Last update:
Sat Nov 15 09:13:52 MST 2025
Aaron Finerman An Editorial Note . . . . . . . . . . . 1--1
William S. Dorn Editor's Preview\ldots . . . . . . . . . 2--5
Saul Rosen Electronic Computers: a Historical
Survey . . . . . . . . . . . . . . . . . 7--36
Robert F. Rosin Supervisory and Monitor Systems . . . . 37--54
R. L. Glass An Elementary Discussion of
Compiler/Interpreter Writing . . . . . . 55--77
William S. Dorn Editor's Preview \ldots . . . . . . . . 81--84
Lance J. Hoffman Computers and Privacy: a Survey . . . . 85--103
J. M. McKinney A Survey of Analytical Time-Sharing
Models . . . . . . . . . . . . . . . . . 105--116
George G. Dodd Elements of Data Management Systems . . 117--133
William S. Dorn Editor's Preview \ldots . . . . . . . . 135--138
M. V. Wilkes The Growth of Interest in
Microprogramming: a Literature Survey 139--145
Azriel Rosenfeld Picture Processing by Computer . . . . . 147--176
William S. Dorn Editor's Postview \ldots . . . . . . . . 177--177
William S. Dorn Editor's Preview \ldots . . . . . . . . 179--182
William Kent Assembler-Language Macroprogramming: a
Tutorial Oriented Toward the IBM 360 . . 183--196
Robert F. Rosin Contemporary Concepts of
Microprogramming and Emulation . . . . . 197--212
J. D. Aron Information Systems in Perspective . . . 213--236
William S. Dorn Editor's Preview \ldots . . . . . . . . 1--3
T. A. Dolotta Functional Specifications for
Typewriter-Like Time-Sharing Terminals 5--31
David Beech A Structural View of PL/I . . . . . . . 33--64
Doron J. Cohen and
C. C. Gotlieb A List Structure Form of Grammars for
Syntactic Analysis . . . . . . . . . . . 65--82
William S. Dorn Editor's Preview \ldots . . . . . . . . 83--87
Sally Yeates Sedelow The Computer in the Humanities and Fine
Arts . . . . . . . . . . . . . . . . . . 89--110
H. Hellerman and
H. J. Smith, Jr. Throughput Analysis of Some Idealized
Input, Output, and Compute Overlap
Configurations . . . . . . . . . . . . . 111--118
Ned Chapin Flowcharting With the ANSI Standard: a
Tutorial . . . . . . . . . . . . . . . . 119--146
William S. Dorn Editor's Preview \ldots . . . . . . . . 147--152
Peter J. Denning Virtual Memory . . . . . . . . . . . . . 153--189
M. H. MacDougall Computer System Simulation: an
Introduction . . . . . . . . . . . . . . 191--209
Cecil L. Smith Digital Control of Industrial Processes 211--241
William S. Dorn Editor's Postview \ldots . . . . . . . . 243--243
Albert C. Christoph Letter to the Editor:
``Assembler-Language Macroprogramming: A
Tutorial Oriented Toward the IBM 360'' 243--244
William Kent Letter to the Editor:
``Assembler-Language Macroprogramming: A
Tutorial Oriented Toward the IBM 360'' 244--244
Robert F. Rosin Erratum: ``Contemporary Concepts of
Microprogramming and Emulation'' . . . . 244--244
Donald E. Knuth Von Neumann's First Computer Program . . 247--260
Lyle B. Smith A Survey of Interactive Graphical
Systems for Mathematics . . . . . . . . 261--301
Robin Williams A Survey of Data Structures for Computer
Graphics Systems . . . . . . . . . . . . 1--21
Caxton C. Foster An Unclever Time-Sharing System . . . . 23--48
C. E. Price Table Lookup Techniques . . . . . . . . 49--64
E. G. Coffman and
M. J. Elphick and
A. Shoshani System Deadlocks . . . . . . . . . . . . 67--78
Henry C. Lucas, Jr. Performance Evaluation and Monitoring 79--91
Andries van Dam and
David E. Rice On-line Text Editing: a Survey . . . . . 93--114
Henry F. Ledgard Ten Mini-Languages: a Study of Topical
Issues in Programming Languages . . . . 115--146
W. A. Martin Sorting . . . . . . . . . . . . . . . . 147--174
Peter J. Denning Third Generation Computer Systems . . . 175--216
Peter J. Denning A Note on Paging Drum Efficiency . . . . 1--3
Peter Wegner The Vienna Definition Language . . . . . 5--63
W. R. Schucany and
Paul D. Minton and
B. Stanley Shannon, Jr. A Survey of Statistical Packages . . . . 65--79
J. Nievergelt and
J. C. Farrar What Machines Can and Cannot Do . . . . 81--96
Bernard Elspas and
Karl N. Levitt and
Richard J. Waldinger and
Abraham Waksman An Assessment of Techniques for Proving
Program Correctness . . . . . . . . . . 97--147
Eric A. Weiss An Appreciation . . . . . . . . . . . . 147--147
Leon Presser and
John R. White Linkers and Loaders . . . . . . . . . . 149--167
C. A. R. Hoare and
D. C. S. Allison Incomputability . . . . . . . . . . . . 169--178
Richard C. Holt Some Deadlock Properties of Computer
Systems . . . . . . . . . . . . . . . . 179--196
Byron W. Stutzman Data Communication Control Procedures 197--220
Bruce H. Barnes A Programmer's View of Automata . . . . 221--239
Theodore C. Willoughby Staffing the MIS Function . . . . . . . 241--259
Elliott I. Organick Editorial Policy \ldots . . . . . . . . 1--3
J. J. Horning and
B. Randell Process Structuring . . . . . . . . . . 5--30
J. L. Baer A Survey of Some Theoretical Aspects of
Multiprocessing . . . . . . . . . . . . 31--80
Azriel Rosenfeld Progress in Picture Processing: 1969--71 81--108
Udo W. Pooch and
Al Nieder A Survey of Indexing Techniques for
Sparse Matrices . . . . . . . . . . . . 109--133
William W. White A Status Report on Computing Algorithms
for Mathematical Programming . . . . . . 135--166
J. Daniel Couger Evolution of Business System Analysis
Techniques . . . . . . . . . . . . . . . 167--198
E. M. Timmreck Computer Selection Methodology . . . . . 200--222
Per Brinch Hansen Concurrent Programming Concepts . . . . 223--245
Ivan E. Sutherland and
Robert F. Sproull and
Robert A. Schumacker A Characterization of Ten Hidden-Surface
Algorithms . . . . . . . . . . . . . . . 1--55
Herbert Freeman Computer Processing of Line-Drawing
Images . . . . . . . . . . . . . . . . . 57--97
A. V. Aho and
S. C. Johnson LR Parsing . . . . . . . . . . . . . . . 99--124
Udo W. Pooch Translation of Decision Tables . . . . . 125--151
Daniel G. Bobrow and
Bertram Raphael New Programming Languages for Artificial
Intelligence Research . . . . . . . . . 153--174
Dennis G. Severance Identifier Search Mechanisms: a Survey
and Generalized Model . . . . . . . . . 175--194
J. Nievergelt Binary Search Trees and File
Organisation . . . . . . . . . . . . . . 195--207
Peter J. Denning Guest Editor's Overview \ldots . . . . . 209--211
P. J. Brown Programming and Documenting Software
Projects . . . . . . . . . . . . . . . . 213--220
J. M. Yohe An Overview of Programming Practices . . 221--245
Niklaus Wirth On the Composition of Well-Structured
Programs . . . . . . . . . . . . . . . . 247--259
Donald E. Knuth Structured Programming with go to
Statements . . . . . . . . . . . . . . . 261--301
Brian W. Kernighan and
P. J. Plauger Programming Style: Examples and
Counterexamples . . . . . . . . . . . . 303--319
Udo W. Pooch Corrigendum: ``Translation of Decision
Tables'' . . . . . . . . . . . . . . . . 321--321
Elliott I. Organick Editor's Overview . . . . . . . . . . . 1--1
W. D. Maurer and
T. G. Lewis Hash Table Methods . . . . . . . . . . . 5--19
Leon Presser Multiprogramming Coordination . . . . . 21--44
Calvin N. Mooers Computer Software and Copyright . . . . 45--72
John W. Boyse and
David R. Warn A Straightforward Model for Computer
Performance Prediction . . . . . . . . . 73--93
Ira W. Cotton Microeconomics and the Market for
Computer Services . . . . . . . . . . . 95--111
J. C. Huang An Approach to Program Testing . . . . . 113--128
Stephen R. Kimbleton and
G. Michael Schneider Computer Communication Networks:
Approaches, Objectives, and Performance
Considerations . . . . . . . . . . . . . 129--173
Elliott I. Organick Editorial Policy Update . . . . . . . . 173--173
Suhas S. Patil Guest Editor's Note \ldots . . . . . . . 175--175
Robert M. Keller Look-Ahead Processors . . . . . . . . . 177--195
George A. Anderson and
E. Douglas Jensen Computer Interconnection Structures:
Taxonomy, Characteristics, and Examples 197--213
Kenneth J. Thurber and
Leon D. Wald Associative and Parallel Processors . . 215--255
Elliott I. Organick Editor's Note . . . . . . . . . . . . . 257--257
Leon Presser Corrigendum: ``Multiprogramming
Coordination'' . . . . . . . . . . . . . 257--257
E. H. Sibley Guest Editor's Introduction: The
Development of Data-Base Technology . . 1--5
James P. Fry and
Edgar H. Sibley Evolution of Data-Base Management
Systems . . . . . . . . . . . . . . . . 7--42
Donald D. Chamberlin Relational Data-Base Management Systems 43--66
Robert W. Taylor and
Randall L. Frank CODASYL Data-Base Management Systems . . 67--103
D. C. Tsichritzis and
F. H. Lochovsky Hierarchical Data-Base Management: a
Survey . . . . . . . . . . . . . . . . . 105--123
Ann S. Michaels and
Benjamin Mittman and
C. Robert Carlson A Comparison of the Relational and
CODASYL Approaches to Data-Base
Management . . . . . . . . . . . . . . . 125--151
Elliott I. Organick Editorial Overview . . . . . . . . . . . 153--153
Andrew S. Tanenbaum A Tutorial on Algol 68 . . . . . . . . . 155--190
Michael Marcotty and
Henry F. Ledgard and
Gregor V. Bochmann A Sampler of Formal Definitions . . . . 191--276
S. S. Reddi and
E. A. Feustel A Conceptual Framework for Computer
Architecture . . . . . . . . . . . . . . 277--300
Raymond T. Yeh Guest Editorial \ldots . . . . . . . . . 301--303
Lloyd D. Fosdick and
Leon J. Osterweil Data Flow Analysis in Software
Reliability . . . . . . . . . . . . . . 305--330
Sidney L. Hantler and
James C. King An Introduction to Proving the
Correctness of Programs . . . . . . . . 331--353
Raymond T. Yeh Guest Editorial \ldots . . . . . . . . . 355--357
Peter J. Denning Fault Tolerant Operating Systems . . . . 359--389
H. Hecht Fault-Tolerant Software for Real-Time
Applications . . . . . . . . . . . . . . 391--407
Theodore A. Linden Operating System Structures to Support
Security and Reliable Software . . . . . 409--445
Tse-Yun Feng Guest Editorial: an Overview of Parallel
Processors and Processing . . . . . . . 1--2
S. S. Yau and
H. S. Fung Associative Processor Architecture --- a
Survey . . . . . . . . . . . . . . . . . 3--27
David J. Kuck A Survey of Parallel Machine
Organization and Programming . . . . . . 29--59
C. V. Ramamoorthy and
H. F. Li Pipeline Architecture . . . . . . . . . 61--102
Philip H. Enslow, Jr. Multiprocessor Organization --- a Survey 103--129
Peter J. Denning About This Issue \ldots . . . . . . . . 131--131
Peter J. Denning Editorial Policy . . . . . . . . . . . . 133--135
Robert Sedgewick Permutation Generation Methods . . . . . 137--164
Roy Levin and
Peter J. Denning Surveyor's Forum: an Amplification on
Hydra's Capabilities . . . . . . . . . . 165--165
James Donahue Surveyor's Forum: a Criticism of Sampler 166--167
Michael Marcotty and
Henry F. Ledgard Surveyor's Forum: a Criticism of Sampler 167--168
Michael Marcotty and
Henry F. Ledgard and
Gregor V. Bochmann Corrigendum: ``A Sampler of Formal
Definitions'' . . . . . . . . . . . . . 168--168
Peter J. Denning About This Issue \ldots . . . . . . . . 171--172
Mario J. Gonzalez, Jr. Deterministic Processor Scheduling . . . 173--204
Lester Lipsky and
J. D. Church Applications of a Queueing Network Model
for a Computer System . . . . . . . . . 205--221
James L. Peterson Petri Nets . . . . . . . . . . . . . . . 223--252
J. K. Iliffe Surveyor's Forum: an Error Recovery . . 253--254
Jack B. Dennis Surveyor's Forum: An Error Recovery . . 254--254
Peter J. Denning Surveyor's Forum: an Error Recovery . . 254--255
Andrew S. Tanenbaum Corrigenda: ``A Tutorial on Algol 68'' 255--256
Peter J. Denning About This Issue \ldots . . . . . . . . 257--257
D. G. Severance and
J. V. Carlis A Practical Approach to Selecting Record
Access Paths . . . . . . . . . . . . . . 259--272
William M. Taggart, Jr. and
Marvin O. Tharp A Survey of Information Requirements
Analysis Techniques . . . . . . . . . . 273--290
Bruce Weide A Survey of Analysis Techniques for
Discrete Algorithms . . . . . . . . . . 291--313
Robert Sedgewick Corrigenda: ``Permutation Generation
Methods'' . . . . . . . . . . . . . . . 314--314
Thomas W. Parsons Surveyor's Forum: a Forgotten Generation
of Permutations . . . . . . . . . . . . 315--315
I. R. MacCallum Surveyor's Forum: a Forgotten Generation
of Permutations . . . . . . . . . . . . 316--317
Peter J. Denning About This Issue \ldots . . . . . . . . 1--2
Ann Fitzsimmons and
Tom Love A Review and Evaluation of Software
Science . . . . . . . . . . . . . . . . 3--18
John Leslie King and
Edward L. Schrems Cost-Benefit Analysis in Information
Systems Development and Operation . . . 19--34
Erik Sandewall Programming in an Interactive
Environment: the ``\sc Lisp'' Experience 35--71
Ronald J. Srodawa Positive Experiences with a
Multiprocessing System . . . . . . . . . 73--82
Montgomery Phister, Jr. Surveyor's Forum: Putting Costs Through
Effectively . . . . . . . . . . . . . . 83--83
Lester Lipsky and
James D. Church Surveyor's Forum: Putting Costs Through
Effectively: Author's Reply . . . . . . 83--84
H. J. Genrich and
P. S. Thiagarajan Surveyor's Forum: Net Progress . . . . . 84--85
James Peterson Surveyor's Forum: Net Progress: Author's
Reply . . . . . . . . . . . . . . . . . 85--85
Peter J. Denning About This Issue \ldots . . . . . . . . 87--87
Peter J. Denning Editorial Policy . . . . . . . . . . . . 89--92
N. C. Davis and
S. E. Goodman The Soviet Bloc's Unified System of
Computers . . . . . . . . . . . . . . . 93--122
B. Randell and
P. A. Lee and
P. C. Treleaven Reliability Issues in Computing System
Design . . . . . . . . . . . . . . . . . 123--165
Joost S. M. Verhofstad Recovery Techniques for Database Systems 167--195
Marvin V. Zelkowitz Perspectives in Software Engineering . . 197--216
Nathan Relles Surveyor's Forum: Devising the Rhetoric
of Rhetorical Devices . . . . . . . . . 217--217
G. Scott Graham Guest Editor's Overview\ldots Queuing
Network Models of Computer System
Performance . . . . . . . . . . . . . . 219--224
Peter J. Denning and
Jeffrey P. Buzen The Operational Analysis of Queueing
Network Models . . . . . . . . . . . . . 225--261
Clifford A. Rose A Measurement Procedure for Queueing
Network Models of Computer Systems . . . 263--280
K. Mani Chandy and
Charles H. Sauer Approximate Methods for Analyzing
Queueing Network Models of Computing
Systems . . . . . . . . . . . . . . . . 281--317
Jeffrey P. Buzen A Queueing Network Model of MVS . . . . 319--331
Y. Bard The VM/370 Performance Predictor . . . . 333--342
J. W. Wong Queueing Network Modeling of Computer
Communication Networks . . . . . . . . . 343--351
Richard R. Muntz Queueing Networks: a Critique of the
State of the Art and Directions for the
Future . . . . . . . . . . . . . . . . . 353--359
John Gaschnig Surveyor's Forum: Experimental Analysis
Discretely Done . . . . . . . . . . . . 361--361
Bruce W. Weide Surveyor's Forum: Experimental Analysis
Discretely Done: Author's Reply . . . . 361--362
Peter J. Denning About This Issue \ldots . . . . . . . . 363--364
William M. Newman and
Andries van Dam Recent Efforts Towards Graphics
Standardization . . . . . . . . . . . . 365--380
James C. Michener and
Andries van Dam Functional Overview of the Core System
with Glossary . . . . . . . . . . . . . 381--387
R. Daniel Bergeron and
Peter R. Bono and
James D. Foley Graphics Programming Using the Core
System . . . . . . . . . . . . . . . . . 389--443
James C. Michener and
James D. Foley Some Major Issues in the Design of the
Core Graphics System . . . . . . . . . . 445--463
Ingrid Carlbom and
Joseph Paciorek Planar Geometric Projections and Viewing
Transformations . . . . . . . . . . . . 465--502
Paul B. Moranda Surveyor's Forum: Is Software Science
Hard? . . . . . . . . . . . . . . . . . 503--504
T. P. Baker Surveyor's Forum: Is Software Science
Hard? . . . . . . . . . . . . . . . . . 504--504
Ann Fitzsimmons and
Tom Love Surveyor's Forum: Is Software Science
Hard? . . . . . . . . . . . . . . . . . 504--505
Richard M. Stallman Surveyor's Forum: Structured Editing
with a Lisp . . . . . . . . . . . . . . 505--507
Erik Sandewall Surveyor's Forum: Structured Editing
with a \sc Lisp . . . . . . . . . . . . 507--508
C. V. Ramamoorthy and
H. F. Li Corrigenda: ``Pipeline Architecture'' 508--508
Peter J. Denning About This Issue \ldots . . . . . . . . 1--1
Dan Bernard Management Issues in Cooperative
Computing . . . . . . . . . . . . . . . 3--17
Norman I. Badler and
Stephen W. Smoliar Digital Representations of Human
Movement . . . . . . . . . . . . . . . . 19--38
Subrata Dasgupta The Organization of Microprogram Stores 39--65
Edward A. Bender Surveyor's Forum: a Recurrent Problem 67--68
Bruce W. Weide Surveyor's Forum: a Recurrent Problem 68--68
Irving K. Wendel Surveyor's Forum: The Real Costs of
Software . . . . . . . . . . . . . . . . 68--68
Marvin Zelkowitz Surveyor's Forum: The Real Costs of
Software . . . . . . . . . . . . . . . . 69--69
Yonathan Bard Surveyor's Forum: Stochastic or
Operational? . . . . . . . . . . . . . . 69--70
Jeffrey P. Buzen and
Peter J. Denning Surveyor's Forum: Stochastic or
Operational? . . . . . . . . . . . . . . 70--70
Jeffrey P. Buzen Surveyor's Forum: a Predictable Problem 71--72
Richard R. Muntz Surveyor's Forum: a Predictable Problem 72--72
Adele Goldberg About This Issue \ldots . . . . . . . . 73--74
Adele Goldberg Editorial Policy . . . . . . . . . . . . 75--78
Jacques Cohen Non-De\-ter\-min\-is\-tic Algorithms . . 79--94
Francisco Walter Molina A Survey of Resource Directive
Decomposition in Mathematical
Programming . . . . . . . . . . . . . . 95--104
Lynn J. McKell and
James V. Hansen and
Lester E. Heitger Charging for Computing Resources . . . . 105--120
Douglas Comer Ubiquitous B-Tree . . . . . . . . . . . 121--137
George Nagy and
Sharad Wagle Geographic Data Processing . . . . . . . 139--181
Adele Goldberg About This Issue \ldots . . . . . . . . 183--183
Won Kim Relational Database Systems . . . . . . 187--211
A. G. Dale Database Management Systems Development
in the USSR . . . . . . . . . . . . . . 213--226
Dorothy E. Denning and
Peter J. Denning Data Security . . . . . . . . . . . . . 227--249
Siba N. Mohanty Models and Measurements for Quality
Assessment of Software . . . . . . . . . 251--275
Robert Fenichel Surveyor's Forum: Heads I Win, Tails You
Lose . . . . . . . . . . . . . . . . . . 277--277
Stuart H. Zweben Surveyor's Forum: Heads I Win, Tails You
Lose . . . . . . . . . . . . . . . . . . 277--278
H. Christiaen Surveyor's Forum: Projecting Problems 278--279
Ingrid Carlbom Surveyor's Forum: Projecting Problems 279--280
Ingrid Carlbom and
Joseph Paciorek Corrigenda: ``Geometric Projection and
Viewing Transformations'' . . . . . . . 280--280
Adele J. Goldberg About This Issue \ldots . . . . . . . . 281--281
Peter J. Denning Editor's Overview --- Special Section on
Data Encryption . . . . . . . . . . . . 283--283
Abraham Lempel Cryptology in Transition . . . . . . . . 285--303
Gustavus J. Simmons Symmetric and Asymmetric Encryption . . 305--330
Gerald J. Popek and
Charles S. Kline Encryption and Secure Computer Networks 331--356
Herbert S. Bright and
Richard L. Enison Quasi-Random Number Sequences from a
Long-Period TLP Generator with Remarks
on Application to Cryptography . . . . . 357--370
Gary H. Sockut and
Robert P. Goldberg Database Reorganization --- Principles
and Practice . . . . . . . . . . . . . . 371--395
Jon Louis Bentley and
Jerome H. Friedman Data Structures for Range Searching . . 397--409
David S. Alberts Surveyor's Forum: a Question of
Transition . . . . . . . . . . . . . . . 411--411
Marvin V. Zelkowitz Surveyor's Forum: a Question of
Transition . . . . . . . . . . . . . . . 411--412
Douglas Comer Surveyor's Forum: The Tree Branches . . 412--412
Maylun Buck-Lew Surveyor's Forum: a Dance Prelude . . . 412--413
Adele J. Goldberg About This Issue \ldots . . . . . . . . 1--2
Fred J. Maryanski Backend Database Systems . . . . . . . . 3--25
Clarence A. Ellis and
Gary J. Nutt Office Information Systems and Computer
Science . . . . . . . . . . . . . . . . 27--60
Rob Kling Social Analyses of Computing:
Theoretical Perspectives in Recent
Empirical Research . . . . . . . . . . . 61--110
E. B. Fernandez Surveyor's Forum: Related Information 111--112
Won Kim Surveyor's Forum: Related Information 112--112
Oris D. Friesen Surveyor's Forum: Related Information 112--113
Adele J. Goldberg About This Issue \ldots . . . . . . . . 115--116
Adele J. Goldberg Editorial Policy . . . . . . . . . . . . 117--120
Anita K. Jones and
Peter Schwarz Experience Using Multiprocessor Systems
--- a Status Report . . . . . . . . . . 121--165
C. K. Wong Minimizing Expected Head Movement in
One-Dimensional and Two-Dimensional Mass
