evaluations, and Challenges  7:1--7:??
                Mario Brcic and   
            Roman V. Yampolskiy   Impossibility Results in AI: a Survey    8:1--8:??
                    Heng Xu and   
               Tianqing Zhu and   
               Lefeng Zhang and   
                Wanlei Zhou and   
                   Philip S. Yu   Machine Unlearning: a Survey . . . . . . 9:1--9:??
         Samaneh Zolfaghari and   
            Sumaiya Suravee and   
             Daniele Riboni and   
             Kristina Yordanova   Sensor-Based Locomotion Data Mining for
                                  Supporting the Diagnosis of
                                  Neurodegenerative Disorders: a Survey    10:1--10:??
                   Ce Zheng and   
                  Wenhan Wu and   
                  Chen Chen and   
            Taojiannan Yang and   
                  Sijie Zhu and   
                    Ju Shen and   
         Nasser Kehtarnavaz and   
                   Mubarak Shah   Deep Learning-based Human Pose
                                  Estimation: a Survey . . . . . . . . . . 11:1--11:??
       Bayzid Ashik Hossain and   
   Md. Saddam Hossain Mukta and   
           Md Adnanul Islam and   
                 Akib Zaman and   
                 Rolf Schwitter   Natural Language-Based Conceptual
                                  Modelling Frameworks: State of the Art
                                  and Future Opportunities . . . . . . . . 12:1--12:??
              Zhaolong Ning and   
                     Hao Hu and   
               Xiaojie Wang and   
                    Lei Guo and   
                   Song Guo and   
                Guoyin Wang and   
                      Xinbo Gao   Mobile Edge Computing and Machine
                                  Learning in the Internet of Unmanned
                                  Aerial Vehicles: a Survey  . . . . . . . 13:1--13:??
               Chi-Wei Lien and   
                  Sudip Vhaduri   Challenges and Opportunities of
                                  Biometric User Authentication in the Age
                                  of IoT: a Survey . . . . . . . . . . . . 14:1--14:??
                Yaochen Liu and   
                  Qiuchi Li and   
                Benyou Wang and   
               Yazhou Zhang and   
                     Dawei Song   A Survey of Quantum-cognitively Inspired
                                  Sentiment Analysis Models  . . . . . . . 15:1--15:??
         Alessandro Margara and   
           Gianpaolo Cugola and   
         Nicol\`o Felicioni and   
                Stefano Cilloni   A Model and Survey of Distributed
                                  Data-Intensive Systems . . . . . . . . . 16:1--16:??
              Zeinab Zabihi and   
Amir Masoud Eftekhari Moghadam and   
       Mohammad Hossein Rezvani   Reinforcement Learning Methods for
                                  Computation Offloading: a Systematic
                                  Review . . . . . . . . . . . . . . . . . 17:1--17:??
          Ricardo Parizotto and   
      Bruno Loureiro Coelho and   
        Diego Cardoso Nunes and   
               Israat Haque and   
        Alberto Schaeffer-Filho   Offloading Machine Learning to
                                  Programmable Data Planes: a Systematic
                                  Survey . . . . . . . . . . . . . . . . . 18:1--18:??
                     Zhe Fu and   
                     Xi Niu and   
                 Mary Lou Maher   Deep Learning Models for Serendipity
                                  Recommendations: a Survey and New
                                  Perspectives . . . . . . . . . . . . . . 19:1--19:??
                     Rui Xu and   
                   Sheng Ma and   
                   Yang Guo and   
                   Dongsheng Li   A Survey of Design and Optimization for
                                  Systolic Array-based DNN Accelerators    20:1--20:??
               Guoqing Xiao and   
              Chuanghui Yin and   
                   Tao Zhou and   
                   Xueqi Li and   
                Yuedan Chen and   
                       Kenli Li   A Survey of Accelerating Parallel Sparse
                                  Linear Algebra . . . . . . . . . . . . . 21:1--21:??
               Diego Donoso and   
               Jose M. Saavedra   Survey on Sketch-to-photo Translation    22:1--22:??
                Zhishu Shen and   
                  Jiong Jin and   
                  Cheng Tan and   
             Atsushi Tagami and   
            Shangguang Wang and   
                    Qing Li and   
               Qiushi Zheng and   
                  Jingling Yuan   A Survey of Next-generation Computing
                                  Technologies in Space-air-ground
                                  Integrated Networks  . . . . . . . . . . 23:1--23:??
            Alessia Antelmi and   
           Gennaro Cordasco and   
               Mirko Polato and   
           Vittorio Scarano and   
          Carmine Spagnuolo and   
                    Dingqi Yang   A Survey on Hypergraph Representation
                                  Learning . . . . . . . . . . . . . . . . 24:1--24:??
                  Kisub Kim and   
          Sankalp Ghatpande and   
                Dongsun Kim and   
                   Xin Zhou and   
                    Kui Liu and   
Tegawendé F. Bissyandé and   
              Jacques Klein and   
                  Yves Le Traon   Big Code Search: a Bibliography  . . . . 25:1--25:??

ACM Computing Surveys
Volume 56, Number 2, February, 2024

              Afzal Badshah and   
                Anwar Ghani and   
                   Ali Daud and   
               Ateeqa Jalal and   
             Muhammad Bilal and   
                  Jon Crowcroft   Towards Smart Education through Internet
                                  of Things: a Survey  . . . . . . . . . . 26:1--26:??
               Maud Ehrmann and   
                Ahmed Hamdi and   
      Elvys Linhares Pontes and   
           Matteo Romanello and   
                 Antoine Doucet   Named Entity Recognition and
                                  Classification in Historical Documents:
                                  a Survey . . . . . . . . . . . . . . . . 27:1--27:??
               Marco Brohet and   
            Francesco Regazzoni   A Survey on Thwarting Memory Corruption
                                  in RISC-V  . . . . . . . . . . . . . . . 28:1--28:??
              Alireza Alaei and   
                   Vinh Bui and   
             David Doermann and   
                    Umapada Pal   Document Image Quality Assessment: a
                                  Survey . . . . . . . . . . . . . . . . . 29:1--29:??
                  Bonan Min and   
                Hayley Ross and   
                Elior Sulem and   
     Amir Pouran Ben Veyseh and   
           Thien Huu Nguyen and   
                Oscar Sainz and   
               Eneko Agirre and   
               Ilana Heintz and   
                       Dan Roth   Recent Advances in Natural Language
                                  Processing via Large Pre-trained
                                  Language Models: a Survey  . . . . . . . 30:1--30:??
               Maciej Besta and   
       Robert Gerstenberger and   
              Emanuel Peter and   
               Marc Fischer and   
         Micha\l Podstawski and   
            Claude Barthels and   
             Gustavo Alonso and   
                Torsten Hoefler   Demystifying Graph Databases: Analysis
                                  and Taxonomy of Data Organization,
                                  System Designs, and Graph Queries  . . . 31:1--31:??
              Jan Pennekamp and   
              Roman Matzutt and   
Christopher Klinkmüller and   
              Lennart Bader and   
              Martin Serror and   
                Eric Wagner and   
                Sidra Malik and   
           Maria Spiß and   
               Jessica Rahn and   
          Tan Gürpinar and   
                Eduard Vlad and   
       Sander J. J. Leemans and   
           Salil S. Kanhere and   
               Volker Stich and   
                   Klaus Wehrle   An Interdisciplinary Survey on
                                  Information Flows in Supply Chains . . . 32:1--32:??
           Takuya Fujihashi and   
       Toshiaki Koike-Akino and   
               Takashi Watanabe   Soft Delivery: Survey on a New Paradigm
                                  for Wireless and Mobile Multimedia
                                  Streaming  . . . . . . . . . . . . . . . 33:1--33:??
                Yaxiong Lei and   
                 Shijing He and   
             Mohamed Khamis and   
                        Juan Ye   An End-to-End Review of Gaze Estimation
                                  and its Interactive Applications on
                                  Handheld Mobile Devices  . . . . . . . . 34:1--34:??
             Oceane Destras and   
   Sébastien Le Beux and   
Felipe Gohring De Magalhães and   
             Gabriela Nicolescu   Survey on Activation Functions for
                                  Optical Neural Networks  . . . . . . . . 35:1--35:??
             Fatemeh Deldar and   
                    Mahdi Abadi   Deep Learning for Zero-day Malware
                                  Detection and Classification: a Survey   36:1--36:??
             Sahar Mehrpour and   
               Thomas D. Latoza   A Survey of Tool Support for Working
                                  with Design Decisions in Code  . . . . . 37:1--37:??
                Satyaki Roy and   
               Nirnay Ghosh and   
           Nitish Uplavikar and   
                  Preetam Ghosh   Towards a Unified Pandemic Management
                                  Architecture: Survey, Challenges, and
                                  Future Directions  . . . . . . . . . . . 38:1--38:??
              Huiqiang Chen and   
               Tianqing Zhu and   
                  Tao Zhang and   
                Wanlei Zhou and   
                   Philip S. Yu   Privacy and Fairness in Federated
                                  Learning: On the Perspective of Tradeoff 39:1--39:??
          Abdelouahab Amira and   
         Abdelouahid Derhab and   
    Elmouatez Billah Karbab and   
                    Omar Nouali   A Survey of Malware Analysis Using
                                  Community Detection Algorithms . . . . . 40:1--40:??
                     Nan Li and   
                  Lianbo Ma and   
                     Guo Yu and   
                   Bing Xue and   
              Mengjie Zhang and   
                     Yaochu Jin   Survey on Evolutionary Deep Learning:
                                  Principles, Algorithms, Applications,
                                  and Open Issues  . . . . . . . . . . . . 41:1--41:??
           Tara Ghasempouri and   
                  Jaan Raik and   
           Cezar Reinbrecht and   
              Said Hamdioui and   
            Mottaqiallah Taouil   Survey on Architectural Attacks: a
                                  Unified Classification and Attack Model  42:1--42:??
             Carlos Barrios and   
                    Mohan Kumar   Service Caching and Computation Reuse
                                  Strategies at the Edge: a Survey . . . . 43:1--43:??
                 Rongxin Xu and   
                 Qiujun Lan and   
          Shiva Raj Pokhrel and   
                        Gang Li   A Knowledge Graph-Based Survey on
                                  Distributed Ledger Technology for IoT
                                  Verticals  . . . . . . . . . . . . . . . 44:1--44:??