Storage Systems . . . . . . . . . . . . 167--178
Toby J. Teorey and
James P. Fry The Logical Record Access Approach to
Database Design . . . . . . . . . . . . 179--211
Lee D. Erman and
Frederick Hayes-Roth and
Victor R. Lesser and
D. Raj Reddy The Hearsay-II Speech-Understanding
System: Integrating Knowledge to Resolve
Uncertainty . . . . . . . . . . . . . . 213--253
Stanley Dunn Surveyor's Forum: Working on
Interpretations . . . . . . . . . . . . 255--255
Siba Mohanty Surveyor's Forum: Working on
Interpretations . . . . . . . . . . . . 256--256
Adele J. Goldberg About This Issue \ldots . . . . . . . . 257--258
Stanley Habib Special Section on Microprogramming . . 259--259
David Landskov and
Scott Davidson and
Bruce Shriver and
Patrick W. Mallett Local Microcode Compaction Techniques 261--294
Subrata Dasgupta Some Aspects of High-Level
Microprogramming . . . . . . . . . . . . 295--323
Wesley A. Clark From Electron Mobility to Logical
Structure: a View of Integrated Circuits 325--356
Walter Wilson Surveyor's Forum: Determining a Search 357--358
Jacques Cohen Surveyor's Forum: Determining a Search 358--358
Adele J. Goldberg About This Issue \ldots . . . . . . . . 359--360
C. S. Wetherell Probabilistic Languages: a Review and
Some Open Questions . . . . . . . . . . 361--379
Patrick A. V. Hall and
Geoff R. Dowling Approximate String Matching . . . . . . 381--402
R. S. Bird Tabulation Techniques for Recursive
Programs . . . . . . . . . . . . . . . . 403--417
George S. Lueker Some Techniques for Solving Recurrences 419--436
Aristides A. G. Requicha Representations for Rigid Solids:
Theory, Methods, and Systems . . . . . . 437--464
Toby J. Teorey and
James P. Fry Corrigenda: ``The Logical Record Access
Approach to Database Design'' . . . . . 465--465
Thomas P. Moran Guest Editor's Introduction: an Applied
Psychology of the User . . . . . . . . . 1--11
Phyllis Reisner Human Factors Studies of Database Query
Languages: a Survey and Assessment . . . 13--31
David W. Embley and
George Nagy Behavioral Aspects of Text Editors . . . 33--70
William B. Rouse Human-Computer Interaction in the
Control of Dynamic Systems . . . . . . . 71--99
B. A. Sheil The Psychological Study of Programming 101--120
Richard E. Mayer The Psychology of How Novices Learn
Computer Programming . . . . . . . . . . 121--141
Adele Goldberg About This Issue \ldots . . . . . . . . 143--144
Adele Goldberg Editorial Policy . . . . . . . . . . . . 145--148
Walter H. Kohler A Survey of Techniques for
Synchronization and Recovery in
Decentralized Computer Systems . . . . . 149--183
Philip A. Bernstein and
Nathan Goodman Concurrency Control in Distributed
Database Systems . . . . . . . . . . . . 185--221
Jim Gray and
Paul McJones and
Mike Blasgen and
Bruce Lindsay and
Raymond Lorie and
Tom Price and
Franco Putzolu and
Irving Traiger The Recovery Manager of the System R
Database Manager . . . . . . . . . . . . 223--242
R. S. Bird Surveyor's Forum: a Recurring Bug . . . 243--243
Helmut Richter Surveyor's Forum: a Recurring Bug . . . 243--243
Adele Goldberg About This Issue \ldots . . . . . . . . 245--245
Carl E. Landwehr Formal Models for Computer Security . . 247--278
Maureen Harris Cheheyl and
Morrie Gasser and
George A. Huff and
Jonathan K. Millen Verifying Security . . . . . . . . . . . 279--339
Jacques Cohen Garbage Collection of Linked Data
Structures . . . . . . . . . . . . . . . 341--367
Aristides A. G. Requicha Surveyor's Forum: an Update on
SynthaVision . . . . . . . . . . . . . . 369--369
Herbert A. Steinberg Surveyor's Forum: an Update on
SynthaVision . . . . . . . . . . . . . . 369--369
Douglas J. Keenan Surveyor's Forum: Generating Solutions 370--370
George S. Lueker Surveyor's Forum: Generating Solutions 370--370
Adele Goldberg About This Issue \ldots . . . . . . . . 371--372
Narendra Ahuja and
B. J. Schachter Image Models . . . . . . . . . . . . . . 373--397
Sargur N. Srihari Representation of Three-Dimensional
Digital Images . . . . . . . . . . . . . 399--424
Edward H. Frank and
Robert F. Sproull Testing and Debugging Custom Integrated
Circuits . . . . . . . . . . . . . . . . 425--451
Andrew S. Tanenbaum Network Protocols . . . . . . . . . . . 453--489
Christiane Floyd and
Reinhard Keil and
Erhard Nullmeier Surveyor's Forum: Augmentation or
Dehumanization? . . . . . . . . . . . . 491--492
Thomas P. Moran Surveyor's Forum: Augmentation or
Dehumanization? . . . . . . . . . . . . 492--493
Bruce Leverett Surveyor's Forum: Interpreting
Experimental Data . . . . . . . . . . . 493--494
David W. Embley and
George Nagy Surveyor's Forum: Interpreting
Experimental Data . . . . . . . . . . . 494--494
Adele Goldberg About This Issue \ldots . . . . . . . . 1--2
Michael Brady Computational Approaches to Image
Understanding . . . . . . . . . . . . . 3--71
Alan R. Feuer and
Narain H. Gehani Comparison of the Programming Languages
C and Pascal . . . . . . . . . . . . . . 73--92
Philip C. Treleaven and
David R. Brownbridge and
Richard P. Hopkins Data-Driven and Demand-Driven Computer
Architecture . . . . . . . . . . . . . . 93--143
David P. Reed Surveyor's Forum: Recovering an Error 145--146
Walter H. Kohler Surveyor's Forum: Recovering an Error 146--147
Adele J. Goldberg About This Issue \ldots . . . . . . . . 149--150
Adele J. Goldberg Editorial Policy . . . . . . . . . . . . 151--157
W. Richards Adrion and
Martha A. Branstad and
John C. Cherniavsky Validation, Verification, and Testing of
Computer Software . . . . . . . . . . . 159--192
William E. Howden Validation of Scientific Programs . . . 193--227
Douglas D. Dunlop and
Victor R. Basili A Comparative Analysis of Functional
Correctness . . . . . . . . . . . . . . 229--244
Frank W. Allen and
Mary E. S. Loomis and
Michael V. Mannino The Integrated Dictionary/Directory
System . . . . . . . . . . . . . . . . . 245--286
Lawrence W. Dowdy and
Derrell V. Foster Comparative Models of the File
Assignment Problem . . . . . . . . . . . 287--313
Heinz Bender Surveyor's Forum: Technical Transactions 315--316
David Gifford Surveyor's Forum: Technical Transactions 316--316
Philip Bernstein and
Nathan Goodman Surveyor's Forum: Technical Transactions 317--318
Adele J. Goldberg About This Issue \ldots . . . . . . . . 319--320
Norman Meyrowitz and
Andries Van Dam Interactive Editing Systems: Part I . . 321--352
Norman Meyrowitz and
Andries van Dam Interactive Editing Systems: Part II . . 353--415
Richard Furuta and
Jeffrey Scofield and
Alan Shaw Document Formatting Systems: Survey,
Concepts, and Issues . . . . . . . . . . 417--472
Alan Jay Smith Cache Memories . . . . . . . . . . . . . 473--530
Adele J. Goldberg About This Issue \ldots . . . . . . . . 531--532
T. A. Marsland and
M. Campbell Parallel Search of Strongly Ordered Game
Trees . . . . . . . . . . . . . . . . . 533--551
Stephen T. Barnard and
Martin A. Fischler Computational Stereo . . . . . . . . . . 553--572
Mahadevan Ganapathi and
Charles N. Fischer and
John L. Hennessy Retargetable Compiler Code Generation 573--592
Bernard M. E. Moret Decision Trees and Diagrams . . . . . . 593--623
James L. Peterson Surveyor's Forum: Idiomatic Programming 625--625
Alan R. Feuer and
Narain H. Gehani Surveyor's Forum: Idiomatic Programming 625--626
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 1--2
Gregory R. Andrews and
Fred B. Schneider Concepts and Notations for Concurrent
Programming . . . . . . . . . . . . . . 3--43
Salvatore T. March Techniques for Structuring Database
Records . . . . . . . . . . . . . . . . 45--79
J. (Yiannis) G. Kollias and
Michalis Hatzopoulos Surveyor's Forum: The File Assignment
Problem . . . . . . . . . . . . . . . . 81--82
Lawrence W. Dowdy and
Derrell V. Foster Surveyor's Forum: The File Assignment
Problem . . . . . . . . . . . . . . . . 82--82
Govind Sharma Surveyor's Forum: Image Models . . . . . 83--84
Narendra Ahuja and
B. J. Schachter Surveyor's Forum: Image Models . . . . . 84--84
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 85--86
Anthony I. Wasserman Editorial Policy . . . . . . . . . . . . 87--94
George Broomell and
J. Robert Heath Classification Categories and Historical
Development of Circuit Switching
Topologies . . . . . . . . . . . . . . . 95--133
Victor L. Voydock and
Stephen T. Kent Security Mechanisms in High-Level
Network Protocols . . . . . . . . . . . 135--171
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 173--174
Magdy S. Abadir and
Hassan K. Reghbati Functional Testing of Semiconductor
Random Access Memories . . . . . . . . . 175--198
H. Partsch and
R. Steinbrüggen Program Transformation Systems . . . . . 199--236
Dana Angluin and
Carl H. Smith Inductive Inference: Theory and Methods 237--269
Bennet P. Lientz Issues in Software Maintenance . . . . . 271--278
William A. Wulf and
Joe Newcomer and
Bruce Leverett and
Rick Cattell and
Paul Knueven Surveyor's Forum: Retargetable Code
Generators . . . . . . . . . . . . . . . 279--280
M. Ganapathi and
J. L. Hennessy and
C. N. Fischer Surveyor's Forum: Retargetable Code
Generators . . . . . . . . . . . . . . . 280--281
Christopher W. Fraser Surveyor's Forum: Retargetable Code
Generators . . . . . . . . . . . . . . . 281--283
M. Ganapathi and
J. L. Hennessy and
C. N. Fischer Surveyor's Forum: Retargetable Code
Generators . . . . . . . . . . . . . . . 283--284
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 285--286
Theo Haerder and
Andreas Reuter Principles of Transaction Oriented
Database Recovery . . . . . . . . . . . 287--317
John Leslie King Centralized versus decentralized
computing:organizational considerations
and management options . . . . . . . . . 319--349
D. L. Lee and
F. H. Lochovsky Voice Response Systems . . . . . . . . . 351--374
M. Stella Atkins Surveyor's Forum: Notations for
Concurrent Programming . . . . . . . . . 375--376
Gregory R. Andrews and
Fred B. Schneider Surveyor's Forum: Notations for
Concurrent Programming . . . . . . . . . 376--377
Gregory R. Andrews and
Fred B. Schneider Corrigenda: ``Concepts and notations for
concurrent programs'' . . . . . . . . . 377--377
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 1--2
William Stallings Local Networks . . . . . . . . . . . . . 3--41
James F. Kurose and
Mischa Schwartz and
Yechiam Yemini Multiple-Access Protocols and
Time-Con\-strained Communication . . . . 43--70
Won Kim Highly Available Systems for Database
Applications . . . . . . . . . . . . . . 71--98
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 99--100
Anthony I. Wasserman About the Authors \ldots . . . . . . . . 101--102
Anthony I. Wasserman Editorial Policy . . . . . . . . . . . . 103--110
Matthias Jarke and
Jürgen Koch Query Optimization in Database Systems 111--152
Hervé Gallaire and
Jack Minker and
Jean-Marie Nicolas Logic and Databases: a Deductive
Approach . . . . . . . . . . . . . . . . 153--185
Hanan Samet The Quadtree and Related Hierarchical
Data Structures . . . . . . . . . . . . 187--260
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 261--262
Anthony I. Wasserman About the Authors \ldots . . . . . . . . 263--264
Ben Shneiderman Response Time and Display Rate in Human
Performance with Computers . . . . . . . 265--285
Dina Bitton and
David J. DeWitt and
David K. Hsiao and
Jaishankar Menon A Taxonomy of Parallel Sorting . . . . . 287--318
Michael J. Quinn and
Narsingh Deo Parallel Graph Algorithms . . . . . . . 319--348
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 349--350
Anthony I. Wasserman About the Authors \ldots . . . . . . . . 351--351
Liba Svobodova File Servers for Network-Based
Distributed Systems . . . . . . . . . . 353--398
C. T. Yu and
C. C. Chang Distributed Query Processing . . . . . . 399--433
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 1--2
Anthony I. Wasserman About the Authors \ldots . . . . . . . . 3--4
Gopal K. Gupta and
Ron Sacks-Davis and
Peter E. Tischer A Review of Recent Developments in
Solving ODEs . . . . . . . . . . . . . . 5--47
Christos Faloutsos Access Methods for Text . . . . . . . . 49--74
Paul J. Besl and
Ramesh C. Jain Three-Dimensional Object Recognition . . 75--145
Curtis Abbott Guest Editor's Introduction to the
Special Issue on Computer Music . . . . 147--151
Anthony I. Wasserman About the Authors \ldots . . . . . . . . 153--154
Anthony I. Wasserman Editorial Policy . . . . . . . . . . . . 155--162
Curtis Roads Research in Music and Artificial
Intelligence . . . . . . . . . . . . . . 163--190
John W. Gordon System Architectures for Computer Music 191--233
Gareth Loy and
Curtis Abbott Programming Languages for Computer Music
Synthesis, Performance, and Composition 235--265
Bruce W. Pennycook Computer-Music Interfaces: a Survey . . 267--289
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 291--292
Anthony I. Wasserman About the Authors \ldots . . . . . . . . 293--294
James H. Hester and
Daniel S. Hirschberg Self-Organizing Linear Search . . . . . 295--311
Matthias Jarke and
Yannis Vassiliou A Framework for Choosing a Database
Query Language . . . . . . . . . . . . . 313--340
Susan B. Davidson and
Hector Garcia-Molina and
Dale Skeen Consistency in Partitioned Networks . . 341--370
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 375--376
Anthony I. Wasserman About the Authors \ldots . . . . . . . . 377--378
John S. Quarterman and
Abraham Silberschatz and
James L. Peterson 4.2BSD and 4.3BSD as Examples of the
UNIX System . . . . . . . . . . . . . . 379--418
Andrew S. Tanenbaum and
Robbert van Renesse Distributed Operating Systems . . . . . 419--470
Luca Cardelli and
Peter Wegner On Understanding Types, Data
Abstraction, and Polymorphism . . . . . 471--522
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 1--2
Anthony I. Wasserman About the Authors \ldots . . . . . . . . 3--4
R. H. Perrott and
A. Zarea-Aliabadi Supercomputer Languages . . . . . . . . 5--22
Zvi Galil Efficient Algorithms for Finding Maximum
Matching in Graphs . . . . . . . . . . . 23--38
Jayadev Misra Distributed Discrete-Event Simulation 39--65
Roland T. Chin and
Charles R. Dyer Model-Based Recognition in Robot Vision 67--108
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 113--114
Anthony I. Wasserman About the Authors \ldots . . . . . . . . 115--116
Anthony I. Wasserman Editorial Policy . . . . . . . . . . . . 117--124
Nancy G. Leveson Software Safety: Why, What, and How . . 125--163
R. A. Hirschheim The Effect of \em A Priori Views on the
Social Implications of Computing: The
Case of Office Automation . . . . . . . 165--195
Toby J. Teorey and
Dongqing Yang and
James P. Fry A Logical Design Methodology for
Relational Databases Using the Extended
Entity-Relationship Model . . . . . . . 197--222
Salvatore T. March About This Issue \ldots . . . . . . . . 227--228
Salvatore T. March About the Authors \ldots . . . . . . . . 229--229
Ali Mili and
Jules Desharnais and
Jean Raymond Gagné Formal Models of Stepwise Refinement of
Programs . . . . . . . . . . . . . . . . 231--276
Barbara G. Ryder and
Marvin C. Paull Elimination Algorithms for Data Flow
Analysis . . . . . . . . . . . . . . . . 277--316
Salvatore T. March About This Issue \ldots . . . . . . . . 319--319
Salvatore T. March About the Authors \ldots . . . . . . . . 321--321
C. Batini and
M. Lenzerini and
S. B. Navathe A Comparative Analysis of Methodologies
for Database Schema Integration . . . . 323--364
Arthur H. Veen Dataflow Machine Architecture . . . . . 365--396
Salvatore T. March About This Issue \ldots . . . . . . . . 1--1
Salvatore T. March About the Authors \ldots . . . . . . . . 3--3
Kalle Lyytinen Different Perspectives on Information
Systems: Problems and Solutions . . . . 5--46
Alfons Kemper and
Mechtild Wallrath An Analysis of Geometric Modeling in
Database Systems . . . . . . . . . . . . 47--91
Salvatore T. March About This Issue \ldots . . . . . . . . 93--93
Salvatore T. March About the Authors \ldots . . . . . . . . 95--95
Salvatore T. March Editorial Policy . . . . . . . . . . . . 97--104
Malcolm P. Atkinson and
O. Peter Buneman Types and Persistence in Database
Programming Languages . . . . . . . . . 105--190
Arie Segev Surveyor's Forum: Transitive
Dependencies . . . . . . . . . . . . . . 191--192
Toby J. Teorey Surveyor's Forum: Transitive
Dependencies . . . . . . . . . . . . . . 193--193
Ali Mili and
Jules Desharnais and
Jean Raymond Gagné Corrigendum: ``Formal Models of Stepwise
Refinements of Programs'' . . . . . . . 195--195
Salvatore T. March About This Issue \ldots . . . . . . . . 197--198
Salvatore T. March About the Authors \ldots . . . . . . . . 199--199
Richard Hull and
Roger King Semantic Database Modeling: Survey,
Applications, and Research Issues . . . 201--260
Debra A. Lelewer and
Daniel S. Hirschberg Data Compression . . . . . . . . . . . . 261--296
Salvatore T. March About This Issue \ldots . . . . . . . . 299--299
Salvatore T. March About the Authors \ldots . . . . . . . . 301--301
Edgar Knapp Deadlock Detection in Distributed
Databases . . . . . . . . . . . . . . . 303--328
Carol Bergfeld Mills and
Linda J. Weldon Reading Text from Computer Screens . . . 329--358
Salvatore T. March About This Issue \ldots . . . . . . . . 1--1
Salvatore T. March About the Authors \ldots . . . . . . . . 3--3
Hideaki Takagi Queuing Analysis of Polling Models . . . 5--28
Scott Danforth and
Chris Tomlinson Type Theories and Object-Oriented
Programming . . . . . . . . . . . . . . 29--72
Salvatore T. March About This Issue \ldots . . . . . . . . 73--73
Salvatore T. March About the Authors \ldots . . . . . . . . 75--75
Salvatore T. March Editorial Policy . . . . . . . . . . . . 77--84
R. J. Enbody and
H. C. Du Dynamic Hashing Schemes . . . . . . . . 85--113
Kenneth L. Kraemer and
John Leslie King Computer-Based Systems for Cooperative
Work and Group Decision Making . . . . . 115--146
Salvatore T. March About This Issue \ldots . . . . . . . . 149--149
Salvatore T. March About the Authors \ldots . . . . . . . . 151--151
Joan Peckham and
Fred Maryanski Semantic Data Models . . . . . . . . . . 153--189
Michael V. Mannino and
Paicheng Chu and
Thomas Sager Statistical Profile Estimation in
Database Systems . . . . . . . . . . . . 191--221
Salvatore T. March About This Issue \ldots . . . . . . . . 223--224
Salvatore T. March About the Authors \ldots . . . . . . . . 225--225
Allen M. Johnson, Jr. and
Miroslaw Malek Survey of Software Tools for Evaluating
Reliability, Availability, and
Serviceability . . . . . . . . . . . . . 227--269
Hanan Samet Hierarchical Representations of
Collections of Small Rectangles . . . . 271--309
Salvatore T. March About This Issue \ldots . . . . . . . . 1--2
Salvatore T. March About the Authors \ldots . . . . . . . . 3--3
H. Rex Hartson and
Deborah Hix Human-Computer Interface Development:
Concepts and Systems for Its Management 5--92
Kevin Knight Unification: a Multidisciplinary Survey 93--124
Salvatore T. March About This Issue \ldots . . . . . . . . 125--126
Salvatore T. March About the Authors \ldots . . . . . . . . 127--127
Salvatore T. March Editorial Policy . . . . . . . . . . . . 129--136
Bruce Abramson Control Strategies for Two-Player Games 137--161
Thomas Ellman Explanation-Based Learning: a Survey of
Programs and Perspectives . . . . . . . 163--221
Charles J. Colbourn and
Paul C. van Oorschot Applications of Combinatorial Designs in
Computer Science . . . . . . . . . . . . 223--250
Salvatore T. March About This Issue \ldots . . . . . . . . 251--251
Peter Wegner Guest Editor's Introduction to the
Special Issue on Programming Language
Paradigms . . . . . . . . . . . . . . . 253--258
Salvatore T. March About the Authors \ldots . . . . . . . . 259--260
Henri E. Bal and
Jennifer G. Steiner and
Andrew S. Tanenbaum Programming Languages for Distributed
Computing Systems . . . . . . . . . . . 261--322
Nicholas Carriero and
David Gelernter How to Write Parallel Programs: a Guide
to the Perplexed . . . . . . . . . . . . 323--357
Paul Hudak Conception, Evolution, and Application
of Functional Programming Languages . . 359--411
Ehud Shapiro The Family of Concurrent Logic
Programming Languages . . . . . . . . . 413--510
Salvatore T. March About This Issue \ldots . . . . . . . . 511--512
Salvatore T. March About the Authors \ldots . . . . . . . . 513--513
Nabil R. Adam and
John C. Wortmann Security-Control Methods for Statistical
Databases: a Comparative Study . . . . . 515--556
Timothy Bell and
Ian H. Witten and
John G. Cleary Modeling for Text Compression . . . . . 557--591
Charles E. McDowell and
David P. Helmbold Debugging Concurrent Programs . . . . . 593--622
Salvatore T. March About This Issue \ldots . . . . . . . . 1--2