             Youssef Yamout and   
      Tashaffi Samin Yeasar and   
             Shahrear Iqbal and   
            Mohammad Zulkernine   Beyond Smart Homes: an In-Depth Analysis
                                  of Smart Aging Care System Security  . . 45:1--45:??
              Jean Luca Bez and   
                 Suren Byna and   
                  Shadi Ibrahim   I/O Access Patterns in HPC Applications:
                                  a $ 360$-Degree Survey . . . . . . . . . 46:1--46:??
             Stefan Buchner and   
                    Dirk Riehle   The Business Impact of Inner Source and
                                  How to Quantify It . . . . . . . . . . . 47:1--47:??
               Maryam Amini and   
             Razvan Stanica and   
            Catherine Rosenberg   Where Are the (Cellular) Data? . . . . . 48:1--48:??
                Essam Debie and   
           Kathryn Kasmarik and   
                   Matt Garratt   Swarm Robotics: a Survey from a
                                  Multi-Tasking Perspective  . . . . . . . 49:1--49:??
                Danfeng Sun and   
                  Junjie Hu and   
                 Huifeng Wu and   
                     Jia Wu and   
                  Jian Yang and   
              Quan Z. Sheng and   
               Schahram Dustdar   A Comprehensive Survey on Collaborative
                                  Data-access Enablers in the IIoT . . . . 50:1--50:??
                 Asma Ameur and   
                 Sana Hamdi and   
                Sadok Ben Yahia   Sentiment Analysis for Hotel Reviews: a
                                  Systematic Literature Review . . . . . . 51:1--51:??
             Benjamin Smith and   
           Anahita Khojandi and   
                 Rama Vasudevan   Bias in Reinforcement Learning: a Review
                                  in Healthcare Applications . . . . . . . 52:1--52:??
            Ryan Schuerkamp and   
        Philippe J. Giabbanelli   Extensions of Fuzzy Cognitive Maps: a
                                  Systematic Review  . . . . . . . . . . . 53:1--53:??

ACM Computing Surveys
Volume 56, Number 3, March, 2024

                  Yulan Guo and   
                Hanyun Wang and   
             Longguang Wang and   
                 Yinjie Lei and   
                     Li Liu and   
             Mohammed Bennamoun   $3$D Face Recognition: Two Decades of
                                  Progress and Prospects . . . . . . . . . 54:1--54:??
                Benyou Wang and   
               Qianqian Xie and   
                Jiahuan Pei and   
               Zhihong Chen and   
              Prayag Tiwari and   
                    Zhao Li and   
                         Jie Fu   Pre-trained Language Models in
                                  Biomedical Domain: a Systematic Survey   55:1--55:??
               Tianzhang He and   
                 Rajkumar Buyya   A Taxonomy of Live Migration Management
                                  in Cloud Computing . . . . . . . . . . . 56:1--56:??
         Daniele Bringhenti and   
            Guido Marchetto and   
             Riccardo Sisto and   
                 Fulvio Valenza   Automation for Network Security
                                  Configuration: State of the Art and
                                  Research Trends  . . . . . . . . . . . . 57:1--57:??
        Domenico Amalfitano and   
            Stefano Faralli and   
     Jean Carlo Rossa Hauck and   
         Santiago Matalonga and   
               Damiano Distante   Artificial Intelligence Applied to
                                  Software Testing: a Tertiary Study . . . 58:1--58:??
                Rui Queiroz and   
                 Tiago Cruz and   
 Jérôme Mendes and   
                Pedro Sousa and   
            Paulo Simões   Container-based Virtualization for
                                  Real-time Industrial Systems --- a
                                  Systematic Review  . . . . . . . . . . . 59:1--59:??
                Guoying Qiu and   
               Guoming Tang and   
               Chuandong Li and   
                Lailong Luo and   
                   Deke Guo and   
                    Yulong Shen   Differentiated Location Privacy
                                  Protection in Mobile Communication
                                  Services: a Survey from the Semantic
                                  Perception Perspective . . . . . . . . . 60:1--60:??
            Kheng Leong Tan and   
               Chi-Hung Chi and   
                   Kwok-Yan Lam   Survey on Digital Sovereignty and
                                  Identity: From Digitization to
                                  Digitalization . . . . . . . . . . . . . 61:1--61:??
             Taraneh Ghandi and   
         Hamidreza Pourreza and   
               Hamidreza Mahyar   Deep Learning Approaches on Image
                                  Captioning: a Review . . . . . . . . . . 62:1--62:??
                  Haiqin Wu and   
          Boris Düdder and   
              Liangmin Wang and   
                 Zhenfu Cao and   
                   Jun Zhou and   
                       Xia Feng   Survey on Secure Keyword Search over
                                  Outsourced Data: From Cloud to
                                  Blockchain-assisted Architecture . . . . 63:1--63:??
              Hanqing Zhang and   
                Haolin Song and   
                  Shaoyu Li and   
                  Ming Zhou and   
                     Dawei Song   A Survey of Controllable Text Generation
                                  Using Transformer-based Pre-trained
                                  Language Models  . . . . . . . . . . . . 64:1--64:??
               Oscar Castro and   
           Pierrick Bruneau and   
Jean-Sébastien Sottet and   
              Dario Torregrossa   Landscape of High-Performance Python to
                                  Develop Data Science and Machine
                                  Learning Applications  . . . . . . . . . 65:1--65:??
           Dulani Meedeniya and   
          Isuru Ariyarathne and   
             Meelan Bandara and   
       Roshinie Jayasundara and   
                 Charith Perera   A Survey on Deep Learning Based Forest
                                  Environment Sound Classification at the
                                  Edge . . . . . . . . . . . . . . . . . . 66:1--66:??
                     Qi Jia and   
                  Yizhu Liu and   
                   Siyu Ren and   
                   Kenny Q. Zhu   Taxonomy of Abstractive Dialogue
                                  Summarization: Scenarios, Approaches,
                                  and Future Directions  . . . . . . . . . 67:1--67:??
               Asma Hamissi and   
                  Amine Dhraief   A Survey on the Unmanned Aircraft System
                                  Traffic Management . . . . . . . . . . . 68:1--68:??
Adán José-Garc\'ìa and   
              Julie Jacques and   
           Vincent Sobanski and   
              Clarisse Dhaenens   Metaheuristic Biclustering Algorithms:
                                  From State-of-the-art to Future
                                  Opportunities  . . . . . . . . . . . . . 69:1--69:??
          Felix Gemeinhardt and   
          Antonio Garmendia and   
              Manuel Wimmer and   
             Benjamin Weder and   
                  Frank Leymann   Quantum Combinatorial Optimization in
                                  the NISQ Era: a Systematic Mapping Study 70:1--70:??
          Sanoop Mallissery and   
                     Yu-Sung Wu   Demystify the Fuzzing Methods: a
                                  Comprehensive Survey . . . . . . . . . . 71:1--71:??
                Arnav Arora and   
              Preslav Nakov and   
           Momchil Hardalov and   
     Sheikh Muhammad Sarwar and   
                Vibha Nayak and   
                Yoan Dinkov and   
         Dimitrina Zlatkova and   
                  Kyle Dent and   
          Ameya Bhatawdekar and   
         Guillaume Bouchard and   
            Isabelle Augenstein   Detecting Harmful Content on Online
                                  Platforms: What Platforms Need vs. Where
                                  Research Efforts Go  . . . . . . . . . . 72:1--72:??
             Peter Christen and   
              David J. Hand and   
               Nishadi Kirielle   A Review of the $F$-Measure: Its
                                  History, Properties, Criticism, and
                                  Alternatives . . . . . . . . . . . . . . 73:1--73:??
       Luís Fiolhais and   
                   Leonel Sousa   Transient-Execution Attacks: a Computer
                                  Architect Perspective  . . . . . . . . . 74:1--74:??
            Vincenzo Scotti and   
            Licia Sbattella and   
                Roberto Tedesco   A Primer on Seq2Seq Models for
                                  Generative Chatbots  . . . . . . . . . . 75:1--75:??
            Ayse Ünsal and   
                Melek Önen   Information-Theoretic Approaches to
                                  Differential Privacy . . . . . . . . . . 76:1--76:??
    Simone Maurizio La Cava and   
              Giulia Orr\`u and   
           Martin Drahansky and   
        Gian Luca Marcialis and   
                     Fabio Roli   $3$D Face Reconstruction: The Road to
                                  Forensics  . . . . . . . . . . . . . . . 77:1--77:??
                 Xiaoyu Xia and   
Sheik Mohammad Mostakim Fattah and   
             Muhammad Ali Babar   A Survey on UAV-Enabled Edge Computing:
                                  Resource Management Perspective  . . . . 78:1--78:??
                    Mang Ye and   
                Xiuwen Fang and   
                      Bo Du and   
               Pong C. Yuen and   
                    Dacheng Tao   Heterogeneous Federated Learning:
                                  State-of-the-art and Research Challenges 79:1--79:??
                Guoyang Xie and   
                Yawen Huang and   
                Jinbao Wang and   
                  Jiayi Lyu and   
                 Feng Zheng and   
               Yefeng Zheng and   
                     Yaochu Jin   Cross-modality Neuroimage Synthesis: a
                                  Survey . . . . . . . . . . . . . . . . . 80:1--80:??

ACM Computing Surveys
Volume 56, Number 4, April, 2024

                   Ernest Davis   Benchmarks for Automated Commonsense
                                  Reasoning: a Survey  . . . . . . . . . . 81:1--81:??
Marcel André Hoffmann and   
                   Rainer Lasch   Tackling Industrial Downtimes with
                                  Artificial Intelligence in Data-Driven
                                  Maintenance  . . . . . . . . . . . . . . 82:1--82:??
                 Jonas Auda and   
             Uwe Gruenefeld and   
             Sarah Faltaous and   
                 Sven Mayer and   
              Stefan Schneegass   A Scoping Survey on Cross-reality
                                  Systems  . . . . . . . . . . . . . . . . 83:1--83:??
        Josu Diaz-de-Arcaya and   
       Ana I. Torre-Bastida and   
        Gorka Zárate and   
Raúl Miñón and   
                  Aitor Almeida   A Joint Study of the Challenges,
                                  Opportunities, and Roadmap of MLOps and
                                  AIOps: a Systematic Survey . . . . . . . 84:1--84:??
  Cristiano Patrício and   
       João C. Neves and   
        Luís F. Teixeira   Explainable Deep Learning Methods in
                                  Medical Image Classification: a Survey   85:1--85:??