Salvatore T. March About the Authors \ldots . . . . . . . . 3--3
A. J. van de Goor and
C. A. Verruijt An Overview of Deterministic Functional
RAM Chip Testing . . . . . . . . . . . . 5--33
Russell J. Abbott Resourceful Systems for Fault Tolerance,
Reliability, and Safety . . . . . . . . 35--68
Salvatore T. March About This Issue \ldots . . . . . . . . 69--70
Salvatore T. March About the Authors \ldots . . . . . . . . 71--71
Salvatore T. March Editorial Policy . . . . . . . . . . . . 73--81
Raif O. Onvural Survey of Closed Queueing Networks with
Blocking . . . . . . . . . . . . . . . . 83--121
Krzysztof Pawlikowski Steady-State Simulation of Queueing
Processes: a Survey of Problems and
Solutions . . . . . . . . . . . . . . . 123--170
Robert Mandl Surveyor's Forum: ``Applications of
Combinatorial Designs in Computer
Science'' . . . . . . . . . . . . . . . 171--171
Salvatore T. March About This Issue \ldots . . . . . . . . 173--173
Ahmed K. Elmagarmid and
Calton Pu Introduction to the Special Issue on
Heterogeneous Databases . . . . . . . . 175--178
Salvatore T. March About the Authors \ldots . . . . . . . . 179--181
Amit P. Sheth and
James A. Larson Federated Database Systems for Managing
Distributed, Heterogeneous, and
Autonomous Databases . . . . . . . . . . 183--236
Gomer Thomas and
Glenn R. Thompson and
Chin-Wan Chung and
Edward Barkmeyer and
Fred Carter and
Marjorie Templeton and
Stephen Fox and
Berl Hartman Heterogeneous Distributed Database
Systems for Production Use . . . . . . . 237--266
Witold Litwin and
Leo Mark and
Nick Roussopoulos Interoperability of Multiple Autonomous
Databases . . . . . . . . . . . . . . . 267--293
Salvatore T. March About This Issue \ldots . . . . . . . . 295--296
Salvatore T. March About the Authors \ldots . . . . . . . . 297--297
Fred B. Schneider Implementing Fault-Tolerant Services
Using the State Machine Approach: a
Tutorial . . . . . . . . . . . . . . . . 299--319
Eliezer Levy and
Abraham Silberschatz Distributed File Systems: Concepts and
Examples . . . . . . . . . . . . . . . . 321--374
Randy H. Katz Toward a Unified Framework for Version
Modeling in Engineering Databases . . . 375--408
Krzysztof Pawlikowski Corrigenda: ``Steady-State Simulation of
Queueing Processes: A Survey of Problems
and Solutions'' . . . . . . . . . . . . 409--409
Salvatore T. March About This Issue \ldots . . . . . . . . 1--2
Salvatore T. March About the Authors \ldots . . . . . . . . 3--3
David Goldberg What Every Computer Scientist Should
Know About Floating-Point Arithmetic . . 5--48
Gregory R. Andrews Paradigms for Process Interaction in
Distributed Programs . . . . . . . . . . 49--90
Roger S. Chin and
Samuel T. Chanson Distributed, object-based programming
systems . . . . . . . . . . . . . . . . 91--124
S. Sankar and
D. S. Rosenblum Surveyor's Forum: Runtime Checking and
Debugging of Formally Specified Programs 125--127
Salvatore T. March About This Issue \ldots . . . . . . . . 129--129
Salvatore T. March About the Authors \ldots . . . . . . . . 131--131
Salvatore T. March Editorial Policy . . . . . . . . . . . . 133--141
K. Shahookar and
P. Mazumder VLSI Cell Placement Techniques . . . . . 143--220
Bandula W. Abeysundara and
Ahmed E. Kamal High-Speed Local Area Networks and Their
Performance: a Survey . . . . . . . . . 221--264
Salvatore T. March About This Issue \ldots . . . . . . . . 265--266
Salvatore T. March About the Authors \ldots . . . . . . . . 267--267
Naser S. Barghouti and
Gail E. Kaiser Concurrency Control in Advanced Database
Applications . . . . . . . . . . . . . . 269--317
Zvi Galil and
Giuseppe F. Italiano Data Structures and Algorithms for
Disjoint Set Union Problems . . . . . . 319--344
Franz Aurenhammer Voronoi Diagrams: a Survey of a
Fundamental Geometric Data Structure . . 345--405
Lorenzo Strigini Surveyor's Forum: ``Resourceful Systems
for Fault Tolerance, Reliability, and
Safety'' . . . . . . . . . . . . . . . . 407--409
Russell Abbott Surveyor's Forum: ``Resourceful Systems
for Fault Tolerance, Reliability, and
Safety'' . . . . . . . . . . . . . . . . 409--411
David Goldberg Corrigendum: ``What Every Computer
Scientist Should Know About
Floating-Point Arithmetic'' . . . . . . 413--413
Salvatore T. March About This Issue \ldots . . . . . . . . 417--418
Salvatore T. March About the Authors \ldots . . . . . . . . 419--419
M. R. Stytz and
G. Frieder and
O. Frieder Three-Dimensional Medical Imaging:
Algorithms and Computer Systems . . . . 421--499
L. Edwin McKenzie, Jr. and
Richard Thomas Snodgrass Evaluation of Relational Algebras
Incorporating the Time Dimension in
Databases . . . . . . . . . . . . . . . 501--543
Salvatore T. March About This Issue \ldots . . . . . . . . 1--2
Salvatore T. March About the Authors \ldots . . . . . . . . 3--3
Paul Suetens and
Pascal Fua and
Andrew J. Hanson Computational Strategies for Object
Recognition . . . . . . . . . . . . . . 5--61
Priti Mishra and
Margaret H. Eich Join Processing in Relational Databases 63--113
Salvatore T. March Editorial Policy . . . . . . . . . . . . 117--125
Salvatore T. March About This Issue \ldots . . . . . . . . 127--128
Salvatore T. March About the Authors \ldots . . . . . . . . 129--129
Charles W. Krueger Software Reuse . . . . . . . . . . . . . 131--183
Per Brinch Hansen Householder Reduction of Linear
Equations . . . . . . . . . . . . . . . 185--194
Catherine McGeoch Analyzing Algorithms by Simulation:
Variance Reduction Techniques and
Simulation Speedups . . . . . . . . . . 195--212
Richard R. Muntz A Personal Note . . . . . . . . . . . . 213--214
Richard R. Muntz About This Issue \ldots . . . . . . . . 215--215
Richard R. Muntz About the Authors \ldots . . . . . . . . 217--217
Yong K. Hwang and
Narendra Ahuja Gross Motion Planning --- a Survey . . . 219--291
Randal E. Bryant Symbolic Boolean Manipulation with
Ordered Binary-Decision Diagrams . . . . 293--318
Charles B. Dunham Surveyor's Forum: ``What Every Computer
Scientist Should Know About
Floating-Point Arithmetic'' . . . . . . 319--319
Brian A. Wichmann Surveyor's Forum: ``What Every Computer
Scientist Should Know About
Floating-Point Arithmetic'' . . . . . . 319--319
Richard R. Muntz About This Issue \ldots . . . . . . . . 321--322
Richard R. Muntz About the Authors \ldots . . . . . . . . 323--323
Lisa Gottesfeld Brown A Survey of Image Registration
Techniques . . . . . . . . . . . . . . . 325--376
Karen Kukich Techniques for Automatically Correcting
Words in Text . . . . . . . . . . . . . 377--439
Vladimir Estivill-Castro and
Derick Wood A Survey of Adaptive Sorting Algorithms 441--476
Richard R. Muntz About This Issue \ldots . . . . . . . . 1--2
Richard R. Muntz About the Authors \ldots . . . . . . . . 3--3
Farshid Arman and
J. K. Aggarwal Model-Based Object Recognition in
Dense-Range Images --- a Review . . . . 5--43
Marco Schneider Self-Sta\-bi\-li\-za\-tion . . . . . . . 45--67
Richard R. Muntz About This Issue \ldots . . . . . . . . 69--70
Richard R. Muntz About the Authors \ldots . . . . . . . . 71--72
Goetz Graefe Query Evaluation Techniques for Large
Databases . . . . . . . . . . . . . . . 73--170
Michael Barborak and
Miroslaw Malek and
Anton Dahbura The Consensus Problem in Fault-Tolerant
Computing . . . . . . . . . . . . . . . 171--220
Richard R. Muntz About This Issue \ldots . . . . . . . . 221--222
Richard R. Muntz About the Authors \ldots . . . . . . . . 223--223
A. Udaya Shankar An Introduction to Assertional Reasoning
for Concurrent Systems . . . . . . . . . 225--262
Michael G. Norman and
Peter Thanisch Models of Machines and Computation for
Mapping in Multicomputers . . . . . . . 263--302
David J. Lilja Cache Coherence in Large-Scale
Shared-Memory Multiprocessors: Issues
and Comparisons . . . . . . . . . . . . 303--338
Randolph D. Nelson The Mathematics of Product Form Queuing
Networks . . . . . . . . . . . . . . . . 339--369
Richard R. Muntz About This Issue \ldots . . . . . . . . 371--372
Richard R. Muntz About the Authors \ldots . . . . . . . . 373--373
Richard Baskerville Information Systems Security Design
Methods: Implications for Information
Systems Development . . . . . . . . . . 375--414
Bernhard Eschermann State Assignment for Hardwired VLSI
Control Units . . . . . . . . . . . . . 415--436
James C. Brancheau and
Carol V. Brown The Management of End-User Computing:
Status and Directions . . . . . . . . . 437--482
Rajiv Gupta and
Scott A. Smolka and
Shaji Bhaskar On Randomization in Sequential and
Distributed Algorithms . . . . . . . . . 7--86
Thomas W. Malone and
Kevin Crowston The Interdisciplinary Study of
Coordination . . . . . . . . . . . . . . 87--119
Sunggu Lee and
Kang Geun Shin Probabilistic Diagnosis of
Multiprocessor Systems . . . . . . . . . 121--139
Richard R. Muntz About This Issue \ldots . . . . . . . . 141--142
Richard R. Muntz About This Issue \ldots . . . . . . . . 143--144
Peter M. Chen and
Edward K. Lee and
Garth A. Gibson and
Randy H. Katz and
David A. Patterson RAID: High-Performance, Reliable
Secondary Storage . . . . . . . . . . . 145--185
Tim J. Harris A Survey of PRAM Simulation Techniques 187--206
Richard R. Muntz About This Issue \ldots . . . . . . . . 207--207
Richard R. Muntz About the Authors \ldots . . . . . . . . 209--210
Carl E. Landwehr and
Alan R. Bull and
John P. McDermott and
William S. Choi A Taxonomy of Computer Program Security
Flaws . . . . . . . . . . . . . . . . . 211--254
Mary L. Bailey and
Jack V. Briner, Jr. and
Roger D. Chamberlain Parallel Logic Simulation of VLSI
Systems . . . . . . . . . . . . . . . . 255--294
Jacques Chassin de Kergommeaux and
Philippe Codognet Parallel Logic Programming Systems . . . 295--336
Peter Wegner and
Marvin Israel Editorial Directions . . . . . . . . . . 337--339
Richard R. Muntz About This Issue . . . . . . . . . . . . 341--341
Richard R. Muntz About The Authors . . . . . . . . . . . 343--343
David F. Bacon and
Susan L. Graham and
Oliver J. Sharp Compiler Transformations for
High-Performance Computing . . . . . . . 345--420
Ji\vrí Matou\vsek Geometric Range Searching . . . . . . . 421--461
Peter Wegner and
Marvin Israel About This Issue \ldots . . . . . . . . 1--2
Juris Hartmanis Turing Award Lecture: On Computational
Complexity and the Nature of Computer
Science . . . . . . . . . . . . . . . . 7--16
Laszlo A. Belady The Disappearance of the ``Pure''
Software Industry . . . . . . . . . . . 17--18
Gilles Brassard Time for Another Paradigm Shift . . . . 19--21
Peter J. Denning Can there be a science of information? 23--25
Peter A. Freeman Effective Computer Science . . . . . . . 27--29
Michael C. Loui Computer Science is a New Engineering
Discipline . . . . . . . . . . . . . . . 31--32
John Plaice Computer Science is an Experimental
Science . . . . . . . . . . . . . . . . 33--33
John E. Savage Will computer science become irrelevant? 35--37
N. F. Stewart Science and Computer Science . . . . . . 39--41
Jeffrey D. Ullman The Role of Theory Today . . . . . . . . 43--44
Peter Wegner Interaction as a Basis for Empirical
Computer Science . . . . . . . . . . . . 45--48
Fred Weingarten Government Funding and Computing
Research Priorities . . . . . . . . . . 49--54
W. A. Wulf Are we scientists or engineers? . . . . 55--57
Juris Hartmanis Response to the Essays ``On
Computational Complexity and the Nature
of Computer Science'' . . . . . . . . . 59--61
Peter A. Buhr and
Michel Fortier and
Michael H. Coffin Monitor Classification . . . . . . . . . 63--107
Ricardo A. Baeza-Yates Fringe Analysis Revisited . . . . . . . 109--119
Various The Scope and Tutorial Needs of the ACM
SIGs . . . . . . . . . . . . . . . . . . 121--137
Peter Wegner and
Marvin Israel About This Issue . . . . . . . . . . . . 139--140
Evaggelia Pitoura and
Omran Bukhres and
Ahmed Elmagarmid Object Orientation in Multidatabase
Systems . . . . . . . . . . . . . . . . 141--195
Jukka Paakki Attribute Grammar Paradigms --- a
High-Level Methodology in Language
Implementation . . . . . . . . . . . . . 196--255
David Garlan Research Directions in Software
Architecture . . . . . . . . . . . . . . 257--261
Oscar Nierstrasz and
Theo Dirk Meijler Research Directions in Software
Composition . . . . . . . . . . . . . . 262--264
Gio Wiederhold Mediation in Information Systems . . . . 265--267
Frank Manola Interoperability Issues in Large-Scale
Distributed Object Systems . . . . . . . 268--270
Sandra Heiler Semantic Interoperability . . . . . . . 271--273
Jeff Sutherland Business Objects in Corporate
Information Systems . . . . . . . . . . 274--276
Efstratios Gallopoulos and
Elias N. Houstis and
John R. Rice Workshop on Problem-Solving
Environments: Findings and
Recommendations . . . . . . . . . . . . 277--279
Arnold L. Rosenberg Thoughts on Parallelism and Concurrency
in Computing Curricula . . . . . . . . . 280--283
P. Takis Metaxas Fundamental Ideas for a Parallel
Computing Course . . . . . . . . . . . . 284--286
Faron Moller and
Scott A. Smolka On the Computational Complexity of
Bisimulation . . . . . . . . . . . . . . 287--289
Ron K. Cytron and
Brent Hailpern SIGPLAN Scope and Tutorial Needs . . . . 290--291
Alexander Thomasian Surveyors' forum --- high-performance
secondary memory . . . . . . . . . . . . 292--295
Peter Wegner and
Marvin Israel About This Issue . . . . . . . . . . . . 297--297
Raj Reddy Grand Challenges in AI . . . . . . . . . 301--303
Narendra Ahuja On Detection and Representation of
Multiscale Low-Level Image Structure . . 304--306
Yiannis Aloimonos and
C. Fermüller and
A. Rosenfeld Seeing and Understanding: Representing
the Visual World . . . . . . . . . . . . 307--309
Ruzena Bajcsy Signal-to-Symbol Transformation and Vice
Versa: From Fundamental Processes to
Representation . . . . . . . . . . . . . 310--313
Ronald J. Brachman and
Hector J. Levesque Undirected Behavior Without Unbounded
Search . . . . . . . . . . . . . . . . . 314--316
Eugene Charniak Natural Language Learning . . . . . . . 317--319
William J. Clancey AI: Inventing a New Kind of Machine . . 320--322
A. G. Cohn The Challenge of Qualitative Spatial
Reasoning . . . . . . . . . . . . . . . 323--325
Tom Dietterich Overfitting and Undercomputing in
Machine Learning . . . . . . . . . . . . 326--327
Didier Dubois and
Henri Prade What Does Fuzzy Logic Bring to AI? . . . 328--330
Matthew L. Ginsberg Epistemological and Heuristic Adequacy
Revisited . . . . . . . . . . . . . . . 331--333
Subbarao Kambhampati AI Planning: a Prospectus on Theory and
Applications . . . . . . . . . . . . . . 334--336
Richard E. Korf Space-Efficient Search Algorithms . . . 337--339
Victor R. Lesser Multiagent Systems: An Emerging
Subdiscipline of AI . . . . . . . . . . 340--342
Vladimir Lifschitz The Logic of Common Sense . . . . . . . 343--345
R. P. Loui Models of Deliberation in the Social
Sciences . . . . . . . . . . . . . . . . 346--348
Jacques Pitrat AI Systems are Dumb Because AI
Researchers Are Too Clever . . . . . . . 349--350
Austin Tate Don't Leave Your Plan on the Shelf . . . 351--352
Pietro Torasso and
Luca Console and
Luigi Portinale and
Daniele Theseider Dupré On the Role of Abduction . . . . . . . . 353--355
David Waltz and
Simon Kasif On Reasoning From Data . . . . . . . . . 356--359
Michael P. Wellman The Economic Approach to Artificial
Intelligence . . . . . . . . . . . . . . 360--362
Kenneth Yip and
Feng Zhao and
Elisha Sacks Imagistic Reasoning . . . . . . . . . . 363--365
Vicki H. Allan and
Reese B. Jones and
Randall M. Lee and
Stephen J. Allan Software Pipelining . . . . . . . . . . 367--432
S. S. Beauchemin and
J. L. Barron The Computation of Optical Flow . . . . 433--467
Raymond Greenlaw and
Rossella Petreschi Cubic Graphs . . . . . . . . . . . . . . 471--495
Ronald E. Prather Design and Analysis of Hierarchical
Software Metrics . . . . . . . . . . . . 497--518
Dilip Sarkar Methods to Speed Up Error
Back-Propagation Learning Algorithm . . 519--542
Anonymous Computing Surveys Symposium on
Multimedia . . . . . . . . . . . . . . . 543--544
Venkat N. Gudivada Multimedia Systems --- An
Interdisciplinary Perspective . . . . . 545--548
Edward A. Fox and
Linda M. Kieffer Multimedia Curricula, Courses, and
Knowledge Modules . . . . . . . . . . . 549--551
Borko Furht Where Are Information Superhighways
Headed? . . . . . . . . . . . . . . . . 554--556
Jenny Preece and
Ben Shneiderman Survival of the Fittest: The Evolution
of Multimedia User Interfaces . . . . . 557--559
Elisabeth André Intellimedia: Making Multimedia Usable
by Exploiting AI Methods . . . . . . . . 560--563
Walid G. Aref and
Ibrahim Kamel and
Daniel P. Lopresti On Handling Electronic Ink . . . . . . . 564--567
James E. Baker and
Isabel F. Cruz and
Giuseppe Liotta and
Roberto Tamassia A New Model for Algorithm Animation Over
the WWW . . . . . . . . . . . . . . . . 568--572
Shih-Fu Chang Exploring Functionalities in the
Compressed Image/Video Domain . . . . . 573--575
Stavros Christodoulakis and
Peter Triantafillou Research and Development Issues for
Large-Scale Multimedia Information
Systems . . . . . . . . . . . . . . . . 576--579
Crispin Cowan and
Shanwei Cen and
Jonathan Walpole and
Calton Pu Adaptive Methods for Distributed Video
Presentation . . . . . . . . . . . . . . 580--583
Nevenka Dimitrova The Myth of Semantic Video Retrieval . . 584--586
Sharon Flank The Role of Natural-Language Processing
in Multimedia . . . . . . . . . . . . . 587--589
Minos N. Garofalakis and
Yannis E. Ioannidis Scheduling Issues in Multimedia Query
Optimization . . . . . . . . . . . . . . 590--592
Arif Ghafoor Multimedia Database Management Systems 593--598
Wendy Hall The Role of Hypermedia in Multimedia
Information Systems . . . . . . . . . . 599--601
Qing Li and
Liu Sheng Huang A Dynamic Data Model for a Video
Database Management System . . . . . . . 602--606
Alistair Moffat and
Justin Zobel Index Organization for Multimedia
Database Systems . . . . . . . . . . . . 607--609
Daniel Mossé Resource Reservations in Networked
Multimedia Systems . . . . . . . . . . . 610--612
Klara Nahrstedt End-to-End QoS Guarantees in Networked
Multimedia Systems . . . . . . . . . . . 613--616
Banu Özden and
Rajeev Rastogi and
Avi Silberschatz Research Issues in Multimedia Storage
Servers . . . . . . . . . . . . . . . . 617--620
Rosalind W. Picard Computer Learning of Subjectivity . . . 621--623
Teresa Roselli Artificial Intelligence Can Improve
Hypermedia Instructional Technologies
for Learning . . . . . . . . . . . . . . 624--626
Daniela Rus and
Devika Subramanian Customizing Multimedia Information
Access . . . . . . . . . . . . . . . . . 627--629
Hanan Samet General Research Issues in Multimedia
Database Systems . . . . . . . . . . . . 630--632
Roger C. Schank and
Michael Korcuska and
Menachem Jona Multimedia Applications for Education
and Training: Revolution or Red Herring? 633--635
Prashant J. Shenoy and
Pawan Goyal and
Harrick M. Vin Issues in Multimedia Server Design . . . 636--639
Richard Staehli and
Jonathan Walpole and
David Maier Device and Physical-Data Independence
for Multimedia Presentations . . . . . . 640--642
HongJiang Zhang and
Qi Tian Digital Video Analysis and Recognition
for Content-Based Access . . . . . . . . 643--644
Anonymous Contents: Author Index: Vols. 23--27
(1991--1995) . . . . . . . . . . . . . . 645--650
Anonymous Contents: Subject index: Vols. 23--27
(1991--1995) . . . . . . . . . . . . . . 650--653
Serge Abiteboul and
Gabriel M. Kuper and
Harry G. Mairson and
Alexander A. Shvartsman and
Moshe Y. Vardi In memoriam Paris C. Kanellakis . . . . 3--15
Edward M. Reingold Basic techniques for design and analysis
of algorithms . . . . . . . . . . . . . 19--21
Allen Tucker and
Peter Wegner ACM 50th-Anniversary Symposium:
Perspectives in Computer Science . . . . 19--286
Roberto Tamassia Data structures . . . . . . . . . . . . 23--26
D. T. Lee Computational geometry . . . . . . . . . 27--31
Rajeev Motwani and
Prabhakar Raghavan Randomized algorithms . . . . . . . . . 33--37
Maxime Crochemore and
Thierry Lecroq Pattern-matching and text-compression
algorithms . . . . . . . . . . . . . . . 39--41
Samir Khuller and
Balaji Raghavachari Graph and network algorithms . . . . . . 43--45
Michael C. Loui Computational complexity theory . . . . 47--49
Guy E. Blelloch and
Bruce M. Maggs Parallel algorithms . . . . . . . . . . 51--54
Vijay Chandru and
M. R. Rao Combinatorial optimization: an integer
programming perspective . . . . . . . . 55--58
Andrea S. Lapaugh Layout algorithm for VLSI design . . . . 59--61
Doug Burger Memory systems . . . . . . . . . . . . . 63--65
Michael J. Flynn and