         Damien Wohwe Sambo and   
              Anna Förster   Wireless Underground Sensor Networks: a
                                  Comprehensive Survey and Tutorial  . . . 86:1--86:??
             Yashar Deldjoo and   
             Fatemeh Nazary and   
               Arnau Ramisa and   
             Julian McAuley and   
        Giovanni Pellegrini and   
         Alejandro Bellogin and   
                Tommaso Di Noia   A Review of Modern Fashion Recommender
                                  Systems  . . . . . . . . . . . . . . . . 87:1--87:??
      Muhammad Okky Ibrohim and   
             Cristina Bosco and   
                 Valerio Basile   Sentiment Analysis for the Natural
                                  Environment: a Systematic Review . . . . 88:1--88:??
                   Meng Qin and   
                  Dit-Yan Yeung   Temporal Link Prediction: a Unified
                                  Framework, Taxonomy, and Review  . . . . 89:1--89:??
                 Weihao Xia and   
                   Jing-Hao Xue   A Survey on Deep Generative $3$D-aware
                                  Image Synthesis  . . . . . . . . . . . . 90:1--90:??
              Chenhan Zhang and   
                    Shui Yu and   
                 Zhiyi Tian and   
                 James J. Q. Yu   Generative Adversarial Networks: a
                                  Survey on Attack and Defense Perspective 91:1--91:??
                      Li Hu and   
                   Anli Yan and   
               Hongyang Yan and   
                     Jin Li and   
                 Teng Huang and   
             Yingying Zhang and   
               Changyu Dong and   
                 Chunsheng Yang   Defenses to Membership Inference
                                  Attacks: a Survey  . . . . . . . . . . . 92:1--92:??
             Alexandra Kapp and   
            Julia Hansmeyer and   
            Helena Mihaljevi\'c   Generative Models for Synthetic Urban
                                  Mobility Data: a Systematic Literature
                                  Review . . . . . . . . . . . . . . . . . 93:1--93:??
             Lingfeng Zhong and   
                     Jia Wu and   
                    Qian Li and   
                   Hao Peng and   
                     Xindong Wu   A Comprehensive Survey on Automatic
                                  Knowledge Graph Construction . . . . . . 94:1--94:??
   Pedro Miguel Moás and   
           Carla Teixeira Lopes   Automatic Quality Assessment of
                                  Wikipedia Articles --- a Systematic
                                  Literature Review  . . . . . . . . . . . 95:1--95:??
                Edan Habler and   
                 Ron Bitton and   
                   Asaf Shabtai   Assessing Aircraft Security: a
                                  Comprehensive Survey and Methodology for
                                  Evaluation . . . . . . . . . . . . . . . 96:1--96:??
  S. Mojtaba Marvasti-Zadeh and   
             Devin Goodsman and   
               Nilanjan Ray and   
                 Nadir Erbilgin   Early Detection of Bark Beetle Attack
                                  Using Remote Sensing and Machine
                                  Learning: a Review . . . . . . . . . . . 97:1--97:??
      Julio C. S. Dos Anjos and   
      Kassiano J. Matteussi and   
        Fernanda C. Orlandi and   
        Jorge L. V. Barbosa and   
      Jorge Sá Silva and   
        Luiz F. Bittencourt and   
     Cláudio F. R. Geyer   A Survey on Collaborative Learning for
                                  Intelligent Autonomous Systems . . . . . 98:1--98:??
               Huang Huawei and   
               Zhang Qinnan and   
                  Li Taotao and   
               Yang Qinglin and   
               Yin Zhaokang and   
                  Wu Junhao and   
                Zehui Xiong and   
               Zhu Jianming and   
                 Jiajing Wu and   
                    Zibin Zheng   Economic Systems in the Metaverse:
                                  Basics, State of the Art, and Challenges 99:1--99:??
     Ronnie De Souza Santos and   
                 Paul Ralph and   
               Arham Arshad and   
                 Klaas-Jan Stol   Distributed Scrum: a Case Meta-analysis  100:1--100:??
               Maria Rigaki and   
               Sebastian Garcia   A Survey of Privacy Attacks in Machine
                                  Learning . . . . . . . . . . . . . . . . 101:1--101:??
            Norman W. Paton and   
               Jiaoyan Chen and   
                      Zhenyu Wu   Dataset Discovery and Exploration: a
                                  Survey . . . . . . . . . . . . . . . . . 102:1--102:??
                 Zhipeng Su and   
              Yixiong Zhang and   
              Jianghong Shi and   
                Xiao-Ping Zhang   A Survey of Single Image Rain Removal
                                  Based on Deep Learning . . . . . . . . . 103:1--103:??
               Akond Rahman and   
       Dibyendu Brinto Bose and   
        Farhat Lamia Barsha and   
                  Rahul Pandita   Defect Categorization in Compilers: a
                                  Multi-vocal Literature Review  . . . . . 104:1--104:??
                  Ling Yang and   
              Zhilong Zhang and   
                  Yang Song and   
                Shenda Hong and   
                Runsheng Xu and   
                   Yue Zhao and   
               Wentao Zhang and   
                    Bin Cui and   
                Ming-Hsuan Yang   Diffusion Models: a Comprehensive Survey
                                  of Methods and Applications  . . . . . . 105:1--105:??
              Marvin Wyrich and   
              Justus Bogner and   
                  Stefan Wagner   40 Years of Designing Code Comprehension
                                  Experiments: a Systematic Mapping Study  106:1--106:??
              Thomas Heinis and   
          Roman Sokolovskii and   
               Jamie J. Alnasir   Survey of Information Encoding
                                  Techniques for DNA . . . . . . . . . . . 107:1--107:??

ACM Computing Surveys
Volume 56, Number 5, May, 2024

       Amin Hosseiny Marani and   
              Eric P. S. Baumer   A Review of Stability in Topic Modeling:
                                  Metrics for Assessing and Techniques for
                                  Improving Stability  . . . . . . . . . . 108:1--108:??
               Cigdem Beyan and   
     Alessandro Vinciarelli and   
                Alessio Del Bue   Co-Located Human-Human Interaction
                                  Analysis Using Nonverbal Cues: a Survey  109:1--109:??
               Artur Becker and   
     Carla M. Dal Sasso Freitas   Evaluation of XR Applications: a
                                  Tertiary Review  . . . . . . . . . . . . 110:1--110:??
                    Wen Fei and   
              Hiroyuki Ohno and   
              Srinivas Sampalli   A Systematic Review of IoT Security:
                                  Research Potential, Challenges, and
                                  Future Directions  . . . . . . . . . . . 111:1--111:??
                    Xuke Hu and   
               Zhiyong Zhou and   
                     Hao Li and   
                 Yingjie Hu and   
                 Fuqiang Gu and   
               Jens Kersten and   
               Hongchao Fan and   
                Friederike Klan   Location Reference Recognition from
                                  Texts: a Survey and Comparison . . . . . 112:1--112:??
                Qihan Huang and   
               Haofei Zhang and   
                 Mengqi Xue and   
                   Jie Song and   
                    Mingli Song   A Survey of Deep Learning for Low-shot
                                  Object Detection . . . . . . . . . . . . 113:1--113:??
             Ville Paananen and   
   Mohammad Sina Kiarostami and   
               Lee Lik-Hang and   
              Tristan Braud and   
                     Simo Hosio   From Digital Media to Empathic Spaces: a
                                  Systematic Review of Empathy Research in
                                  Extended Reality Environments  . . . . . 114:1--114:??
               Azra Seyyedi and   
             Mahdi Bohlouli and   
      Seyedehsan Nedaaee Oskoee   Machine Learning and Physics: a Survey
                                  of Integrated Models . . . . . . . . . . 115:1--115:??
                  Johann Li and   
              Guangming Zhu and   
                   Cong Hua and   
               Mingtao Feng and   
          Basheer Bennamoun and   
                    Ping Li and   
                Xiaoyuan Lu and   
                  Juan Song and   
                 Peiyi Shen and   
                      Xu Xu and   
                    Lin Mei and   
                Liang Zhang and   
         Syed Afaq Ali Shah and   
             Mohammed Bennamoun   A Systematic Collection of Medical Image
                                  Datasets for Deep Learning . . . . . . . 116:1--116:??
Zoltán Ádám Mann and   
          Christian Weinert and   
             Daphnee Chabal and   
                   Joppe W. Bos   Towards Practical Secure Neural Network
                                  Inference: The Journey So Far and the
                                  Road Ahead . . . . . . . . . . . . . . . 117:1--117:??
                 Jiayun Luo and   
                  Boyang Li and   
                    Cyril Leung   A Survey of Computer Vision Technologies
                                  in Urban and Controlled-environment
                                  Agriculture  . . . . . . . . . . . . . . 118:1--118:??
                    Feng Li and   
                Jianfeng Ma and   
                Yinbin Miao and   
                 Ximeng Liu and   
              Jianting Ning and   
                 Robert H. Deng   A Survey on Searchable Symmetric
                                  Encryption . . . . . . . . . . . . . . . 119:1--119:??
               Vaibhav Jain and   
      Devendra Kumar Sharma and   
            Hari Mohan Gaur and   
       Ashutosh Kumar Singh and   
                   Xiaoqing Wen   Comprehensive and Comparative Analysis
                                  of QCA-based Circuit Designs for
                                  Next-generation Computation  . . . . . . 120:1--120:??
                Yujuan Ding and   
                 Zhihui Lai and   
                  P. Y. Mok and   
                  Tat-Seng Chua   Computational Technologies for Fashion
                                  Recommendation: a Survey . . . . . . . . 121:1--121:??
                 Bing Huang and   
             Dipankar Chaki and   
         Athman Bouguettaya and   
                   Kwok-Yan Lam   A Survey on Conflict Detection in
                                  IoT-based Smart Homes  . . . . . . . . . 122:1--122:??
                 Dawei Zhou and   
                     Jingrui He   Rare Category Analysis for Complex Data:
                                  a Review . . . . . . . . . . . . . . . . 123:1--123:??
               Adnan Khalid and   
             Zohaib Mushtaq and   
                  Saad Arif and   
                 Kamran Zeb and   
      Muhammad Attique Khan and   
                  Sambit Bakshi   Control Schemes for Quadrotor UAV:
                                  Taxonomy and Survey  . . . . . . . . . . 124:1--124:??