Kevin W. Rudd Parallel architectures . . . . . . . . . 67--70
J. R. Quinlan Learning decision tree classifiers . . . 71--72
Michael I. Jordan and
Christopher M. Bishop Neural networks . . . . . . . . . . . . 73--75
Stephanie Forrest Genetic algorithms . . . . . . . . . . . 77--80
F. L. Lewis and
M. Fitzgerald and
K. Liu Robotics . . . . . . . . . . . . . . . . 81--83
Thomas Dean Automated planning . . . . . . . . . . . 85--87
Judea Pearl Decision making under uncertainty . . . 89--92
Pasquale Cinnella Numerical simulations of reactive flows 93--96
Joseph S. Shang Computational electromagnetics . . . . . 97--99
David T. Kingsbury Computational biology . . . . . . . . . 101--103
Avi Silberschatz and
Henry F. Korth and
S. Sudarshan Data models . . . . . . . . . . . . . . 105--108
Stefano Ceri and
Raghu Ramakrishnan Rules in database systems . . . . . . . 109--111
Dennis Shasha Tuning databases for high performance 113--115
Betty Salzberg Access methods . . . . . . . . . . . . . 117--120
Yannis E. Ioannidis Query optimization . . . . . . . . . . . 121--123
M. Tamer Özsu and
Patrick Valduriez Distributed and parallel database
systems . . . . . . . . . . . . . . . . 125--128
Sushil Jajodia Database security and privacy . . . . . 129--131
Ellen Riloff and
Lee Hollaar Text databases and information retrieval 133--135
François Bancilhon Object databases . . . . . . . . . . . . 137--140
Jim Melton SQL language summary . . . . . . . . . . 141--143
Donald H. House Overview of three-dimensional computer
graphics . . . . . . . . . . . . . . . . 145--148
A. P. Rockwood Geometric primitives . . . . . . . . . . 149--151
David S. Ebert Advanced modeling techniques for
computer graphics . . . . . . . . . . . 153--156
Alan Watt Rendering techniques: past, present and
future . . . . . . . . . . . . . . . . . 157--159
Nadia Magnenat Thalmann and
Daniel Thalmann Computer animation . . . . . . . . . . . 161--163
Arie E. Kaufman Volume visualization . . . . . . . . . . 165--167
Jonathan Grudin The organizational contexts of
development and use . . . . . . . . . . 169--171
Wolfgang Dzida International usability standards . . . 173--175
Robert J. K. Jacob Human-computer interaction: input
devices . . . . . . . . . . . . . . . . 177--179
Colin Ware Multimedia output devices and techniques 181--183
Jürgen Ziegler Interactive techniques . . . . . . . . . 185--187
Brad A. Myers User interface software technology . . . 189--191
Mary Beth Rosson Human factors in programming and
software development . . . . . . . . . . 193--195
Stuart A. Selber and
Johndan Johnson-Eilola and
Brad Mehlenbacher Online support systems . . . . . . . . . 197--200
Raphel A. Finkel Operating systems . . . . . . . . . . . 201--203
John A. Stankovic Real-time and embedded systems . . . . . 205--208
Craig E. Wills Process synchronization and IPC . . . . 209--211
Peter J. Denning Virtual memory . . . . . . . . . . . . . 213--216
Marshall Kirk McKusick Secondary storage and filesystems . . . 217--219
William Stallings Advances in high-speed networking . . . 221--223
Sape J. Mullender Distributed operating systems . . . . . 225--227
Thomas W. Doeppner, Jr. Distributed file systems and distributed
memory . . . . . . . . . . . . . . . . . 229--231
Steve J. Chapin Distributed and multiprocessor
scheduling . . . . . . . . . . . . . . . 233--235
Howard Jay Siegel and
Henry G. Dietz and
John K. Antonio Software support for heterogeneous
computing . . . . . . . . . . . . . . . 237--239
Ravi Sandhu and
Pierangela Samarati Authentication, access control, and
audit . . . . . . . . . . . . . . . . . 241--243
Kim B. Bruce Progress in programming languages . . . 245--247
Benjamin Goldberg Functional programming languages . . . . 249--251
Stuart Hirshfield and
Raimund K. Ege Object-oriented programming . . . . . . 253--255
Jacques Cohen Logic programming and constraint logic
programming . . . . . . . . . . . . . . 257--259
Michael Wolfe Parallelizing compilers . . . . . . . . 261--262
Luca Cardelli Type systems . . . . . . . . . . . . . . 263--264
David A. Schmidt Programming language semantics . . . . . 265--267
Ian Sommerville Software process models . . . . . . . . 269--271
Ian M. Holland and
Karl J. Lieberherr Object-oriented design . . . . . . . . . 273--275
Stephen R. Schach Testing: principles and practice . . . . 277--279
Steven P. Reiss Software tools and environments . . . . 281--284
Peter Wegner Interoperability . . . . . . . . . . . . 285--287
Chris Hankin and
Hanne Riis Nielson Computing Surveys Symposium on Models of
Programming Languages and Computation 293--294
Gul A. Agha Linguistic Paradigms for Programming
Complex Distributed Systems . . . . . . 295--296
Jean-Marc Andreoli and
Remo Pareschi Integrated Computational Paradigms for
Flexible Client-Server Communication . . 297--299
Paolo Ciancarini Coordination Models and Languages as
Software Integrators . . . . . . . . . . 300--302
David Gilbert Can Computational Logic Provide a
Paradigm for Both the Specification and
Implementation of Concurrent Systems? 303--305
Michael Hanus and
Herbert Kuchen Integration of Functional and Logic
Programming . . . . . . . . . . . . . . 306--308
Alan Mycroft On Integration of Programming Paradigms 309--311
U. S. Reddy Imperative Functional Programming . . . 312--314
Dennis Volpano and
Geoffrey Smith On the Systematic Design of Web
Languages . . . . . . . . . . . . . . . 315--317
Philip Wadler Lazy Versus Strict . . . . . . . . . . . 318--320
P. N. Benton On the Relationship Between Formal
Semantics and Static Analysis . . . . . 321--323
Patrick Cousot Abstract Interpretation . . . . . . . . 324--328
Olivier Danvy and
Nevin Hentze and
Karoline Malmkjær Resource-bounded partial evaluation . . 329--332
Gilberto Filé and
Roberto Giacobazzi and
Francesco Ranzato A Unifying View of Abstract Domain
Design . . . . . . . . . . . . . . . . . 333--336
Suresh Jagannathan and
Andrew Wright Compiling Functional Languages with Flow
Analysis . . . . . . . . . . . . . . . . 337--339
Daniel Le Métayer and
David Schmidt Structural Operational Semantics as a
Basis for Static Program Analysis . . . 340--343
Flemming Nielson Annotated Type and Effect Systems . . . 344--345
Mads Dam Modalities in Analysis and Verification 346--348
Robert Cartwright and
Matthias Felleisen Program Verification Through Soft Typing 349--351
Pierpaolo Degano and
Corrado Priami Enhanced Operational Semantics . . . . . 352--354
C. Barry Jay Shape in Computing . . . . . . . . . . . 355--357
Jens Palsberg Type Inference for Objects . . . . . . . 358--359
Alberto Pettorossi and
Maurizio Proietti Rules and Strategies for Transforming
Functional and Logic Programs . . . . . 360--414
William Frakes and
Carol Terry Software Reuse: Metrics and Models . . . 415--435
Antero Taivalsaari On the Notion of Inheritance . . . . . . 438--479
Neil D. Jones An Introduction to Partial Evaluation 480--503
Joseph A. Gallian Error Detection Methods . . . . . . . . 504--517
Peter Soderquist and
Miriam Leeser Area and Performance Tradeoffs in
Floating-Point Divide and Square-Root
Implementations . . . . . . . . . . . . 518--564
Peter Wegner and
Jon Doyle Editorial: Strategic directions in
computing research . . . . . . . . . . . 565--574
Anonymous ACM 50th Anniversary Issue --- Strategic
Directions in Computing Research . . . . 565--845
Michael C. Loui and
Anne Condon and
Faith Fich and
Greg N. Frederickson and
Andrew V. Goldberg and
David S. Johnson and
Steven Mahney and
Prabhakar Raghavan and
John Savage and
Alan L. Selman and
David B. Shmoys Strategic directions in research in
theory of computing . . . . . . . . . . 575--590
Roberto Tamassia and
Pankaj K. Agarwal and
Nancy Amato and
Danny Z. Chen and
David Dobkin and
Scot Drysdale and
Steven Fortune and
Michael T. Goodrich and
John Hershberger and
Joseph O'Rourke and
Franco P. Preparata and
Joerg-Rudiger Sack and
Subhash Suri and
Ioannis Tollis and
Jeffrey S. Vitter and
Sue Whitesides Strategic directions in computational
geometry . . . . . . . . . . . . . . . . 591--606
Rance Cleaveland and
Scott A. Smolka and
Rajeev Alur and
Jos Baeten and
Jan A. Bergstra and
Eike Best and
Rocco De Nicola and
Helen Gill and
Roberto Gorrieri and
Mohamed G. Gouda and
Jan Friso Groote and
Tom A. Henzinger and
C. A. R. Hoare and
Maj. David Luginbuhl and
Albert Meyer and
Dale Miller and
Jayadev Misra and
Faron Moller and
Ugo Montanari and
Amir Pnueli and
Sanjiva Prasad and
Vaughan R. Pratt and
Joseph Sifakis and
Bernhard Steffen and
Bent Thomsen and
Frits Vaandrager and
Moshe Vardi and
Pierre Wolper Strategic directions in concurrency
research . . . . . . . . . . . . . . . . 607--625
Edmund M. Clarke and
Jeannette M. Wing and
Rajeev Alur and
Rance Cleaveland and
David Dill and
Allen Emerson and
Stephen Garland and
Steven German and
John Guttag and
Anthony Hall and
Thomas Henzinger and
Gerard Holzmann and
Cliff Jones and
Robert Kurshan and
Nancy Leveson and
Kenneth McMillan and
J. Moore and
Doron Peled and
Amir Pnueli and
John Rushby and
Natarajan Shankar and
Joseph Sifakis and
Prasad Sistla and
Bernhard Steffen and
Pierre Wolper and
Jim Woodcock and
Pamela Zave Formal methods: state of the art and
future directions . . . . . . . . . . . 626--643
Chris Hankin and
Hanne Riis Nielson and
Jens Palsberg and
others Strategic directions in research on
programming languages . . . . . . . . . 644--652
Jon Doyle and
Thomas Dean and
others Strategic directions in artificial
intelligence . . . . . . . . . . . . . . 653--670
Trevor Mudge Strategic directions in computer
architecture . . . . . . . . . . . . . . 671--678
David Clark and
Joseph Pasquale and
others Strategic directions in networks and
telecommunications . . . . . . . . . . . 679--690
Rachid Guerraoui and
others Strategic directions in object-oriented
programming . . . . . . . . . . . . . . 691--700
Pascal Van Hentenryck and
Vijay Saraswat and
others Strategic directions in constraint
programming . . . . . . . . . . . . . . 701--726
Carl Gunter and
John Mitchell and
David Notkin Strategic directions in software
engineering and programming languages 727--737
Leon Osterweil and
others Strategic directions in software quality 738--750
John A. Stankovic and
others Strategic directions in real-time and
embedded systems . . . . . . . . . . . . 751--763
Avi Silberschatz and
Stan Zdonik and
others Strategic directions in database systems
--- breaking out of the box . . . . . . 764--778
Garth A. Gibson and
Jeffrey Scott Vitter and
John Wilkes and
others Strategic directions in storage I/O
issues in large-scale computing . . . . 779--793
Brad Myers and
Jim Hollan and
Isabel Cruz and
Steve Bryson and
Dick Bulterman and
Tiziana Catarci and
Wayne Citrin and
Ephraim Glinert and
Jonathan Grudin and
Rob Jacob and
Bonnie John and
David Kurlander and
Dan Olsen and
Randy Pausch and
Stuart Shieber and
Ben Shneiderman and
John Stasko and
Gary Strong and
Kent Wittenburg Strategic directions in human-computer
interaction . . . . . . . . . . . . . . 794--809
A. Sameh and
G. Cybenko and
M. Kalos and
K. Neves and
J. Rice and
D. Sorensen and
F. Sullivan Computational science and engineering 810--817
Nabil Adam and
Yelena Yesha and
others Strategic directions in electronic
commerce and digital libraries: towards
a digital agora . . . . . . . . . . . . 818--835
Allen B. Tucker and
others Strategic directions in computer science
education . . . . . . . . . . . . . . . 836--845
Anonymous Author Index: Vols. 24--28 (1992--1996) 846--854
Anonymous Subject Index: Vols. 24--28 (1992--1996) 854--859
Ronald J. Brachman and
Hector J. Levesque Undirected behavior without unbounded
search . . . . . . . . . . . . . . . . . 1:1--1:??
Thomas L. Dean Integrating theory and practice in
planning . . . . . . . . . . . . . . . . 2:1--2:??
Tom Dietterich Machine learning . . . . . . . . . . . . 3:1--3:??
Jon Doyle Cleaving (unto) artificial intelligence 4:1--4:??
Cordell Green Formality helps scalability and
robustness . . . . . . . . . . . . . . . 5:1--5:??
Barbara J. Grosz The importance of integration for AI . . 6:1--6:??
Ian Horswill Integrated systems and naturalistic
tasks . . . . . . . . . . . . . . . . . 7:1--7:??
Daphne Koller Structured representations and
intractability . . . . . . . . . . . . . 8:1--8:??
Fernando Pereira Language, computation and artificial
intelligence . . . . . . . . . . . . . . 9:1--9:??
Bart Selman Computational challenges in artificial
intelligence . . . . . . . . . . . . . . 10:1--10:??
Yoav Shoham The open scientific borders of AI, and
the case of economics . . . . . . . . . 11:1--11:??
Howard E. Shrobe Two challenging domains . . . . . . . . 12:1--12:??
William R. Swartout Future directions in knowledge-based
systems . . . . . . . . . . . . . . . . 13:1--13:??
Michael P. Wellman The economic approach to artificial
intelligence . . . . . . . . . . . . . . 14:1--14:??
Shlomo Zilberstein Resource-bounded reasoning in
intelligent systems . . . . . . . . . . 15:1--15:??
Pankaj K. Agarwal and
Subhash Suri Simple and practical geometric
algorithms . . . . . . . . . . . . . . . 16:1--16:??
Nancy M. Amato Equipping CAD/CAM systems with geometric
intelligence . . . . . . . . . . . . . . 17:1--17:??
Danny Z. Chen Developing algorithms and software for
geometric path planning problems . . . . 18:1--18:??
Ioannis G. Tollis Graph drawing and information
visualization . . . . . . . . . . . . . 19:1--19:??
Jeffrey S. Vitter Communication issues in large-scale
geometric computation . . . . . . . . . 20:1--20:??
George Cybenko Large-scope computing: the industrial
challenges . . . . . . . . . . . . . . . 21:1--21:??
Melvin Kalos Challenges in computational science . . 22:1--22:??
Kenneth Neves Thoughts on CSE candidates for
industrial positions . . . . . . . . . . 23:1--23:??
John R. Rice Computational science as one driving
force for all aspects of computing
research . . . . . . . . . . . . . . . . 24:1--24:??
Francis Sullivan From theory to practice . . . . . . . . 25:1--25:??
Tom Conte Importance of profiling and
compatibility . . . . . . . . . . . . . 26:1--26:??
Joel Emer Incremental versus revolutionary
research . . . . . . . . . . . . . . . . 27:1--27:??
Matt Farrens Distributed decentralized computing . . 28:1--28:??
Dirk Grunwald Embedded, general-purpose, and
high-performance systems . . . . . . . . 29:1--29:??
Kai Li Applications, storage hierarchy, and
integration . . . . . . . . . . . . . . 30:1--30:??
Jack Mills An industrial perspective on computer
architecture . . . . . . . . . . . . . . 31:1--31:??
David Nagle Synergy between software and hardware 32:1--32:??
Yale Patt Microarchitecture, compilers and
algorithms . . . . . . . . . . . . . . . 33:1--33:??
Jim Smith Multiscalar as a new architecture
paradigm . . . . . . . . . . . . . . . . 34:1--34:??
Wen-Hann Wang Microprocessor architecture challenges
--- the best is yet to come! . . . . . . 35:1--35:??
David Wood Problems, challenges and the importance
of performance evaluation . . . . . . . 36:1--36:??
Robert Yung The importance of process technology to
microarchitecture . . . . . . . . . . . 37:1--37:??
Jos C. M. Baeten and
Jan A. Bergstra Six issues concerning future directions
in concurrency research . . . . . . . . 39:1--39:??
Eike Best Some major dichotomies relating to
future research in concurrency . . . . . 40:1--40:??
Rance Cleaveland Semantic theories and system design . . 41:1--41:??
Roberto Gorrieri On the power of concurrency theory . . . 42:1--42:??
Mohamed G. Gouda Network protocols between exact
specifications and pragmatic
implementations . . . . . . . . . . . . 43:1--43:??
Jan Friso Groote Concurrency theory will set standards
for description and analysis of software 44:1--44:??
C. A. R. Hoare Unifying theories: a personal statement 46:1--46:??
David Luginbuhl Issues in concurrent systems research 47:1--47:??
Dale Miller Logical foundations for open system
design . . . . . . . . . . . . . . . . . 48:1--48:??
Jayadev Misra A discipline of multiprogramming . . . . 49:1--49:??
Faron Moller Logics for concurrency: structure versus
automata . . . . . . . . . . . . . . . . 50:1--50:??
Ugo Montanari Causal computing . . . . . . . . . . . . 51:1--51:??
Rocco De Nicola and
Scott A. Smolka Concurrency: theory and practice . . . . 52:1--52:??
Sanjiva Prasad Models for mobile computing agents . . . 53:1--53:??
Vaughan R. Pratt Concurrency concepts: an ongoing search 54:1--54:??
Joseph Sifakis Research directions for concurrency . . 55:1--55:??
Bernhard Steffen and
Tiziana Margaria Method engineering for real-life
concurrent systems . . . . . . . . . . . 56:1--56:??
Bent Thomsen Programming languages, analysis tools,
and concurrency theory . . . . . . . . . 57:1--57:??
Pierre Wolper Where is the algorithmic support? . . . 58:1--58:??
Alexander Brodsky Constraint databases: promising
technology or just intellectual
exercise? . . . . . . . . . . . . . . . 59:1--59:??
Philippe Codognet The virtuality of constraints and the
constraints of virtuality . . . . . . . 60:1--60:??
R. Dechter Bucket elimination: a unifying framework
for processing hard and soft constraints 61:1--61:??
M. Dincbas Constraint programming . . . . . . . . . 62:1--62:??
E. Freuder In pursuit of the holy grail . . . . . . 63:1--63:??
Manuel Hermenegildo Some challenges for constraint
programming . . . . . . . . . . . . . . 64:1--64:??
J. Jaffar and
R. Yap Constraint programming 2000 . . . . . . 65:1--65:??
S. Kasif Towards a constraint-based engineering
framework for algorithm design and
application . . . . . . . . . . . . . . 66:1--66:??
Alan Mackworth Constraint-based design of embedded
intelligent systems . . . . . . . . . . 67:1--67:??
D. McAllester The rise of nonlinear mathematical
programming . . . . . . . . . . . . . . 68:1--68:??
Ken McAloon Constraint-based programming . . . . . . 69:1--69:??
Ugo Montanari and
Francesca Rossi Constraint solving and programming:
what's next? . . . . . . . . . . . . . . 70:1--70:??
William J. Older CLP (intervals) . . . . . . . . . . . . 71:1--71:??
Jean-François Puget Future of constraint programming . . . . 72:1--72:??
R. Ramakrishnan Constraints in databases . . . . . . . . 73:1--73:??
Vijay Saraswat Compositional computing . . . . . . . . 74:1--74:??
Gert Smolka Constraints in OZ . . . . . . . . . . . 75:1--75:??
Pascal Van Hentenryck Constraint programming for combinatorial
search problems . . . . . . . . . . . . 76:1--76:??
José Blakeley Thoughts on directions in database
research . . . . . . . . . . . . . . . . 77:1--77:??
Umeshwar Dayal Database technology at a crossroads . . 78:1--78:??
Sushil Jajodia Managing security and privacy of
information . . . . . . . . . . . . . . 79:1--79:??
Henry F. Korth New focal points for research in
database systems . . . . . . . . . . . . 80:1--80:??
Guy M. Lohman You think your DBMS is complex
now\ldots? . . . . . . . . . . . . . . . 81:1--81:??
David Lomet A role for research in the database
industry . . . . . . . . . . . . . . . . 82:1--82:??
David Maier Repackaging database systems . . . . . . 83:1--83:??
Frank Manola Transforming the database system into an
open service concept . . . . . . . . . . 84:1--84:??
M. Tamer Özsu Future of database systems: changing
applications and technological
developments . . . . . . . . . . . . . . 85:1--85:??
Raghu Ramakrishnan Some promising directions for database
research . . . . . . . . . . . . . . . . 86:1--86:??
Krithi Ramamritham Application-oriented database support 87:1--87:??
Hans-J. Schek Improving the role of future database
systems . . . . . . . . . . . . . . . . 88:1--88:??
Richard Thomas Snodgrass The inefficiency of misalignment . . . . 89:1--89:??
Jeff Ullman Moving database theory into database
practice . . . . . . . . . . . . . . . . 90:1--90:??
Jennifer Widom Integrating heterogeneous databases:
lazy or eager? . . . . . . . . . . . . . 91:1--91:??
Owen Astrachan Education goals and priorities . . . . . 92:1--92:??
Kim Bruce Thoughts on computer science education 93:1--93:??
Robert Cupper A revised curriculum framework . . . . . 94:1--94:??
Peter Denning Business designs of the university . . . 95:1--95:??
Scot Drysdale What should we teach? . . . . . . . . . 96:1--96:??
Charles Kelemen First courses for nonmajors and public
understanding of computer science . . . 97:1--97:??
Catherine McGeoch Research in the curriculum, and the Web 98:1--98:??
Yale Patt First courses and fundamentals . . . . . 99:1--99:??
Richard Proulx and
Richard Rosala The future of computer science education 100:1--100:??
Roy Rada Calling for a virtual computing college 101:1--101:??