            Thomas Hickling and   
          Abdelhafid Zenati and   
                 Nabil Aouf and   
              Phillippa Spencer   Explainability in Deep Reinforcement
                                  Learning: a Review into Current Methods
                                  and Applications . . . . . . . . . . . . 125:1--125:??
               Zhiqian Chen and   
               Fanglan Chen and   
                  Lei Zhang and   
                  Taoran Ji and   
                  Kaiqun Fu and   
                 Liang Zhao and   
                  Feng Chen and   
                 Lingfei Wu and   
             Charu Aggarwal and   
                  Chang-Tien Lu   Bridging the Gap between Spatial and
                                  Spectral Domains: a Unified Framework
                                  for Graph Neural Networks  . . . . . . . 126:1--126:??
                 Debo Cheng and   
                 Jiuyong Li and   
                    Lin Liu and   
                  Jixue Liu and   
                    Thuc Duy Le   Data-Driven Causal Effect Estimation
                                  Based on Graphical Causal Modelling: a
                                  Survey . . . . . . . . . . . . . . . . . 127:1--127:??
Santiago Villarreal-Narvaez and   
       Arthur Sluÿters and   
          Jean Vanderdonckt and   
             Radu-Daniel Vatavu   Brave New GES World: a Systematic
                                  Literature Review of Gestures and
                                  Referents in Gesture Elicitation Studies 128:1--128:??
              Fangjian Liao and   
               Xingxing Zou and   
                  Waikeung Wong   Appearance and Pose-guided Human
                                  Generation: a Survey . . . . . . . . . . 129:1--129:??
                  Shiwei Li and   
                Huifeng Guo and   
                  Xing Tang and   
               Ruiming Tang and   
                     Lu Hou and   
                 Ruixuan Li and   
                      Rui Zhang   Embedding Compression in Recommender
                                  Systems: a Survey  . . . . . . . . . . . 130:1--130:??
          Victor R. Kebande and   
                Ali Ismail Awad   Industrial Internet of Things Ecosystems
                                  Security and Digital Forensics:
                                  Achievements, Open Challenges, and
                                  Future Directions  . . . . . . . . . . . 131:1--131:??
             Aruna Jayasena and   
                 Prabhat Mishra   Directed Test Generation for Hardware
                                  Validation: a Survey . . . . . . . . . . 132:1--132:??
               Melike Gecer and   
               Benoit Garbinato   Federated Learning for Mobility
                                  Applications . . . . . . . . . . . . . . 133:1--133:??
              Gengrui Zhang and   
                    Fei Pan and   
                 Yunhao Mao and   
              Sofia Tijanic and   
           Michael Dang'ana and   
         Shashank Motepalli and   
              Shiquan Zhang and   
             Hans-Arno Jacobsen   Reaching Consensus in the Byzantine
                                  Empire: a Comprehensive Review of BFT
                                  Consensus Algorithms . . . . . . . . . . 134:1--134:??

ACM Computing Surveys
Volume 56, Number 6, June, 2024

          Marco De Vincenzi and   
       Gianpiero Costantino and   
           Ilaria Matteucci and   
              Florian Fenzl and   
         Christian Plappert and   
               Roland Rieke and   
                   Daniel Zelle   A Systematic Review on Security Attacks
                                  and Countermeasures in Automotive
                                  Ethernet . . . . . . . . . . . . . . . . 135:1--135:??
      Andrew Wei-Loong Wong and   
               Say Leng Goh and   
      Mohammad Kamrul Hasan and   
                  Salmah Fattah   Multi-Hop and Mesh for LoRa Networks:
                                  Recent Advancements, Issues, and
                                  Recommended Applications . . . . . . . . 136:1--136:??
                 Yanbin Liu and   
             Girish Dwivedi and   
             Farid Boussaid and   
             Mohammed Bennamoun   $3$D Brain and Heart Volume Generative
                                  Models: a Survey . . . . . . . . . . . . 137:1--137:??
                  Yanjie Li and   
                    Bin Xie and   
                Songtao Guo and   
              Yuanyuan Yang and   
                       Bin Xiao   A Survey of Robustness and Safety of
                                  $2$D and $3$D Deep Learning Models
                                  against Adversarial Attacks  . . . . . . 138:1--138:??
              Changlin Yang and   
               Kwan-Wu Chin and   
               Jiguang Wang and   
              Xiaodong Wang and   
                   Ying Liu and   
                    Zibin Zheng   Scaling Blockchains with Error
                                  Correction Codes: a Survey on Coded
                                  Blockchains  . . . . . . . . . . . . . . 139:1--139:??
            Sk Maidul Islam and   
          Subhankar Joardar and   
               Arif Ahmed Sekh*   A Survey on Fashion Image Retrieval  . . 140:1--140:??
Mohammad Hasan Ahmadilivani and   
               Mahdi Taheri and   
                  Jaan Raik and   
         Masoud Daneshtalab and   
                Maksim Jenihhin   A Systematic Literature Review on
                                  Hardware Reliability Assessment Methods
                                  for Deep Neural Networks . . . . . . . . 141:1--141:??
             Ghareeb Falazi and   
     Uwe Breitenbücher and   
              Frank Leymann and   
                 Stefan Schulte   Cross-Chain Smart Contract Invocations:
                                  a Systematic Multi-Vocal Literature
                                  Review . . . . . . . . . . . . . . . . . 142:1--142:??
João Eduardo Costa Gomes and   
   Ricardo Rodrigues Ehlert and   
    Rodrigo Murillo Boesche and   
     Vinicius Santosde Lima and   
 Jorgito Matiuzzi Stocchero and   
         Dante A. C. Barone and   
    JulianoAraujo Wickboldt and   
 Edison Pignaton de Freitas and   
      Julio C. S. dos Anjos and   
Ricardo Queiroz de Araujo Fernandes   Surveying Emerging Network Approaches
                                  for Military Command and Control Systems 143:1--143:??
               Sabina Szymoniak   Key Distribution and Authentication
                                  Protocols in Wireless Sensor Networks: a
                                  Survey . . . . . . . . . . . . . . . . . 144:1--144:??
            Pascal Maniriho and   
        Abdun Naser Mahmood and   
Mohammad Jabed Morshed Chowdhury   A Survey of Recent Advances in Deep
                                  Learning Models for Detecting Malware in
                                  Desktop and Mobile Platforms . . . . . . 145:1--145:??
                Zhisheng Ye and   
                    Wei Gao and   
                 Qinghao Hu and   
                   Peng Sun and   
               Xiaolin Wang and   
                Yingwei Luo and   
              Tianwei Zhang and   
                   Yonggang Wen   Deep Learning Workload Scheduling in GPU
                                  Datacenters: a Survey  . . . . . . . . . 146:1--146:??
         Ghadeer O. Ghosheh and   
                     Jin Li and   
                   Tingting Zhu   A Survey of Generative Adversarial
                                  Networks for Synthesizing Structured
                                  Electronic Health Records  . . . . . . . 147:1--147:??
           Matthew G. Gaber and   
            Mohiuddin Ahmed and   
                  Helge Janicke   Malware Detection with Artificial
                                  Intelligence: a Systematic Literature
                                  Review . . . . . . . . . . . . . . . . . 148:1--148:??
               Matilde Pato and   
       Márcia Barros and   
             Francisco M. Couto   Survey on Recommender Systems for
                                  Biomedical Items in Life and Health
                                  Sciences . . . . . . . . . . . . . . . . 149:1--149:??
           Simon Razniewski and   
               Hiba Arnaout and   
             Shrestha Ghosh and   
                Fabian Suchanek   Completeness, Recall, and Negation in
                                  Open-world Knowledge Bases: a Survey . . 150:1--150:??
               Huaming Chen and   
                   M. Ali Babar   Security for Machine Learning-based
                                  Software Systems: a Survey of Threats,
                                  Practices, and Challenges  . . . . . . . 151:1--151:??
                 Kanghua Mo and   
                  Peigen Ye and   
                Xiaojun Ren and   
               Shaowei Wang and   
                  Wenjun Li and   
                         Jin Li   Security and Privacy Issues in Deep
                                  Reinforcement Learning: Threats and
                                  Countermeasures  . . . . . . . . . . . . 152:1--152:??
               Jianping Yao and   
                Son N. Tran and   
               Saurabh Garg and   
                Samantha Sawyer   Deep Learning for Plant Identification
                                  and Disease Classification from Leaf
                                  Images: Multi-prediction Approaches  . . 153:1--153:??
                 Simon Khan and   
             Charles Devlen and   
              Michael Manno and   
                     Daqing Hou   Mouse Dynamics Behavioral Biometrics: a
                                  Survey . . . . . . . . . . . . . . . . . 154:1--154:??
                Jack Hughes and   
            Sergio Pastrana and   
            Alice Hutchings and   
                Sadia Afroz and   
              Sagar Samtani and   
                 Weifeng Li and   
         Ericsson Santana Marin   The Art of Cybercrime Community Research 155:1--155:??
         Budhitama Subagdja and   
           D. Shanthoshigaa and   
               Zhaoxia Wang and   
                    Ah-Hwee Tan   Machine Learning for Refining Knowledge
                                  Graphs: a Survey . . . . . . . . . . . . 156:1--156:??
               Maryam Zahid and   
           Alessio Bucaioni and   
             Francesco Flammini   Model-based Trustworthiness Evaluation
                                  of Autonomous Cyber-Physical Production
                                  Systems: a Systematic Mapping Study  . . 157:1--157:??
              Mingliang Dou and   
                 Jijun Tang and   
              Prayag Tiwari and   
                 Yijie Ding and   
                        Fei Guo   Drug-Drug Interaction Relation
                                  Extraction Based on Deep Learning: a
                                  Review . . . . . . . . . . . . . . . . . 158:1--158:??
                Jiahang Cao and   
               Jinyuan Fang and   
               Zaiqiao Meng and   
                Shangsong Liang   Knowledge Graph Embedding: a Survey from
                                  the Perspective of Representation Spaces 159:1--159:??
            Marius Becherer and   
       Omar Khadeer Hussain and   
                   Yu Zhang and   
           Frank den Hartog and   
                Elizabeth Chang   On Trust Recommendations in the Social
                                  Internet of Things --- A Survey  . . . . 160:1--160:??
            Giovanni Ciatto and   
         Federico Sabbatini and   
             Andrea Agiollo and   
             Matteo Magnini and   
                 Andrea Omicini   Symbolic Knowledge Extraction and
                                  Injection with Sub-symbolic Predictors:
                                  a Systematic Literature Review . . . . . 161:1--161:??