Eric Roberts Directions in computer science education 102:1--102:??
Lynn Andrea Stein Interactive programming: revolutionizing
introductory computer science . . . . . 103:1--103:??
Allen Tucker Crisis in computer science education . . 104:1--104:??
Nabil R. Adam and
Shamim Naqvi Universal access in digital libraries 105:1--105:??
Baruch Awerbuch Maximizing gross network product (GNP):
resource management on the GII . . . . . 106:1--106:??
Alex Brodsky Constraint database technology for
electronic trade with complex objectives 107:1--107:??
Robert Grossman Database mining challenges for digital
libraries . . . . . . . . . . . . . . . 108:1--108:??
Jim Johnson The physics of politics in the
information age . . . . . . . . . . . . 109:1--109:??
Barbara T. Blaustein and
Catherine McCollum and
Arnon Rosenthal Flexible security policies for digital
libraries . . . . . . . . . . . . . . . 110:1--110:??
Anna-Lena Neches The future of electronic commerce: a
pragmatic view . . . . . . . . . . . . . 111:1--111:??
Karen Bennet and
Jacob Slonim The electronic commerce position paper 112:1--112:??
Ouri Wolfson Infrastructure and cost models for
digital libraries . . . . . . . . . . . 113:1--113:??
Howard D. Wactlar The next generation electronic library
--- capturing the experience . . . . . . 114:1--114:??
Rajeev Alur Next steps in formal verification . . . 115:1--115:??
Edmund Clarke and
Jeannette M. Wing Tools and partial analysis . . . . . . . 116:1--116:??
Rance Cleaveland Formality and software design . . . . . 117:1--117:??
Steven German Research goals for formal methods . . . 118:1--118:??
Thomas A. Henzinger Some myths about formal verification . . 119:1--119:??
Gerard Holzmann On-the-fly model checking . . . . . . . 120:1--120:??
Cliff Jones Formal methods light . . . . . . . . . . 121:1--121:??
Doron Peled User interfaces for formal methods . . . 122:1--122:??
John Rushby Enhancing the utility of formal methods 123:1--123:??
Joseph Sifakis Safety, security and quality . . . . . . 124:1--124:??
Prasad Sistla Hybrid and incremental modelchecking
techniques . . . . . . . . . . . . . . . 125:1--125:??
Bernhard Steffen and
Tiziana Margaria Tools get formal methods into practice 126:1--126:??
Pierre Wolper The meaning of ``formal'' . . . . . . . 127:1--127:??
Jim Woodcock Software engineering research directions 128:1--128:??
Steve Bryson Implications of near-real-time
three-dimensional interfaces . . . . . . 129:1--129:??
Dick C. A. Bulterman Making the technology serve the user . . 130:1--130:??
Tiziana Catarci Databases and the Web: new requirements
for an easy access . . . . . . . . . . . 131:1--131:??
Wayne Citrin Strategic directions in visual languages
research . . . . . . . . . . . . . . . . 132:1--132:??
Isabel F. Cruz Tailorable information visualization . . 133:1--133:??
Ephraim P. Glinert and
R. Lindsay Todd and
G. Bowden Wise The adaptive multi-interface multimodal
environment . . . . . . . . . . . . . . 134:1--134:??
Jonathan Grudin The end of exile . . . . . . . . . . . . 135:1--135:??
James D. Hollan Strategic issues for human-computer
interaction . . . . . . . . . . . . . . 136:1--136:??
Yannis E. Ioannidis Visual user interfaces for database
systems . . . . . . . . . . . . . . . . 137:1--137:??
Robert J. K. Jacob The future of input devices . . . . . . 138:1--138:??
Bonnie E. John Evaluating usability evaluation
techniques . . . . . . . . . . . . . . . 139:1--139:??
David Kurlander Thoughts on user interface processes and
agendas . . . . . . . . . . . . . . . . 140:1--140:??
Brad A. Myers Programmability and heuristics in the
user interfaces . . . . . . . . . . . . 141:1--141:??
Dan R. Olsen, Jr. Computational resources and the Internet 142:1--142:??
Stuart M. Shieber A call for collaborative interfaces . . 143:1--143:??
Ben Shneiderman Advanced graphic user interfaces:
elastic and tightly coupled windows . . 144:1--144:??
John Stasko Future research directions in
human-computer interaction . . . . . . . 145:1--145:??
Gary W. Strong Human-centered information systems
(HCIS) . . . . . . . . . . . . . . . . . 146:1--146:??
Kent Wittenburg The WWW information glut: implications
for next-generation HCI technologies . . 147:1--147:??
M. Aksit Separation and composition of concerns
in the object-oriented model . . . . . . 148:1--148:??
A. P. Black Object-oriented languages: the next
generation . . . . . . . . . . . . . . . 149:1--149:??
L. Cardelli Bad engineering properties of
object-orient languages . . . . . . . . 150:1--150:??
P. Cointe Reflective languages and metalevel
architectures . . . . . . . . . . . . . 151:1--151:??
J. Coplien Broadening beyond objects to patterns
and to other paradigms . . . . . . . . . 152:1--152:??
R. Guerraoui Distributed programming abstractions . . 153:1--153:??
G. Kiczales Aspect-oriented programming . . . . . . 154:1--154:??
D. Lea Specification, architecture, and
interoperability . . . . . . . . . . . . 155:1--155:??
K. Lieberherr From transience to persistence in
object-oriented programming:
architectures and patterns . . . . . . . 156:1--156:??
O. Madsen Strategic research directions in
object-oriented programming . . . . . . 157:1--157:??
B. Magnusson Technology integration . . . . . . . . . 158:1--158:??
José Meseguer Why OOP needs new semantic foundations 159:1--159:??
H. Mössenböck Trends in object-oriented programming 160:1--160:??
J. Palsberg Compiler technology for object-oriented
languages . . . . . . . . . . . . . . . 161:1--161:??
D. Schmidt Using design patterns to guide the
development of reusable object-oriented
software . . . . . . . . . . . . . . . . 162:1--162:??
Luca Cardelli Global computation . . . . . . . . . . . 163:1--163:??
Charles Consel Program adaptation based on program
transformation . . . . . . . . . . . . . 164:1--164:??
Patrick Cousot Program analysis: the abstract
interpretation perspective . . . . . . . 165:1--165:??
Michael Hanus Integration of declarative paradigms:
benefits and challenges . . . . . . . . 166:1--166:??
Daniel Le Métayer Program analysis for software
engineering: new applications, new
requirements, new tools . . . . . . . . 167:1--167:??
Flemming Nielson Perspectives on program analysis . . . . 168:1--168:??
Martin Odersky Challenges in type systems research . . 169:1--169:??
Robert Paige Future directions in program
transformations . . . . . . . . . . . . 170:1--170:??
Alberto Pettorossi and
Maurizio Proietti Future directions in program
transformation . . . . . . . . . . . . . 171:1--171:??
John Reynolds Beyond ML . . . . . . . . . . . . . . . 172:1--172:??
Jon G. Riecke Semantics: the description of
computational structures . . . . . . . . 173:1--173:??
Barbara Ryder The future of program analysis . . . . . 174:1--174:??
David A. Schmidt On the need for a popular formal
semantics . . . . . . . . . . . . . . . 175:1--175:??
Dennis Volpano Provably secure programming languages
for remote evaluation . . . . . . . . . 176:1--176:??
Reinhard Wilhelm Program analysis --- a toolmaker's
perspective . . . . . . . . . . . . . . 177:1--177:??
Alan Burns Broadening real-time systems research 178:1--178:??
Kevin Jeffay Technical and educational challenges for
real-time computing . . . . . . . . . . 179:1--179:??
Mike Jones Consumer real-time systems . . . . . . . 180:1--180:??
Gary Koob Large-scale distributed real-time
systems . . . . . . . . . . . . . . . . 181:1--181:??
Insup Lee Formal verification, testing and
checking of real-time systems . . . . . 182:1--182:??
John Lehoczky Analytical methods for real-time
computing . . . . . . . . . . . . . . . 183:1--183:??
Jane Liu Validation of timing properties . . . . 184:1--184:??
Al Mok Firm real-time systems . . . . . . . . . 185:1--185:??
Krithi Ramamritham Predictability: demonstrating real-time
properties . . . . . . . . . . . . . . . 186:1--186:??
Lui Sha Real-time in the real world . . . . . . 187:1--187:??
Jack Stankovic The pervasiveness of real-time computing 188:1--188:??
Andre van Tilborg Real-time research in the Department of
Defense . . . . . . . . . . . . . . . . 189:1--189:??
Gregory Abowd Software engineering and programming
language considerations for ubiquitous
computing . . . . . . . . . . . . . . . 190:1--190:??
Craig Chambers Towards reusable, extensible components 192:1--192:??
Lori A. Clarke and
Peri Tarr New functionality for programming
languages . . . . . . . . . . . . . . . 193:1--193:??
William G. Griswold and
Richard Wolski and
Scott B. Baden and
Stephen J. Fink and
Scott R. Kohn Programming language requirements for
the next millennium . . . . . . . . . . 194:1--194:??
Robert Harper and
Peter Lee Research in programming languages for
composability, safety, and performance 195:1--195:??
Paul Hudak Building domain-specific embedded
languages . . . . . . . . . . . . . . . 196:1--196:??
Sam Kamin The challenge of language technology
transfer . . . . . . . . . . . . . . . . 197:1--197:??
Melody M. Moore Representation issues for reengineering
interactive systems . . . . . . . . . . 199:1--199:??
Jens Palsberg Software evolution and integration . . . 200:1--200:??
Bill Scherlis Beyond coding . . . . . . . . . . . . . 201:1--201:??
Jack Wileden Programming languages and software
engineering: past, present and future 202:1--202:??
Lori A. Clarke How do we improve software quality and
how do we show that it matters? . . . . 203:1--203:??
Richard A. DeMillo Mission-critical applications,
commercial value and software quality 204:1--204:??
William McKeeman Separating concerns in software quality 205:1--205:??
Edward F. Miller, Jr. Getting quality methods into practice 206:1--206:??
Alok Choudhary and
David Kotz Large-scale file systems with the
flexibility of databases . . . . . . . . 207:1--207:??
Thomas H. Cormen and
Michael T. Goodrich A bridging model for parallel
computation, communication, and I/O . . 208:1--208:??
Garth A. Gibson and
John Wilkes Self-managing network-attached storage 209:1--209:??
Richard R. Muntz and
Joseph Pasquale System-level design issues for storage
I/O . . . . . . . . . . . . . . . . . . 210:1--210:??
M. Satyanarayanan and
Carla Schlatter Ellis Adaptation: the key to mobile I/O . . . 211:1--211:??
Darren Erik Vengroff and
Jeffrey Scott Vitter I/O-efficient algorithms and
environments . . . . . . . . . . . . . . 212:1--212:??
Paul Green The impact of the Web on networking
research . . . . . . . . . . . . . . . . 213:1--213:??
Jim Kurose Future directions in networking research 214:1--214:??
Joseph Pasquale Towards Internet computing . . . . . . . 215:1--215:??
Dana Angluin A 1996 snapshot of computational
learning theory . . . . . . . . . . . . 216:1--216:??
Faith Fich Infrastructure issues related to theory
of computing research . . . . . . . . . 217:1--217:??
Oded Goldreich and
Avi Wigderson Theory of computing: a scientific
perspective . . . . . . . . . . . . . . 218:1--218:??
Robert Harper and
John Mitchell ML and beyond . . . . . . . . . . . . . 219:1--219:??
Peter Wegner Editorial Statement . . . . . . . . . . 1--2
M. M. Reid and
R. J. Millar and
N. D. Black Second-Generation Image Coding: An
Overview . . . . . . . . . . . . . . . . 3--29
Micha\l Walicki and
Sigurd Meldal Algebraic approaches to nondeterminism
--- an overview . . . . . . . . . . . . 30--81
Fong Pong and
Michel Dubois Verification Techniques for Cache
Coherence Protocols . . . . . . . . . . 82--126
Peter Wegner About this Issue \ldots . . . . . . . . 127--127
Richard A. Uhlig and
Trevor N. Mudge Trace-Driven Memory Simulation: a Survey 128--170
Vangelis T. Paschos A Survey of Approximately Optimal
Solutions to Some Covering and Packing
Problems . . . . . . . . . . . . . . . . 171--209
Tommy Thorn Programming languages for mobile code 213--239
Philip Wadler How to declare an imperative . . . . . . 240--263
Qiang Ji and
Michael M. Marefat Machine interpretation of CAD data for
manufacturing applications . . . . . . . 264--311
Pamela Zave Classification of research efforts in
requirements engineering . . . . . . . . 315--321
Hyacinth S. Nwana Is computer science education in crisis? 322--324
Frederick M. Weinhaus and
Venkat Devarajan Texture mapping $3$D models of
real-world scenes . . . . . . . . . . . 325--365
Hong Zhu and
Patrick A. V. Hall and
John H. R. May Software unit test coverage and adequacy 366--427
Anonymous Errata . . . . . . . . . . . . . . . . . 428--428
Anonymous Author index: Vols. 25--29 (1993--1997) 429--437
Anonymous Author index . . . . . . . . . . . . . . 429--437
Anonymous Subject index: Vols. 25--29 (1993--1997) 437--442
Subject index Subject index . . . . . . . . . . . . . 437--442
Peter Wegner About this issue . . . . . . . . . . . . 1--1
Scott M. Lewandowski Frameworks for component-based
client/server computing . . . . . . . . 3--27
Ran El-Yaniv Competitive solutions for online
financial problems . . . . . . . . . . . 28--69
Alexander Thomasian Concurrency control: methods,
performance, and analysis . . . . . . . 70--119
David B. Skillicorn and
Domenico Talia Models and languages for parallel
computation . . . . . . . . . . . . . . 123--169
Volker Gaede and
Oliver Günther Multidimensional access methods . . . . 170--231
Reidar Conradi and
Bernhard Westfechtel Version models for software
configuration management . . . . . . . . 232--282
Anonymous Contents: Computing Surveys' Electronic
Symposium on Partial Evaluating:
\path=http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/= 283--283
Anonymous Editorial . . . . . . . . . . . . . . . 284--284
Peter Wegner and
Marvin Israel Editorial . . . . . . . . . . . . . . . 284--284
Olivier Danvy and
Robert Glück and
Peter Thiemann 1998 Symposium on Partial Evaluation . . 285--290
Jean-Pierre Briot and
Rachid Guerraoui and
Klaus-Peter Lohr Concurrency and Distribution in
Object-Oriented Programming . . . . . . 291--329
Saleh E. Abdullahi and
Graem A. Ringwood Garbage Collecting the Internet: a
Survey of Distributed Garbage Collection 330--373
Prasant Mohapatra Wormhole Routing Techniques for Directly
Connected Multicomputer Systems . . . . 374--410
David Basin Logical framework based program
development . . . . . . . . . . . . . . 1:1--1:??
J. Field and
J. Heering and
T. B. Dinesh Equations as a uniform framework for
partial evaluation and abstract
interpretation . . . . . . . . . . . . . 2:1--2:??
Andrei Klimov Program specialization vs. program
composition . . . . . . . . . . . . . . 3:1--3:??
Michael Leuschel and
B. Martens and
D. de Schreye Some achievements and prospects in
partial deduction . . . . . . . . . . . 4:1--4:??
Torben Mogensen Inherited limits . . . . . . . . . . . . 5:1--5:??
Alberto Pettorossi and
Maurizio Proietti Program specialization via algorithmic
unfold/fold transformations . . . . . . 6:1--6:??
Akihiko Takano and
Zhenjiang Hu and
Masato Takeichi Program transformation in calculational
form . . . . . . . . . . . . . . . . . . 7:1--7:??
Philip Wickline and
Peter Lee and
Frank Pfenning and
Rowan Davies Modal types as staging specifications
for run-time code generation . . . . . . 8:1--8:??
Maria Alpuente and
Moreno Falaschi and
German Vidal A unifying view of functional and logic
program specialization . . . . . . . . . 9:1--9:??
Michele Bugliesi and
Anna Ciampolini and
Evelina Lamma and
Paola Mello Optimizing modular logic languages . . . 10:1--10:??
Sandro Etalle and
Maurizio Gabbrieli Partial evaluation of concurrent
constraint languages . . . . . . . . . . 11:1--11:??
J. P. Gallagher and
L. Lafave The role of trace abstractions in
program specialization algorithms . . . 12:1--12:??
John Hatcliff Foundations for partial evaluation of
functional programs with computational
effects . . . . . . . . . . . . . . . . 13:1--13:??
John Hughes Type specialization . . . . . . . . . . 14:1--14:??
L. Lafave and
J. P. Gallagher Extending the power of automatic
constraint-based partial evaluators . . 15:1--15:??
Konstantinos Sagonas and
Michael Leuschel Extending partial deduction to tabled
execution: some results and open issues 16:1--16:??
Sandrine Blazy and
Philippe Facon Partial evaluation for program
comprehension . . . . . . . . . . . . . 17:1--17:??
Tristan Cazenave Synthesis of an efficient tactical
theorem prover for the game of go . . . 18:1--18:??
C. Consel and
L. Hornof and
R. Marlet and
G. Muller and
S. Thibault and
E.-N. Volanschi and
J. Lawall and
J. Noyé Tempo: specializing systems applications
and beyond . . . . . . . . . . . . . . . 19:1--19:??
C. Consel and
L. Hornof and
R. Marlet and
G. Muller and
S. Thibault and
E.-N. Volanschi and
J. Lawall and
J. Noyé Partial evaluation for software
engineering . . . . . . . . . . . . . . 20:1--20:??
Scott Draves Partial evaluation for media processing 21:1--21:??
Matthew Dwyer and
John Hatcliff and
Muhammad Nanda Using partial evaluation to enable
verification of concurrent software . . 22:1--22:??
Mark Leone and
Peter Lee Dynamic specialization in the Fabius
system . . . . . . . . . . . . . . . . . 23:1--23:??
Oscar Waddell and
R. Kent Dybvig Visualizing partial evaluation . . . . . 24:1--24:??
Yuan Chang Liou and
Yih Nen Jeng A transfinite interpolation method of
grid generation based on multipoints . . 105--113
Peter Wegner About this issue\ldots . . . . . . . . . 411--411
Pankaj K. Agarwal and
Micha Sharir Efficient algorithms for geometric
optimization . . . . . . . . . . . . . . 412--458
Roel Wieringa A survey of structured and
object-oriented software specification
methods and techniques . . . . . . . . . 459--527
Fabio Crestani and
Mounia Lalmas and
Cornelis J. Van Rijsbergen and
Iain Campbell ``Is this document relevant? \ldots
probably'': a survey of probabilistic
models in information retrieval . . . . 528--552
Felix C. Gärtner Fundamentals of fault-tolerant
distributed computing in asynchronous
environments . . . . . . . . . . . . . . 1--26
Mengchi Liu Deductive database languages: problems
and solutions . . . . . . . . . . . . . 27--62
Norman W. Paton and
Oscar Díaz Active database systems . . . . . . . . 63--103
Kevin L. Mills Introduction to the Electronic Symposium
on Computer-Supported Cooperative Work 105--115
Anonymous Table of Contents: Electronic Symposium
on Computer-Supported Cooperative Work 116--116
Jin Jing and
Abdelsalam Sumi Helal and
Ahmed Elmagarmid Client-server computing in mobile
environments . . . . . . . . . . . . . . 117--157
Betty Salzberg and
Vassilis J. Tsotras Comparison of access methods for
time-evolving data . . . . . . . . . . . 158--221
Kevin L. Mills Introduction to the Electronic Symposium
on Computer-Supported Cooperative Work 1:1--1:??
Steven McCanne and
Eric Brewer and
Randy Katz and
Elan Amir and
Yatin Chawathe and
Todd Hodes and
Ketan Mayer-Patel and
Suchitra Raman and
Cynthia Romer and
Angela Schuett and
Andrew Swan and
Teck-Lee Tung and
Tina Wong and
Kristin Wright MASH: enabling scalable multipoint
collaboration . . . . . . . . . . . . . 2:1--2:??
Son Dao and
Eddie Shek and
Asha Vellaikal and
Richard R. Muntz and
Lixia Zhang and
Miodrag Potkonjak and
Ouri Wolfson Semantic multicast: intelligently
sharing collaborative sessions . . . . . 3:1--3:??
Ivan Marsic DISCIPLE: a framework for multimodal
collaboration in heterogeneous
environments . . . . . . . . . . . . . . 4:1--4:??
Daniel A. Reed and
Simon M. Kaplan Orbit/Virtue: collaboration and
visualization toolkits . . . . . . . . . 5:1--5:??
Kevin Martin Creation and performance analysis of
user representations in collaborative
virtual environments . . . . . . . . . . 6:1--6:??
Francis Kubala and
Sean Colbath and
Daben Liu and
John Makhoul Rough'n'Ready: a meeting recorder and
browser . . . . . . . . . . . . . . . . 7:1--7:??
David Payton and
Mike Daily and
Kevin Martin Dynamic collaborator discovery in
information intensive environments . . . 8:1--8:??
Howard D. Wactlar and
Michael G. Christel and
Alexander G. Hauptmann and
Yihong Gong Informedia Experience-on-Demand:
capturing, integrating and communicating
experiences across people, time and
space . . . . . . . . . . . . . . . . . 9:1--9:??
Michael Wolverton Task-based information management . . . 10:1--10:??
James H. Morris and
Christine M. Neuwirth and
Susan Harkness Regli and
Ravinder Chandhok and
Geoffrey C. Wenger Interface issues in computer support for
asynchronous communication . . . . . . . 11:1--11:??
Larry S. Jackson and
Ed Grossman Integration of synchronous and
asynchronous collaboration activities 12:1--12:??
Jonathan Rees and
Sarah Ferguson and
Sankar Virdhagriswaran Consistency management for distributed
collaboration . . . . . . . . . . . . . 13:1--13:??
Craig Thompson and
Paul Pazandak and
Venu Vasudevan and
Frank Manola and
Mark Palmer and
Gil Hansen and
Tom Bannon Intermediary Architecture: Interposing
middleware object services between Web
client and server . . . . . . . . . . . 14:1--14:??
Laurie Damianos and
Lynette Hirschman and
Robyn Kozierok and
Jeffrey Kurtz and
Andrew Greenberg and
Kimberley Walls and
Sharon Laskowski and
Jean Scholtz Evaluation for collaborative systems . . 15:1--15:??
M. Ranganathan and
Laurent Andrey and
Virginie Schaal and
Jean-Philippe Favreau Re-configurable distributed scripting 16:1--16:??
Samuel Bayer and
Laurie E. Damianos and
Robyn Kozierok and
James Mokwa The MITRE Multi-Modal Logger: its use in
evaluation of collaborative systems . . 17:1--17:??
Jeffrey L. Kurtz and
Laurie E. Damianos and
Robyn Kozierok and
Lynette Hirschman The MITRE map navigation experiment . . 18:1--18:??
P. Degano and
R. Gorrieri and
A. Marchetti-Spaccamela and
P. Wegner Computing Surveys' Electronic Symposium
on the Theory of Computation . . . . . . 223--225
Anonymous Symposium on the Theory of Computation:
Table of Contents . . . . . . . . . . . 226--226
Piero Fraternali Tools and approaches for developing
data-intensive Web applications: a
survey . . . . . . . . . . . . . . . . . 227--263
A. K. Jain and
M. N. Murty and
P. J. Flynn Data clustering: a review . . . . . . . 264--323
P. Degano and
R. Gorrieri and
A. Marchetti-Spaccamela and
P. Wegner Computing surveys' electronic symposium
on the theory of computation . . . . . . 1:1--1:??
H. Noltemeier and
H.-C. Wirth and
S. O. Krumke Network design and improvement . . . . . 2:1--2:??
Giuseppe Cattaneo and
Giuseppe Italiano Algorithm engineering . . . . . . . . . 3:1--3:??
Susanne Albers and
Stefano Leonardi On-line algorithms . . . . . . . . . . . 4:1--4:??
Chris Hankin and
Pasquale Malacaria Program analysis games . . . . . . . . . 5:1--5:??
Patric Cousot Directions for research in approximate
system analysis . . . . . . . . . . . . 6:1--6:??
Marco Bernardo Let's evaluate performance algebraically 7:1--7:??
Juraj Hromkovi\vc Some contributions of the study of
abstract communication complexity to
other areas of computer science . . . . 8:1--8:??
Hartmut Ehrig and
Gabriele Taentzer Graphical representation and graph
transformation . . . . . . . . . . . . . 9:1--9:??
Donald Sannella and
Andrzei Tarlecki Algebraic methods for specification and
formal development of programs . . . . . 10:1--10:??
Dale Miller and
Catuscia Palmidessi Foundational aspects of syntax . . . . . 11:1--11:??
Dora Giammarresi and
Antonio Restivo Extending formal language hierarchies to
higher dimensions . . . . . . . . . . . 12:1--12:??
Corrado Priami Operational methods in theoretical
computer science . . . . . . . . . . . . 13:1--13:??
Kohei Honda Semantics study and reality of computing 14:1--14:??
Rusins Freivalds How to simulate free will in a
computational device . . . . . . . . . . 15:1--15:??
Jiri Wiedermann Simulating the mind: a gauntlet thrown
to computer science . . . . . . . . . . 16:1--16:??
Helen Ashman and
Rosemary Michelle Simpson Computing Surveys' Electronic Symposium
on Hypertext and Hypermedia: Editorial 325--334
Grigoris Antoniou A tutorial on default logics . . . . . . 337--359
Sami Iren and
Paul D. Amer and
Phillip T. Conrad The transport layer: tutorial and survey 360--404
Yu-Kwong Kwok and
Ishfaq Ahmad Static scheduling algorithms for
allocating directed task graphs to
multiprocessors . . . . . . . . . . . . 406--471
Helen Ashman and
Rosemary Michelle Simpson Computing Surveys' Electronic Symposium
on Hypertext and Hypermedia: Editorial 1:1--1:??
Uffe K. Wiil and
Peter J. Nürnberg and
John J. Leggett Hypermedia research directions: an
infrastructure perspective . . . . . . . 2:1--2:??
Andrew E. Treloar Applying hypertext and hypermedia to
scholarly journals enables both product
and process innovation . . . . . . . . . 3:1--3:??
Douglas Tudhope and
Daniel Cunliffe Semantically indexed hypermedia: linking
information disciplines . . . . . . . . 4:1--4:??
Jon M. Kleinberg Hubs, authorities, and communities . . . 5:1--5:??
Sougata Mukherjea Information visualization for hypermedia
systems . . . . . . . . . . . . . . . . 6:1--6:??
Harri Oinas-Kukkonen Flexible CASE and hypertext . . . . . . 7:1--7:??
Gustavo Rossi and
Fernando Daniel Lyardet and
Daniel Schwabe Developing hypermedia applications with
methods and patterns . . . . . . . . . . 8:1--8:??
Leslie Carr and
Wendy Hall and
David De Roure The evolution of hypertext link services 9:1--9:??
Paul H. Lewis and
Wendy Hall and
Leslie A. Carr and
David De Roure The significance of linking . . . . . . 10:1--10:??
Siegfried Reich and
Leslie Carr and
David De Roure and
Wendy Hall Where have you been from here? Trials in
hypertext systems . . . . . . . . . . . 11:1--11:??
Paul De Bra and
Peter Brusilovsky and
Geert-Jan Houben Adaptive hypermedia: from systems to
framework . . . . . . . . . . . . . . . 12:1--12:??
Wen-Syan Li and
K. Selçuk Candan Integrating content search with
structure analysis for hypermedia
retrieval and management . . . . . . . . 13:1--13:??
Frank M. Shipman, III and
Catherine C. Marshall Spatial hypertext: an alternative to
navigational and semantic links . . . . 14:1--14:??
Richard Bodner and
Mark Chignell Dynamic hypertext: querying and linking 15:1--15:??
Richard W. Kopak Functional link typing in hypertext . . 16:1--16:??
Soumen Chakrabarti Recent results in automatic Web resource
discovery . . . . . . . . . . . . . . . 17:1--17:??
Jonathan Furner and
David Ellis and
Peter Willett Inter-linker consistency in the manual
construction of hypertext documents . . 18:1--18:??
Mark Bernstein Structural patterns and hypertext
rhetoric . . . . . . . . . . . . . . . . 19:1--19:??
Kenneth M. Anderson Supporting software engineering with
open hypermedia . . . . . . . . . . . . 20:1--20:??
Steven J. DeRose XML linking . . . . . . . . . . . . . . 21:1--21:??
Stephen J. Green Lexical semantics and automatic
hypertext construction . . . . . . . . . 22:1--22:??
Lynda Hardman and
Jacco van Ossenbruggen and
Lloyd Rutledge and
Dick C. A. Bulterman Hypermedia: the link with time . . . . . 23:1--23:??
Fabio Vitali Versioning hypermedia . . . . . . . . . 24:1--24:??
Steve Benford and
Ian Taylor and
David Brailsford and
Boriana Koleva and
Mike Craven and
Mike Fraser and
Gail Reynard and
Chris Greenhalgh Three dimensional visualization of the
World Wide Web . . . . . . . . . . . . . 25:1--25:??
Megan Quentin-Baxter Quantitative evidence for differences
between learners making use of passive
hypermedia learning environments . . . . 26:1--26:??
Ross Wilkinson and
Alan F. Smeaton Automatic link generation . . . . . . . 27:1--27:??
Hugh C. Davis Hypertext link integrity . . . . . . . . 28:1--28:??
Michael Bieber and
Joonhee Yoo Hypermedia: a design philosophy . . . . 29:1--29:??
David F. Brailsford Separable hyperstructure and delayed
link binding . . . . . . . . . . . . . . 30:1--30:??
Fabio Vitali and
Michael Bieber Hypermedia on the Web: what will it
take? . . . . . . . . . . . . . . . . . 31:1--31:??
Michael Bieber and
Harri Oinas-Kukkonen and
V. Balasubramanian Hypertext functionality . . . . . . . . 32:1--32:??
Theodor Holm Nelson Xanalogical structure, needed now more
than ever: parallel documents, deep
links to content, deep versioning, and
deep re-use . . . . . . . . . . . . . . 33:1--33:??
Janet Verbyla Unlinking the link . . . . . . . . . . . 34:1--34:??
Robert Cailliau and
Helen Ashman Hypertext in the Web --- a history . . . 35:1--35:??
Andries van Dam Education: the unfinished revolution . . 36:1--36:??
Theodor Holm Nelson The unfinished revolution and Xanadu . . 37:1--37:??
Douglas Engelbart and
Jeff Ruilifson Bootstrapping our collective
intelligence . . . . . . . . . . . . . . 38:1--38:??
P. Bellini and
R. Mattolini and
P. Nesi Temporal logics for real-time system
specification . . . . . . . . . . . . . 12--42
Wilhelm Hasselbring Programming languages and systems for
prototyping concurrent applications . . 43--79
Palash Sarkar A brief history of cellular automata . . 80--107
Mohamed E. Fayad Introduction to the Computing Surveys'
Electronic Symposium on Object-Oriented
Application Frameworks . . . . . . . . . 1:1--1:??
Davide Brugali and
Katia Sycara Frameworks and pattern languages: an
intriguing relationship . . . . . . . . 2:1--2:??
Jan Bosch and
Peter Molin and
Michael Mattsson and
PerOlof Bengtsson Object-oriented framework-based software
development: problems and experiences 3:1--3:??
Mohamed E. Fayad and
David S. Hamu Enterprise frameworks: guidelines for
selection . . . . . . . . . . . . . . . 4:1--4:??
Dirk Bäumer and
Guido Gryczan and
Rolf Knoll and
Carola Lilienthal and
Dirk Riehle and
Heinz Züllighoven Domain-driven framework layering in
large systems . . . . . . . . . . . . . 5:1--5:??
Wolfgang Pree and
Kai Koskimies Framelets --- small and loosely coupled
frameworks . . . . . . . . . . . . . . . 6:1--6:??
Yingwu Wang and
Dilip Patel and
Graham King and
Ian Court and
Geoff Staples and
Maraget Ross and
Mohamad Fayad On built-in test reuse in
object-oriented framework design . . . . 7:1--7:??
Görel Hedin and
Jòrgen Lindskov Knudsen On the role of language constructs for
framework design . . . . . . . . . . . . 8:1--8:??
James E. Carey and
Brent A. Carlson Deferring design decisions in an
application framework . . . . . . . . . 9:1--9:??
Dirk Riehle and
Roger Brudermann and
Thomas Gross and
Kai-Uwe Mätzel Pattern density and role modeling of an
object transport service . . . . . . . . 10:1--10:??
Mehmet Aksit and
Francesco Marcelloni and
Bedir Tekinerdogan Developing object-oriented frameworks
using domain models . . . . . . . . . . 11:1--11:??
Giancarlo Succi and
Andrea Valerio and
Tullio Vernazza and
Massimo Fenaroli and
Paolo Predonzani Framework extraction with domain
analysis . . . . . . . . . . . . . . . . 12:1--12:??
Pierre Roy and
Anne Liret and
François Pachet The framework approach for constraint
satisfaction . . . . . . . . . . . . . . 13:1--13:??
Neelam Soundarajan Documenting framework behavior . . . . . 14:1--14:??
Greg Butler and
Rudolf K. Keller and
Hafedh Mili A framework for framework documentation 15:1--15:??
António Rito Silva and
Francisco Assis Rosa and
Teresa Gonçalves Framework description using
concern-specific design patterns
composition . . . . . . . . . . . . . . 16:1--16:??
Garry Froehlich and
H. James Hoover and
Paul G. Sorenson Choosing an object-oriented domain
framework . . . . . . . . . . . . . . . 17:1--17:??
Jagdish Bansiya Evaluating framework architecture
structural stability . . . . . . . . . . 18:1--18:??
Zakaria Maamar and
Bernard Moulin An overview of software agent-oriented
frameworks . . . . . . . . . . . . . . . 19:1--19:??
Elizabeth A. Kendall and
P. V. Murali Krishna and
C. B. Suresh and
Chira G. V. Pathak An application framework for intelligent
and mobile agents . . . . . . . . . . . 20:1--20:??
Davide Brugali and
Katia Sycara Towards agent oriented application
frameworks . . . . . . . . . . . . . . . 21:1--21:??
Beno\^\it Garbinato and
Rachid Guerraoui An open framework for reliable
distributed computing . . . . . . . . . 22:1--22:??
John Michaloski and
Sushil Birla and
C. Jerry Yen and
Richard Igou and
George Weinert An open system framework for
component-based CNC machines . . . . . . 23:1--23:??
Lidia Fuentes and
Josée M. Troya Towards an open multimedia service
framework . . . . . . . . . . . . . . . 24:1--24:??
Verlyn Johnson The San Francisco Project: Business
process components and infrastructure 25:1--25:??
Riccardo Capobianchi and
Alberto Coen-Porisini and
Dino Mandrioli and
Angelo Morzenti A framework architecture for supervision
and control systems . . . . . . . . . . 26:1--26:??
Gerti Kappel and
Stefan Rausch-Schott and
Werner Retschitzegger A framework for workflow management
systems based on objects, rules and
roles . . . . . . . . . . . . . . . . . 27:1--27:??
Michael Koch and
Jürgen Koch Application of frameworks in groupware
--- the Iris group editor environment 28:1--28:??
Partha Pratim Pal A Framework for Isolating Connection
Exception Management . . . . . . . . . . 29:1--29:10
Partha pratim Pal A framework for isolating connection
exception management . . . . . . . . . . 29:1--29:??
Gustavo Rossi and
Alejandra Garrido and
Daniel Schwabe Navigating between objects. Lessons from
an object-oriented framework perspective 30:1--30:??
J.-M. Jézéquel An object-oriented framework for data
parallelism . . . . . . . . . . . . . . 31:1--31:??
Raman Kannan PAcceptor and SConnector frameworks:
combining concurrency and communication 32:1--32:??
Jürgen Buchner HotDoc: a framework for compound
documents . . . . . . . . . . . . . . . 33:1--33:??
Serge Demeyer and
Koen De Hondt and
Patrick Steyaert Consistent framework documentation with
computed links and framework contracts 34:1--34:??
Peter T. Whelan Experiences and issues with SEMATECH's
CIM framework . . . . . . . . . . . . . 35:1--35:??
Raja Harinath and
Jaideep Srivastava and
Jim Richardson and
Mark Foresti Experiences with an object oriented
framework for distributed control
applications . . . . . . . . . . . . . . 36:1--36:??
Ehab Al-Shaer and
Mohamed Fayed and
Hussein Abdel-Wahab Adaptive object-oriented filtering
framework for event management
applications . . . . . . . . . . . . . . 37:1--37:??
Volker Luckas and
Ralf Dörner Experience form the future --- using
object-orientation concepts for $3$D
visualization and validation of
industrial scenarios . . . . . . . . . . 38:1--38:??
Douglas C. Schmidt and
James C. Hu Developing flexible and high-performance
Web servers with frameworks and patterns 39:1--39:??
Ezra Ebner and
Weiguang Shao and
Wei-Tek Tsai The five-module framework for Internet
application development . . . . . . . . 40:1--40:??
Constantinos A. Constantinides and
Atef Bader and
Tzilla H. Elrad and
P. Netinant and
Mohamed E. Fayad Designing an aspect-oriented framework
in an object-oriented environment . . . 41:1--41:??
Carlos A. Coello An updated survey of GA-based
multiobjective optimization techniques 109--143
Mei Kobayashi and
Koichi Takeda Information retrieval on the Web . . . . 144--173
Steven P. Vanderwiel and
David J. Lilja Data prefetch mechanisms . . . . . . . . 174--199
Helen Ashman Electronic document addressing: dealing
with change . . . . . . . . . . . . . . 201--212
Iffat H. Kazi and
Howard H. Chen and
Berdenia Stanley and
David J. Lilja Techniques for obtaining high
performance in Java programs . . . . . . 213--240
Dejan S. Miloji\vci\'c and
Fred Douglis and
Yves Paindaveine and
Richard Wheeler and
Songnian Zhou Process migration . . . . . . . . . . . 241--299
Eleanor Rieffel and
Wolfgang Polak An introduction to quantum computing for
non-physicists . . . . . . . . . . . . . 300--335
Carlos Iván Chesñevar and
Ana Gabriela Maguitman and
Ronald Prescott Loui Logical models of argument . . . . . . . 337--383
David M. Hilbert and
David F. Redmiles Extracting usability information from
user interface events . . . . . . . . . 384--421
Donald Kossmann The state of the art in distributed
query processing . . . . . . . . . . . . 422--469
Russell Greiner and
Christian Darken and
N. Iwan Santoso Efficient reasoning . . . . . . . . . . 1--30
Gonzalo Navarro A guided tour to approximate string
matching . . . . . . . . . . . . . . . . 31--88
Karsten Weihe A software engineering perspective on
algorithmics . . . . . . . . . . . . . . 89--134
Pierpaolo Degano and
Corrado Priami Enhanced operational semantics: a tool
for describing and analyzing concurrent
systems . . . . . . . . . . . . . . . . 135--176
Bev Littlewood and
Peter Popov and
Lorenzo Strigini Modeling software design diversity: a
review . . . . . . . . . . . . . . . . . 177--208
Jeffrey Scott Vitter External memory algorithms and data
structures: dealing with massive data 209--271
Edgar Chávez and
Gonzalo Navarro and
Ricardo Baeza-Yates and
José Luis Marroquín Searching in metric spaces . . . . . . . 273--321
Christian Böhm and
Stefan Berchtold and
Daniel A. Keim Searching in high-dimensional spaces:
Index structures for improving the
performance of multimedia databases . . 322--373
Evgeny Dantsin and
Thomas Eiter and
Georg Gottlob and
Andrei Voronkov Complexity and expressive power of logic
programming . . . . . . . . . . . . . . 374--425
Gregory V. Chockler and
Idit Keidar and
Roman Vitenberg Group communication specifications: a
comprehensive study . . . . . . . . . . 427--469
Melody Y. Ivory and
Marti A. Hearst The state of the art in automating
usability evaluation of user interfaces 470--516
Pieter H. Hartel and
Luc Moreau Formalizing the safety of Java, the Java
Virtual Machine, and Java card . . . . . 517--558
Fabrizio Sebastiani Machine learning in automated text
categorization . . . . . . . . . . . . . 1--47
Weiyi Meng and
Clement Yu and
King-Lup Liu Building efficient and effective
metasearch engines . . . . . . . . . . . 48--89
Michael F. McTear Spoken dialogue technology: enabling the
conversational user interface . . . . . 90--169
Katherine Compton and
Scott Hauck Reconfigurable computing: a survey of
systems and software . . . . . . . . . . 171--210
Sylvain Petitjean A survey of methods for recovering
quadrics in triangle meshes . . . . . . 211--262
Valeria Cardellini and
Emiliano Casalicchio and
Michele Colajanni and
Philip S. Yu The state of the art in locally
distributed Web-server systems . . . . . 263--311
Josep Díaz and
Jordi Petit and
Maria Serna A survey of graph layout problems . . . 313--356
Hala Elaarag Improving TCP performance over mobile
networks . . . . . . . . . . . . . . . . 357--374
E. N. (Mootaz) Elnozahy and
Lorenzo Alvisi and
Yi-Min Wang and
David B. Johnson A survey of rollback-recovery protocols
in message-passing systems . . . . . . . 375--408
Yuri Leontiev and
M. Tamer Özsu and
Duane Szafron On type systems for object-oriented
database programming languages . . . . . 409--449
G. Denys and
F. Piessens and
F. Matthijs A survey of customizability in operating
systems research . . . . . . . . . . . . 450--468
Devanshu Dhyani and
Wee Keong Ng and
Sourav S. Bhowmick A survey of Web metrics . . . . . . . . 469--503
Jörg Rothe Some facets of complexity theory and
cryptography: a five-lecture tutorial 504--549
Pankaj K. Agarwal and
Leonidas J. Guibas and
Herbert Edelsbrunner and
Jeff Erickson and
Michael Isard and
Sariel Har-Peled and
John Hershberger and
Christian Jensen and
Lydia Kavraki and
Patrice Koehl and
Ming Lin and
Dinesh Manocha and
Dimitris Metaxas and
Brian Mirtich and
David Mount and
S. Muthukrishnan and
Dinesh Pai and
Elisha Sacks and
Jack Snoeyink and
Subhash Suri and
Ouri Wolefson Algorithmic issues in modeling motion 550--572
Jason Dedrick and
Vijay Gurbaxani and
Kenneth L. Kraemer Information technology and economic
performance: a critical review of the
empirical evidence . . . . . . . . . . . 1--28
Theo Ungerer and
Borut Robi\vc and
Jurij \vSilc A survey of processors with explicit
multithreading . . . . . . . . . . . . . 29--63
William R. Scott and
Gerhard Roth and
Jean-François Rivest View planning for automated
three-dimensional object reconstruction
and inspection . . . . . . . . . . . . . 64--96
John Aycock A brief history of just-in-time . . . . 97--113
Patrick Th. Eugster and
Pascal A. Felber and
Rachid Guerraoui and
Anne-Marie Kermarrec The many faces of publish/subscribe . . 114--131
William N. Robinson and
Suzanne D. Pawlowski and
Vecheslav Volkov Requirements interaction management . . 132--190
Sandeep Purao and
Vijay Vaishnavi Product metrics for object-oriented
systems . . . . . . . . . . . . . . . . 191--221
Árpád Beszédes and
Rudolf Ferenc and
Tibor Gyimóthy and
André Dolenc and
Konsta Karsisto Survey of code-size reduction methods 223--267
Christian Blum and
Andrea Roli Metaheuristics in combinatorial
optimization: Overview and conceptual
comparison . . . . . . . . . . . . . . . 268--308
Sandro Rafaeli and
David Hutchison A survey of key management for secure
group communication . . . . . . . . . . 309--329
Utz Westermann and
Wolfgang Klas An analysis of XML database solutions
for the management of MPEG-7 media
descriptions . . . . . . . . . . . . . . 331--373
Stefan Podlipnig and
Laszlo Böszörmenyi A survey of Web cache replacement
strategies . . . . . . . . . . . . . . . 374--398
W. Zhao and
R. Chellappa and
P. J. Phillips and
A. Rosenfeld Face recognition: a literature survey 399--458
Wesley M. Johnston and
J. R. Paul Hanna and
Richard J. Millar Advances in dataflow programming
languages . . . . . . . . . . . . . . . 1--34
M. L. Kherfi and
D. Ziou and
A. Bernardi Image Retrieval from the World Wide Web:
Issues, Techniques, and Systems . . . . 35--67
Mitchell A. Harris and
Edward M. Reingold Line drawing, leap years, and Euclid . . 68--80
Cemil Kirbas and
Francis Quek A review of vessel extraction techniques
and algorithms . . . . . . . . . . . . . 81--121
Jacques Cohen Bioinformatics --- an introduction for
computer scientists . . . . . . . . . . 122--158
Hanan Samet Object-based and image-based object
representations . . . . . . . . . . . . 159--217
Stefan Pleisch and
André Schiper Approaches to fault-tolerant and
transactional mobile agent
execution---an algorithmic view . . . . 219--262
Anna Formica and
Michele Missikoff Inheritance processing and conflicts in
structural generalization hierarchies 263--290
Swaminathan Sivasubramanian and
Michal Szymaniak and
Guillaume Pierre and
Maarten van Steen Replication for Web hosting systems . . 291--334
Stephanos Androutsellis-Theotokis and
Diomidis Spinellis A survey of peer-to-peer content
distribution technologies . . . . . . . 335--371
Xavier Défago and
André Schiper and
Péter Urbán Total order broadcast and multicast
algorithms: Taxonomy and survey . . . . 372--421
Reuven Bar-Yehuda and
Keren Bendel and
Ari Freund and
Dror Rawitz Local ratio: a unified framework for
approximation algorithms. In Memoriam:
Shimon Even 1935--2004 . . . . . . . . . 422--463
Rajendra Bose and
James Frew Lineage retrieval for scientific data
processing: a survey . . . . . . . . . . 1--28
William Tolone and
Gail-Joon Ahn and
Tanusree Pai and
Seng-Phil Hong Access control in collaborative systems 29--41
Yasushi Saito and
Marc Shapiro Optimistic replication . . . . . . . . . 42--81
Caitlin Kelleher and
Randy Pausch Lowering the barriers to programming: a
taxonomy of programming environments and
languages for novice programmers . . . . 83--137
Eran Gal and
Sivan Toledo Algorithms and data structures for flash
memories . . . . . . . . . . . . . . . . 138--163
Paolo Santi Topology control in wireless ad hoc and
sensor networks . . . . . . . . . . . . 164--194
Vasanth Venkatachalam and
Michael Franz Power reduction techniques for
microprocessor systems . . . . . . . . . 195--237
David E. Taylor Survey and taxonomy of packet
classification techniques . . . . . . . 238--275
Marco Eichelberg and
Thomas Aden and
Jörg Riesmeier and
Asuman Dogac and
Gokce B. Laleci A survey and analysis of Electronic
Healthcare Record standards . . . . . . 277--315
Marjan Mernik and
Jan Heering and
Anthony M. Sloane When and how to develop domain-specific
languages . . . . . . . . . . . . . . . 316--344
Benjamin Bustos and
Daniel A. Keim and
Dietmar Saupe and
Tobias Schreck and
Dejan V. Vrani\'c Feature-based similarity search in $3$D
object databases . . . . . . . . . . . . 345--387
Tobias Bjerregaard and
Shankar Mahadevan A survey of research and practices of
Network-on-Chip . . . . . . . . . . . . 1:1--1:51
Deepayan Chakrabarti and
Christos Faloutsos Graph mining: Laws, generators, and
algorithms . . . . . . . . . . . . . . . 2:1--2:69
Srikumar Venugopal and
Rajkumar Buyya and
Kotagiri Ramamohanarao A taxonomy of Data Grids for distributed
data sharing, management, and processing 3:1--3:53
Jordi Turmo and
Alicia Ageno and
Neus Catal\`a Adaptive information extraction . . . . 4:1--4:47
Aaron Ceglar and
John F. Roddick Association mining . . . . . . . . . . . 5:1--5:42
Justin Zobel and
Alistair Moffat Inverted files for text search engines 6:1--6:56
Jing Ma and
Jeffrey V. Nickerson Hands-on, simulated, and remote
laboratories: a comparative literature
review . . . . . . . . . . . . . . . . . 7:1--7:24
Alice Miller and
Alastair Donaldson and
Muffy Calder Symmetry in temporal logic model
checking . . . . . . . . . . . . . . . . 8:1--8:36
Liqiang Geng and
Howard J. Hamilton Interestingness measures for data
mining: a survey . . . . . . . . . . . . 9:1--9:32
Goetz Graefe Implementing sorting in database systems 10:1--10:37
Richard A. Frost Realization of natural language
interfaces using lazy functional
programming . . . . . . . . . . . . . . 11:1--11:54
Lucas Bordeaux and
Youssef Hamadi and
Lintao Zhang Propositional Satisfiability and
Constraint Programming: a comparative
survey . . . . . . . . . . . . . . . . . 12:1--12:54
Alper Yilmaz and
Omar Javed and
Mubarak Shah Object tracking: a survey . . . . . . . 13:1--13:45
Johann Van Der Merwe and
Dawoud Dawoud and
Stephen McDonald A survey on peer-to-peer key management
for mobile ad hoc networks . . . . . . . 1:1--1:45
Gonzalo Navarro and
Veli Mäkinen Compressed full-text indexes . . . . . . 2:1--2:61
Tao Peng and
Christopher Leckie and
Kotagiri Ramamohanarao Survey of network-based defense
mechanisms countering the DoS and DDoS
problems . . . . . . . . . . . . . . . . 3:1--3:42
Simon J. Puglisi and
W. F. Smyth and
Andrew H. Turpin A taxonomy of suffix array construction
algorithms . . . . . . . . . . . . . . . 4:1--4:31
Dong Zheng and
Yan Liu and
Jiying Zhao and
Abdulmotaleb El Saddik A survey of RST invariant image
watermarking algorithms . . . . . . . . 5:1--5:91
Dagmar Bruss and
Gábor Erdélyi and
Tim Meyer and
Tobias Riege and
Jörg Rothe Quantum cryptography: a survey . . . . . 6:1--6:27
Suleyman Uludag and
King-Shan Lui and
Klara Nahrstedt and
Gregory Brewster Analysis of Topology Aggregation
techniques for QoS routing . . . . . . . 7:1--7:31
Mark Truran and
James Goulding and
Helen Ashman Autonomous authoring tools for hypertext 8:1--8:30
Eduardo F. Nakamura and
Antonio A. F. Loureiro and
Alejandro C. Frery Information fusion for wireless sensor
networks: Methods, models, and
classifications . . . . . . . . . . . . 9:1--9:55
Akrivi Katifori and
Constantin Halatsis and
George Lepouras and
Costas Vassilakis and
Eugenia Giannopoulou Ontology visualization methods --- a
survey . . . . . . . . . . . . . . . . . 10:1--10:43
David B. Thomas and
Wayne Luk and
Philip H. W. Leong and
John D. Villasenor Gaussian random number generators . . . 11:1--11:38
Konstantinos Morfonios and
Stratis Konakas and
Yannis Ioannidis and
Nikolaos Kotsis ROLAP implementations of the data cube 12:1--12:53
Renzo Angles and
Claudio Gutierrez Survey of graph database models . . . . 1:1--1:39
Ricardo Fabbri and
Luciano Da F. Costa and
Julio C. Torelli and
Odemir M. Bruno $2$D Euclidean distance transform
algorithms: a comparative survey . . . . 2:1--2:44
Raman Ramsin and
Richard F. Paige Process-centered review of object
oriented software development
methodologies . . . . . . . . . . . . . 3:1--3:89
Iwan Vosloo and
Derrick G. Kourie Server-centric Web frameworks: an
overview . . . . . . . . . . . . . . . . 4:1--4:33
Ritendra Datta and
Dhiraj Joshi and
Jia Li and
James Z. Wang Image retrieval: Ideas, influences, and
trends of the new age . . . . . . . . . 5:1--5:60
Vincenzo De Florio and
Chris Blondia A survey of linguistic structures for
application-level fault tolerance . . . 6:1--6:37
Markus C. Huebscher and
Julie A. McCann A survey of autonomic computing ---
degrees, models, and applications . . . 7:1--7:28
Adam Lopez Statistical machine translation . . . . 8:1--8:49
Peter C. Chapin and
Christian Skalka and
X. Sean Wang Authorization in trust management:
Features and foundations . . . . . . . . 9:1--9:48
Stefan Miltchev and
Jonathan M. Smith and
Vassilis Prevelakis and
Angelos Keromytis and
Sotiris Ioannidis Decentralized access control in
distributed file systems . . . . . . . . 10:1--10:30
Ihab F. Ilyas and
George Beskales and
Mohamed A. Soliman A survey of top-$k$ query processing
techniques in relational database
systems . . . . . . . . . . . . . . . . 11:1--11:58
S. Biasotti and
L. De Floriani and
B. Falcidieno and
P. Frosini and
D. Giorgi and
C. Landi and
L. Papaleo and
M. Spagnuolo Describing shapes by
geometrical-topological properties of
real functions . . . . . . . . . . . . . 12:1--12:87
Jens Bleiholder and
Felix Naumann Data fusion . . . . . . . . . . . . . . 1:1--1:41
Andy Cockburn and
Amy Karlson and
Benjamin B. Bederson A review of overview+detail, zooming,
and focus+context interfaces . . . . . . 2:1--2:31
Michael Benedikt and
Christoph Koch XPath leashed . . . . . . . . . . . . . 3:1--3:54
Richard B. Borie and
R. Gary Parker and
Craig A. Tovey Solving problems on recursively
constructed graphs . . . . . . . . . . . 4:1--4:51
Jose A. Onieva and
Jianying Zhou and
Javier Lopez Multiparty nonrepudiation: a survey . . 5:1--5:43
Kate A. Smith-Miles Cross-disciplinary perspectives on
meta-learning for algorithm selection 6:1--6:25
Besma R. Abidi and
Nash R. Aragam and
Yi Yao and
Mongi A. Abidi Survey and analysis of multimodal sensor
planning and integration for wide area
surveillance . . . . . . . . . . . . . . 7:1--7:36
Nathan Brown Chemoinformatics --- an introduction for
computer scientists . . . . . . . . . . 8:1--8:38
Robert M. Hierons and
Kirill Bogdanov and
Jonathan P. Bowen and
Rance Cleaveland and
John Derrick and
Jeremy Dick and
Marian Gheorghe and
Mark Harman and
Kalpesh Kapoor and
Paul Krause and
Gerald Lüttgen and
Anthony J. H. Simons and
Sergiy Vilkomir and
Martin R. Woodward and
Hussein Zedan Using formal specifications to support
testing . . . . . . . . . . . . . . . . 9:1--9:76
Roberto Navigli Word sense disambiguation: a survey . . 10:1--10:69
Alicia Iriberri and
Gondy Leroy A life-cycle perspective on online
community success . . . . . . . . . . . 11:1--11:29
Xiaoguang Qi and
Brian D. Davison Web page classification: Features and
algorithms . . . . . . . . . . . . . . . 12:1--12:31
Carlo A. Furia and
Matteo Pradella and
Matteo Rossi Comments on temporal logics for
real-time system specification . . . . . 13:1--13:5
Gary H. Sockut and
Balakrishna R. Iyer Online reorganization of databases . . . 14:1--14:136
Varun Chandola and
Arindam Banerjee and
Vipin Kumar Anomaly detection: a survey . . . . . . 15:1--15:58
Carlo Batini and
Cinzia Cappiello and
Chiara Francalanci and
Andrea Maurino Methodologies for data quality
assessment and improvement . . . . . . . 16:1--16:52
Claudio Carpineto and
Stanislaw Osi\'nski and
Giovanni Romano and
Dawid Weiss A survey of Web clustering engines . . . 17:1--17:38
C. A. R. Hoare and
Jayadev Misra Preface to special issue on software
verification . . . . . . . . . . . . . . 18:1--18:3
Jim Woodcock and
Peter Gorm Larsen and
Juan Bicarregui and
John Fitzgerald Formal methods: Practice and experience 19:1--19:36
Natarajan Shankar Automated deduction for verification . . 20:1--20:56
Ranjit Jhala and
Rupak Majumdar Software model checking . . . . . . . . 21:1--21:54
C. A. R. Hoare and
Jayadev Misra and
Gary T. Leavens and
Natarajan Shankar The verified software initiative: a
manifesto . . . . . . . . . . . . . . . 22:1--22:8
Kevin Hoffman and
David Zage and
Cristina Nita-Rotaru A survey of attack and defense
techniques for reputation systems . . . 1:1--1:31
Hubie Chen A rendezvous of logic, complexity, and
algebra . . . . . . . . . . . . . . . . 2:1--2:32
Alexis Kirke and
Eduardo Reck Miranda A survey of computer systems for
expressive music performance . . . . . . 3:1--3:41
James A. Muir and
Paul C. Van Oorschot Internet geolocation: Evasion and
counterevasion . . . . . . . . . . . . . 4:1--4:23
Matthew Edman and
Bülent Yener On anonymity in an electronic society: a
survey of anonymous communication
systems . . . . . . . . . . . . . . . . 5:1--5:35
Carlo A. Furia and
Dino Mandrioli and
Angelo Morzenti and
Matteo Rossi Modeling time in computing: a taxonomy
and a comparative survey . . . . . . . . 6:1--6:59
Bernhard Haslhofer and
Wolfgang Klas A survey of techniques for achieving
metadata interoperability . . . . . . . 7:1--7:37
Zhiwen Yu and
Yuichi Nakamura Smart meeting systems: a survey of
state-of-the-art and open issues . . . . 8:1--8:20
Jaume Abella and
Xavier Vera Electromigration for microarchitects . . 9:1--9:18
Felix Salfner and
Maren Lenk and
Miroslaw Malek A survey of online failure prediction
methods . . . . . . . . . . . . . . . . 10:1--10:42
Yildiray Kabak and
Asuman Dogac A survey and analysis of electronic
business document standards . . . . . . 11:1--11:31
Sergio Ilarri and
Eduardo Mena and
Arantza Illarramendi Location-dependent query processing:
Where we are and where we are heading 12:1--12:73
João M. P. Cardoso and
Pedro C. Diniz and
Markus Weinhardt Compiling for reconfigurable computing:
a survey . . . . . . . . . . . . . . . . 13:1--13:65
Benjamin C. M. Fung and
Ke Wang and
Rui Chen and
Philip S. Yu Privacy-preserving data publishing: a
survey of recent developments . . . . . 14:1--14:53
Wen Gao and
Yonghong Tian and
Tiejun Huang and
Qiang Yang Vlogging: a survey of videoblogging
technology on the Web . . . . . . . . . 15:1--15:57
Mario Cannataro and
Pietro H. Guzzi and
Pierangelo Veltri Protein-to-protein interactions:
Technologies, databases, and algorithms 1:1--1:36
Sarah M. Diesburg and
An-I Andy Wang A survey of confidential data storage
and deletion methods . . . . . . . . . . 2:1--2:37
Nizar R. Mabroukeh and
C. I. Ezeife A taxonomy of sequential pattern mining
algorithms . . . . . . . . . . . . . . . 3:1--3:41
Hafedh Mili and
Guy Tremblay and
Guitta Bou Jaoude and
Éric Lefebvre and
Lamia Elabed and
Ghizlane El Boussaidi Business process modeling languages:
Sorting through the alphabet soup . . . 4:1--4:56
Jinu Kurian and
Kamil Sarac A survey on the design, applications,
and enhancements of application-layer
overlay networks . . . . . . . . . . . . 5:1--5:34
Pimwadee Chaovalit and
Aryya Gangopadhyay and
George Karabatis and
Zhiyuan Chen Discrete wavelet transform-based time
series analysis and mining . . . . . . . 6:1--6:37
Aline Carneiro Viana and
Stephane Maag and
Fatiha Zaidi One step forward: Linking wireless
self-organizing network validation
techniques with formal testing
approaches . . . . . . . . . . . . . . . 7:1--7:36
Guido Urdaneta and
Guillaume Pierre and
Maarten Van Steen A survey of DHT security techniques . . 8:1--8:49
Felix C. Freiling and
Rachid Guerraoui and
Petr Kuznetsov The failure detector abstraction . . . . 9:1--9:40
Simon Parsons and
Juan A. Rodriguez-Aguilar and
Mark Klein Auctions and bidding: a guide for
computer scientists . . . . . . . . . . 10:1--10:59
Changhai Nie and
Hareton Leung A survey of combinatorial testing . . . 11:1--11:29
Wei Jie and
Junaid Arshad and
Richard Sinnott and
Paul Townend and
Zhou Lei A review of grid authentication and
authorization technologies and support
for federated access control . . . . . . 12:1--12:26
Clémence Magnien and
Matthieu Latapy and
Jean-Loup Guillaume Impact of random failures and attacks on
Poisson and power-law random networks 13:1--13:31
Patricia Beatty and
Ian Reay and
Scott Dick and
James Miller Consumer trust in e-commerce Web sites:
a meta-study . . . . . . . . . . . . . . 14:1--14:46
Kathleen Mcgill and
Stephen Taylor Robot algorithms for localization of
multiple emission sources . . . . . . . 15:1--15:25
J. K. Aggarwal and
M. S. Ryoo Human activity analysis: a review . . . 16:1--16:43
Sarvnaz Karimi and
Falk Scholer and
Andrew Turpin Machine transliteration survey . . . . . 17:1--17:46
Roland Ducournau Implementing statically typed
object-oriented programming languages 18:1--18:48
Luca Mottola and
Gian Pietro Picco Programming wireless sensor networks:
Fundamental concepts and state of the
art . . . . . . . . . . . . . . . . . . 19:1--19:51
Steffen Van Bakel Strict intersection types for the Lambda
Calculus . . . . . . . . . . . . . . . . 20:1--20:49
Andrew J. Ko and
Robin Abraham and
Laura Beckwith and
Alan Blackwell and
Margaret Burnett and
Martin Erwig and
Chris Scaffidi and
Joseph Lawrance and
Henry Lieberman and
Brad Myers and
Mary Beth Rosson and
Gregg Rothermel and
Mary Shaw and
Susan Wiedenbeck The state of the art in end-user
software engineering . . . . . . . . . . 21:1--21:44
Elias P. Duarte, Jr. and
Roverli P. Ziwich and
Luiz C. P. Albini A survey of comparison-based
system-level diagnosis . . . . . . . . . 22:1--22:56
Yuhui Deng What is the future of disk drives, death
or rebirth? . . . . . . . . . . . . . . 23:1--23:27
Laurie McLeod and
Stephen G. MacDonell Factors that affect software systems
development project outcomes: a survey
of research . . . . . . . . . . . . . . 24:1--24:56
Alsayed Algergawy and
Marco Mesiti and
Richi Nayak and
Gunter Saake XML data clustering: an overview . . . . 25:1--25:41
Anderson Rocha and
Walter Scheirer and
Terrance Boult and
Siome Goldenstein Vision of the unseen: Current trends and
challenges in digital image and video
forensics . . . . . . . . . . . . . . . 26:1--26:42
Sergio Damas and
Oscar Cordón and
Oscar Ibáñez and
Jose Santamaría and
Inmaculada Alemán and
Miguel Botella and
Fernando Navarro Forensic identification by
computer-aided craniofacial
superimposition: a survey . . . . . . . 27:1--27:27
Manuel Wimmer and
Andrea Schauerhuber and
Gerti Kappel and
Werner Retschitzegger and
Wieland Schwinger and
Elizabeth Kapsammer A survey on UML-based aspect-oriented
design modeling . . . . . . . . . . . . 28:1--28:33
Ferdous A. Sohel and
Gour C. Karmakar and
Laurence S. Dooley and
Mohammed Bennamoun Geometric distortion measurement for
shape coding: a contemporary review . . 29:1--29:22
Torsten Anders and
Eduardo R. Miranda Constraint programming systems for
modeling music theories and composition 30:1--30:38
Matthew G. Parris and
Carthik A. Sharma and
Ronald F. Demara Progress in autonomous fault recovery of
field programmable gate arrays . . . . . 31:1--31:30
Bang Wang Coverage problems in sensor networks: a
survey . . . . . . . . . . . . . . . . . 32:1--32:53
Davide Falessi and
Giovanni Cantone and
Rick Kazman and
Philippe Kruchten Decision-making techniques for software
architecture design: a comparative
survey . . . . . . . . . . . . . . . . . 33:1--33:28
Tomá\vs Skopal and
Benjamin Bustos On nonmetric similarity search problems
in complex domains . . . . . . . . . . . 34:1--34:50
Robert I. Davis and
Alan Burns A survey of hard real-time scheduling
for multiprocessor systems . . . . . . . 35:1--35:44
Fariba Sadri Ambient intelligence: a survey . . . . . 36:1--36:66
Claudio Carpineto and
Giovanni Romano A Survey of Automatic Query Expansion in
Information Retrieval . . . . . . . . . 1:1--1:50
David Zhang and
Wangmeng Zuo and
Feng Yue A Comparative Study of Palmprint
Recognition Algorithms . . . . . . . . . 2:1--2:37
Hanne Riis Nielson and
Flemming Nielson and
Henrik Pilegaard Flow Logic for Process Calculi . . . . . 3:1--3:39
Songbo Song and
Hassnaa Moustafa and
Hossam Afifi A Survey on Personalized TV and NGN
Services through Context-Awareness . . . 4:1--4:18
Robert Wójcik and
Andrzej Jajszczyk Flow Oriented Approaches to QoS
Assurance . . . . . . . . . . . . . . . 5:1--5:37
Manuel Egele and
Theodoor Scholte and
Engin Kirda and
Christopher Kruegel A survey on automated dynamic
malware-analysis techniques and tools 6:1--6:42
Kevin Crowston and
Kangning Wei and
James Howison and
Andrea Wiggins Free\slash Libre open-source software
development: What we know and what we do
not know . . . . . . . . . . . . . . . . 7:1--7:35
Pedro Antunes and
Valeria Herskovic and
Sergio F. Ochoa and
Jose A. Pino Structuring dimensions for collaborative
systems evaluation . . . . . . . . . . . 8:1--8:28
Godwin Caruana and
Maozhen Li A survey of emerging approaches to spam
filtering . . . . . . . . . . . . . . . 9:1--9:27
Jan Midtgaard Control-flow analysis of functional
programs . . . . . . . . . . . . . . . . 10:1--10:33
Hossain Shahriar and
Mohammad Zulkernine Mitigating program security
vulnerabilities: Approaches and
challenges . . . . . . . . . . . . . . . 11:1--11:46
Josep Silva A vocabulary of program slicing-based
techniques . . . . . . . . . . . . . . . 12:1--12:41
Joonho Kong and
Sung Woo Chung and
Kevin Skadron Recent thermal management techniques for
microprocessors . . . . . . . . . . . . 13:1--13:42
Syed M. S. Islam and
Mohammed Bennamoun and
Robyn A. Owens and
Rowan Davies A review of recent advances in $3$D ear-
and expression-invariant face biometrics 14:1--14:34
Gianpaolo Cugola and
Alessandro Margara Processing flows of information: From
data stream to complex event processing 15:1--15:62
John Hatcliff and
Gary T. Leavens and
K. Rustan M. Leino and
Peter Müller and
Matthew Parkinson Behavioral interface specification
languages . . . . . . . . . . . . . . . 16:1--16:58
Yves Younan and
Wouter Joosen and
Frank Piessens Runtime countermeasures for code
injection attacks against C and C++
programs . . . . . . . . . . . . . . . . 17:1--17:28
Lukasz Budzisz and
Johan Garcia and
Anna Brunstrom and
Ramon Ferrús A taxonomy and survey of SCTP research 18:1--18:36
Robert Biddle and
Sonia Chiasson and
P. C. Van Oorschot Graphical passwords: Learning from the
first twelve years . . . . . . . . . . . 19:1--19:41
Wilson Wong and
Wei Liu and
Mohammed Bennamoun Ontology learning from text: a look back
and into the future . . . . . . . . . . 20:1--20:36
Huaiyu Liu and
Mic Bowman and
Francis Chang Survey of state melding in virtual
worlds . . . . . . . . . . . . . . . . . 21:1--21:25
Pedro Gonnet A review of error estimation in adaptive
quadrature . . . . . . . . . . . . . . . 22:1--22:36
Cigdem Sengul and
Aline Carneiro Viana and
Artur Ziviani A survey of adaptive services to cope
with dynamics in wireless
self-organizing networks . . . . . . . . 23:1--23:35
Paolo Bellavista and
Antonio Corradi and
Mario Fanelli and
Luca Foschini A survey of context data distribution
for mobile ubiquitous systems . . . . . 24:1--24:45
Meng Wang and
Bingbing Ni and
Xian-Sheng Hua and
Tat-Seng Chua Assistive tagging: a survey of
multimedia tagging with human-computer
joint exploration . . . . . . . . . . . 25:1--25:24
Luca Cittadini and
Giuseppe Di Battista and
Massimo Rimondini On the stability of interdomain routing 26:1--26:40
Dong Zhou and
Mark Truran and
Tim Brailsford and
Vincent Wade and
Helen Ashman Translation techniques in cross-language
information retrieval . . . . . . . . . 1:1--1:44
Simona Bernardi and
José Merseguer and
Dorina C. Petriu Dependability modeling and analysis of
software systems specified with UML . . 2:1--2:48
Sasikanth Avancha and
Amit Baxi and
David Kotz Privacy in mobile technology for
personal healthcare . . . . . . . . . . 3:1--3:54
Sergey Zhuravlev and
Juan Carlos Saez and
Sergey Blagodurov and
Alexandra Fedorova and
Manuel Prieto Survey of scheduling techniques for
addressing shared resources in multicore
processors . . . . . . . . . . . . . . . 4:1--4:28
Anisa Al-Hafeedh and
Maxime Crochemore and
Lucian Ilie and
Evguenia Kopylova and
W. F. Smyth and
German Tischler and
Munina Yusufu A comparison of index-based Lempel--Ziv
LZ77 factorization algorithms . . . . . 5:1--5:17
Boris Danev and
Davide Zanetti and
Srdjan Capkun On physical-layer identification of
wireless devices . . . . . . . . . . . . 6:1--6:29
Yi Zhi Zhao and
Chunyan Miao and
Maode Ma and
Jing Bing Zhang and
Cyril Leung A survey and projection on medium access
control protocols for wireless sensor
networks . . . . . . . . . . . . . . . . 7:1--7:37
Glenn I. Hawe and
Graham Coates and
Duncan T. Wilson and
Roger S. Crouch Agent-based simulation for large-scale
emergency response: a survey of usage
and implementation . . . . . . . . . . . 8:1--8:51
R. Annie Uthra and
S. V. Kasmir Raja QoS routing in wireless sensor networks
--- a survey . . . . . . . . . . . . . . 9:1--9:12
João Mendes-Moreira and
Carlos Soares and
Alípio Mário Jorge and
Jorge Freire De Sousa Ensemble approaches for regression: a
survey . . . . . . . . . . . . . . . . . 10:1--10:40
Mark Harman and
S. Afshin Mansouri and
Yuanyuan Zhang Search-based software engineering:
Trends, techniques and applications . . 11:1--11:61
Philippe Esling and
Carlos Agon Time-series data mining . . . . . . . . 12:1--12:34
Simone Faro and
Thierry Lecroq The exact online string matching
problem: a review of the most recent
results . . . . . . . . . . . . . . . . 13:1--13:42
Angeliki Kritikakou and
Francky Catthoor and
Vasilios Kelefouras and
Costas Goutis A systematic approach to classify
design-time global scheduling techniques 14:1--14:30
Marco Attene and
Marcel Campen and
Leif Kobbelt Polygon mesh repairing: an application
perspective . . . . . . . . . . . . . . 15:1--15:33
Susan Lomax and
Sunil Vadera A survey of cost-sensitive decision tree
induction algorithms . . . . . . . . . . 16:1--16:35
Michael Pearce and
Sherali Zeadally and
Ray Hunt Virtualization: Issues, security
threats, and solutions . . . . . . . . . 17:1--17:39
Maria Elena Acevedo-Mosqueda and
Cornelio Yáñez-Márquez and
Marco Antonio Acevedo-Mosqueda Bidirectional Associative Memories:
Different approaches . . . . . . . . . . 18:1--18:30
Carl H. Mooney and
John F. Roddick Sequential pattern mining --- approaches
and algorithms . . . . . . . . . . . . . 19:1--19:39
Timo Koskela and
Otso Kassinen and
Erkki Harjula and
Mika Ylianttila P2P group management systems: a
conceptual analysis . . . . . . . . . . 20:1--20:25
Mehdi Saeedi and
Igor L. Markov Synthesis and optimization of reversible
circuits --- a survey . . . . . . . . . 21:1--21:34
Ayman Abaza and
Arun Ross and
Christina Hebert and
Mary Ann F. Harrison and
Mark S. Nixon A survey on ear biometrics . . . . . . . 22:1--22:35
Mohammad Tanvir Parvez and
Sabri A. Mahmoud Offline Arabic handwritten text
recognition: a survey . . . . . . . . . 23:1--23:35
Jukka Suomela Survey of local algorithms . . . . . . . 24:1--24:40
Mohammad Hossein Manshaei and
Quanyan Zhu and
Tansu Alpcan and
Tamer Bacsar and
Jean-Pierre Hubaux Game theory meets network security and
privacy . . . . . . . . . . . . . . . . 25:1--25:39
James Stanier and
Des Watson Intermediate representations in
imperative compilers: a survey . . . . . 26:1--26:27
Seyed Amir Hoseini-Tabatabaei and
Alexander Gluhak and
Rahim Tafazolli A survey on smartphone-based systems for
opportunistic user context recognition 27:1--27:51
Christian Colombo and
Gordon J. Pace Recovery within long-running
transactions . . . . . . . . . . . . . . 28:1--28:35
Omer Zilberberg and
Shlomo Weiss and
Sivan Toledo Phase-change memory: an architectural
perspective . . . . . . . . . . . . . . 29:1--29:33
João V. Gomes and
Pedro R. M. Inácio and
Manuela Pereira and
Mário M. Freire and
Paulo P. Monteiro Detection and classification of
peer-to-peer traffic: a survey . . . . . 30:1--30:40
Floarea Serban and
Joaquin Vanschoren and
Jörg-Uwe Kietz and
Abraham Bernstein A survey of intelligent assistants for
data analysis . . . . . . . . . . . . . 31:1--31:35
Wei Zang and
Ann Gordon-Ross A survey on cache tuning from a
power/energy perspective . . . . . . . . 32:1--32:49
Tom Bostoen and
Sape Mullender and
Yolande Berbers Power-reduction techniques for
data-center storage systems . . . . . . 33:1--33:38
John David N. Dionisio and
William G. Burns III and
Richard Gilbert $3$D Virtual worlds and the metaverse:
Current status and future possibilities 34:1--34:38
Matej Crepinsek and
Shih-Hsi Liu and
Marjan Mernik Exploration and exploitation in
evolutionary algorithms: a survey . . . 35:1--35:33
Leandro Silva Galvão De Carvalho and
Edjair De Souza Mota Survey on application-layer mechanisms
for speech quality adaptation in VoIP 36:1--36:31
Xavier Grehant and
Isabelle Demeure and
Sverre Jarp A survey of task mapping on production
grids . . . . . . . . . . . . . . . . . 37:1--37:25
Abbas Eslami Kiasari and
Axel Jantsch and
Zhonghai Lu Mathematical formalisms for performance
evaluation of networks-on-chip . . . . . 38:1--38:41
Andrew Newell and
Jing Dong and
Cristina Nita-Rotaru On the practicality of cryptographic
defences against pollution attacks in
wireless network coding . . . . . . . . 39:1--39:26
Gábor Pék and
Levente Butty'an and
Boldizsár Bencsáth A survey of security issues in hardware
virtualization . . . . . . . . . . . . . 40:1--40:34
Lilian Bossuet and
Michael Grand and
Lubos Gaspar and
Viktor Fischer and
Guy Gogniat Architectures of flexible symmetric key
crypto engines --- a survey: From
hardware coprocessor to
multi-crypto-processor system on chip 41:1--41:32
Christine Parent and
Stefano Spaccapietra and
Chiara Renso and
Gennady Andrienko and
Natalia Andrienko and
Vania Bogorny and
Maria Luisa Damiani and
Aris Gkoulalas-Divanis and
Jose Macedo and
Nikos Pelekis and
Yannis Theodoridis and
Zhixian Yan Semantic trajectories modeling and
analysis . . . . . . . . . . . . . . . . 42:1--42:32
Jierui Xie and
Stephen Kelley and
Boleslaw K. Szymanski Overlapping community detection in
networks: The state-of-the-art and
comparative study . . . . . . . . . . . 43:1--43:35
Jiajun Liu and
Zi Huang and
Hongyun Cai and
Heng Tao Shen and
Chong Wah Ngo and
Wei Wang Near-duplicate video retrieval: Current
research and future trends . . . . . . . 44:1--44:23
Rafael A. Rodríguez-Gómez and
Gabriel Maciá-Fernández and
Pedro García-Teodoro Survey and taxonomy of botnet research
through life-cycle . . . . . . . . . . . 45:1--45:33
Anirban Basu and
Simon Fleming and
James Stanier and
Stephen Naicken and
Ian Wakeman and
Vijay K. Gurbani The state of peer-to-peer network
simulators . . . . . . . . . . . . . . . 46:1--46:25
Wanita Sherchan and
Surya Nepal and
Cecile Paris A survey of trust in social networks . . 47:1--47:33
Rajshekar Kalayappan and
Smruti R. Sarangi A survey of checker architectures . . . 48:1--48:34
Jian Chang and
Krishna K. Venkatasubramanian and
Andrew G. West and
Insup Lee Analyzing and defending against
Web-based malware . . . . . . . . . . . 49:1--49:35
Anne Benoit and
Ümit V. Çatalyürek and
Yves Robert and
Erik Saule A survey of pipelined workflow
scheduling: Models and algorithms . . . 50:1--50:36
Arnaud Hubaux and
Thein Than Tun and
Patrick Heymans Separation of concerns in feature
diagram languages: a systematic survey 51:1--51:23
Engineer Bainomugisha and
Andoni Lombide Carreton and
Tom van Cutsem and
Stijn Mostinckx and
Wolfgang de Meuter A survey on reactive programming . . . . 52:1--52:34
Kelly Androutsopoulos and
David Clark and
Mark Harman and
Jens Krinke and
Laurence Tratt State-based model slicing: a survey . . 53:1--53:36
Daniel Lazaro and
Joan Manuel Marques and
Josep Jorba and
Xavier Vilajosana Decentralized resource discovery
mechanisms for distributed computing in
peer-to-peer environments . . . . . . . 54:1--54:54
Levi Shaul and
Doron Tauber Critical success factors in enterprise
resource planning systems: Review of the
last decade . . . . . . . . . . . . . . 55:1--55:39
Kyriakos Kritikos and
Barbara Pernici and
Pierluigi Plebani and
Cinzia Cappiello and
Marco Comuzzi and
Salima Benrernou and
Ivona Brandic and
Attila Kertész and
Michael Parkin and
Manuel Carro A survey on service quality description 1:1--1:??
Sibel Yenikaya and
Gökhan Yenikaya and
Ekrem Düven Keeping the vehicle on the road: a
survey on on-road lane detection systems 2:1--2:??
Damian A. Tamburri and
Patricia Lago and
Hans van Vliet Organizational social structures for
software engineering . . . . . . . . . . 3:1--3:??
Kevin A. Roundy and
Barton P. Miller Binary-code obfuscations in prevalent
packer tools . . . . . . . . . . . . . . 4:1--4:??
Rocco de Nicola and
Diego Latella and
Michele Loreti and
Mieke Massink A uniform definition of stochastic
process calculi . . . . . . . . . . . . 5:1--5:??
Flavio Esposito and
Ibrahim Matta and
Vatche Ishakian Slice embedding solutions for
distributed service architectures . . . 6:1--6:??
Aluizio F. R. Araujo and
Renata L. M. E. Rego Self-organizing maps with a time-varying
structure . . . . . . . . . . . . . . . 7:1--7:??
Martin Radetzki and
Chaochao Feng and
Xueqian Zhao and
Axel Jantsch Methods for fault tolerance in
networks-on-chip . . . . . . . . . . . . 8:1--8:??
Amir Yahyavi and
Bettina Kemme Peer-to-peer architectures for massively
multiplayer online games: a survey . . . 9:1--9:??
Xin Zhang and
Yee-Hong Yang and
Zhiguang Han and
Hui Wang and
Chao Gao Object class detection: a survey . . . . 10:1--10:??
Sherif Sakr and
Anna Liu and
Ayman G. Fayoumi The family of MapReduce and large-scale
data processing systems . . . . . . . . 11:1--11:??
Talal H. Noor and
Quan Z. Sheng and
Sherali Zeadally and
Jian Yu Trust management of services in cloud
environments: obstacles and solutions 12:1--12:??
Jonathan A. Silva and
Elaine R. Faria and
Rodrigo C. Barros and
Eduardo R. Hruschka and
André C. P. L. F. de Carvalho and
João Gama Data stream clustering: a survey . . . . 13:1--13:??
Kanthaiah Sivapragasam Vijayalayan and
Aaron Harwood and
Shanika Karunasekera Distributed scheduling schemes for
wireless mesh networks: a survey . . . . 14:1--14:??
Soumya Sen and
Carlee Joe-Wong and
Sangtae Ha and
Mung Chiang A survey of smart data pricing: Past
proposals, current plans, and future
trends . . . . . . . . . . . . . . . . . 15:1--15:??
Anne-Marie Kermarrec and
Peter Triantafillou XL peer-to-peer pub/sub systems . . . . 16:1--16:??
Pablo Samuel Castro and
Daqing Zhang and
Chao Chen and
Shijian Li and
Gang Pan From taxi GPS traces to social and
community dynamics: a survey . . . . . . 17:1--17:??
Qiong Wu and
Chunyan Miao Curiosity: From psychology to
computation . . . . . . . . . . . . . . 18:1--18:??
Ádám Csapó and
György Wersényi Overview of auditory representations in
human-machine interfaces . . . . . . . . 19:1--19:??
Wojciech Mazurczyk VoIP steganography and its detection ---
a survey . . . . . . . . . . . . . . . . 20:1--20:??
Peter Gammie Synchronous digital circuits as
functional programs . . . . . . . . . . 21:1--21:??
Subir K. Ghosh and
Partha P. Goswami Unsolved problems in visibility graphs
of points, segments, and polygons . . . 22:1--22:??
Rebekka S. Renner and
Boris M. Velichkovsky and
Jens R. Helmert The perception of egocentric distances
in virtual environments --- a review . . 23:1--23:??
Karim Barkati and
Pierre Jouvelot Synchronous programming in audio
processing: a lookup table oscillator
case study . . . . . . . . . . . . . . . 24:1--24:??
Zheng Yang and
Zimu Zhou and
Yunhao Liu From RSSI to CSI: Indoor localization
via channel response . . . . . . . . . . 25:1--25:??
Ricardo Wandré Dias Pedro and
Fátima L. S. Nunes and
Ariane Machado-Lima Using grammars for pattern recognition
in images: a systematic review . . . . . 26:1--26:??
Orlando R. E. Pereira and
Joel J. P. C. Rodrigues Survey and analysis of current mobile
learning applications and technologies 27:1--27:??
Israel Herraiz and
Daniel Rodriguez and
Gregorio Robles and
Jesus M. Gonzalez-Barahona The evolution of the laws of software
evolution: a discussion based on a
systematic literature review . . . . . . 28:1--28:??
Roberto Vezzani and
Davide Baltieri and
Rita Cucchiara People reidentification in surveillance
and forensics: a survey . . . . . . . . 29:1--29:??
Violeta Medina and
Juan Manuel García A survey of migration mechanisms of
virtual machines . . . . . . . . . . . . 30:1--30:??
Feng Li and
Beng Chin Ooi and
M. Tamer Özsu and
Sai Wu Distributed data management using
MapReduce . . . . . . . . . . . . . . . 31:1--31:??
Andrea Bellucci and
Alessio Malizia and
Ignacio Aedo Light on horizontal interactive
surfaces: Input space for tabletop
computing . . . . . . . . . . . . . . . 32:1--32:??
Andreas Bulling and
Ulf Blanke and
Bernt Schiele A tutorial on human activity recognition
using body-worn inertial sensors . . . . 33:1--33:??
Carlo A. Furia and
Bertrand Meyer and
Sergey Velder Loop invariants: Analysis,
classification, and examples . . . . . . 34:1--34:??
Bin Li and
Steven C. H. Hoi Online portfolio selection: a survey . . 35:1--35:??
Dongzhe Ma and
Jianhua Feng and
Guoliang Li A survey of address translation
technologies for flash memories . . . . 36:1--36:??
Mardé Helbig and
Andries P. Engelbrecht Benchmarks for dynamic multi-objective
optimisation algorithms . . . . . . . . 37:1--37:??
Tao Mei and
Yong Rui and
Shipeng Li and
Qi Tian Multimedia search reranking: a
literature survey . . . . . . . . . . . 38:1--38:??
Peter Fontana and
Rance Cleaveland A menagerie of timed automata . . . . . 40:1--40:??
Arlind Kopliku and
Karen Pinel-Sauvagnat and
Mohand Boughanem Aggregated search: a new information
retrieval paradigm . . . . . . . . . . . 41:1--41:??
Marta R. Costa-Juss\`a and
Mireia Farrús Statistical machine translation
enhancements through linguistic levels:
a survey . . . . . . . . . . . . . . . . 42:1--42:??
Natalia Díaz Rodríguez and
M. P. Cuéllar and
Johan Lilius and
Miguel Delgado Calvo-Flores A survey on ontologies for human
behavior recognition . . . . . . . . . . 43:1--43:??
Martin Hirzel and
Robert Soulé and
Scott Schneider and
Bugra Gedik and
Robert Grimm A catalog of stream processing
optimizations . . . . . . . . . . . . . 46:1--46:??
Anne-Cecile Orgerie and
Marcos Dias de Assuncao and
Laurent Lefevre A survey on techniques for improving the
energy efficiency of large-scale
distributed systems . . . . . . . . . . 47:1--47:??
C. M. Krishna Fault-tolerant scheduling in homogeneous
real-time systems . . . . . . . . . . . 48:1--48:??
Héctor Pérez and
J. Javier Gutiérrez A survey on standards for real-time
distribution middleware . . . . . . . . 49:1--49:??
Gonzalo Navarro Spaces, Trees, and Colors: The
algorithmic landscape of document
retrieval on sequences . . . . . . . . . 52:1--52:??
Michael Henson and
Stephen Taylor Memory encryption: a survey of existing
techniques . . . . . . . . . . . . . . . 53:1--53:??
Robert Mitchell and
Ing-Ray Chen A survey of intrusion detection
techniques for cyber-physical systems 55:1--55:??
Yao-Yi Chiang and
Stefan Leyk and
Craig A. Knoblock A Survey of Digital Map Processing
Techniques . . . . . . . . . . . . . . . 1:1--1:??
Thomas Winkler and
Bernhard Rinner Security and Privacy Protection in
Visual Sensor Networks: a Survey . . . . 2:1--2:??
Yue Shi and
Martha Larson and
Alan Hanjalic Collaborative Filtering beyond the
User-Item Matrix: a Survey of the State
of the Art and Future Challenges . . . . 3:1--3:??
Catherine Howard and
Markus Stumptner A Survey of Directed
Entity-Relation--Based First-Order
Probabilistic Languages . . . . . . . . 4:1--4:??
Adel Nadjaran Toosi and
Rodrigo N. Calheiros and
Rajkumar Buyya Interconnected Cloud Computing
Environments: Challenges, Taxonomy, and
Survey . . . . . . . . . . . . . . . . . 7:1--7:??
Ming Ki Chong and
Rene Mayrhofer and
Hans Gellersen A Survey of User Interaction for
Spontaneous Device Association . . . . . 8:1--8:??
Pierre A. Akiki and
Arosha K. Bandara and
Yijun Yu Adaptive Model-Driven User Interface
Development Systems . . . . . . . . . . 9:1--9:??
Charu Aggarwal and
Karthik Subbian Evolutionary Network Analysis: a Survey 10:1--10:??
João Paulo and
José Pereira A Survey and Classification of Storage
Deduplication Systems . . . . . . . . . 11:1--11:??
You-Chiun Wang Mobile Sensor Networks: System Hardware
and Dispatch Software . . . . . . . . . 12:1--12:??
Alessandra De Paola and
Marco Ortolani and
Giuseppe Lo Re and
Giuseppe Anastasi and
Sajal K. Das Intelligent Management Systems for
Energy Efficiency in Buildings: a Survey 13:1--13:??
Joanne Treurniet A Taxonomy and Survey of Microscopic
Mobility Models from the Mobile
Networking Domain . . . . . . . . . . . 14:1--14:??
Ricardo Campos and
Gaël Dias and
Alípio M. Jorge and
Adam Jatowt Survey of Temporal Information Retrieval
and Related Applications . . . . . . . . 15:1--15:??
Roswitha Gostner and
Bianca Baldacci and
Melissa J. Morine and
Corrado Priami Graphical Modeling Tools for Systems
Biology . . . . . . . . . . . . . . . . 16:1--16:??
Alexander Thomasian Analysis of Fork/Join and Related
Queueing Systems . . . . . . . . . . . . 17:1--17:??
Christoph Bösch and
Pieter Hartel and
Willem Jonker and
Andreas Peter A Survey of Provably Secure Searchable
Encryption . . . . . . . . . . . . . . . 18:1--18:??
Sparsh Mittal and
Jeffrey S. Vetter A Survey of Methods for Analyzing and
Improving GPU Energy Efficiency . . . . 19:1--19:??
Shahbaz Akhtar Abid and
Mazliza Othman and
Nadir Shah A Survey on DHT-Based Routing for
Large-Scale Mobile Ad Hoc Networks . . . 20:1--20:??
Dong Qiu and
Bixin Li and
Shunhui Ji and
Hareton Leung Regression Testing of Web Service: a
Systematic Mapping Study . . . . . . . . 21:1--21:??
Azzedine Boukerche and
Amir Darehshoorzadeh Opportunistic Routing in Wireless
Networks: Models, Algorithms, and
Classifications . . . . . . . . . . . . 22:1--22:??
Aron Laszka and
Mark Felegyhazi and
Levente Buttyan A Survey of Interdependent Information
Security Games . . . . . . . . . . . . . 23:1--23:??
Andrew Newell and
Hongyi Yao and
Alex Ryker and
Tracey Ho and
Cristina Nita-Rotaru Node-Capture Resilient Key Establishment
in Sensor Networks: Design Space and New
Protocols . . . . . . . . . . . . . . . 24:1--24:??
Francesco Calabrese and
Laura Ferrari and
Vincent D. Blondel Urban Sensing Using Mobile Phone Network
Data: a Survey of Research . . . . . . . 25:1--25:??
Geoffray Bonnin and
Dietmar Jannach Automated Generation of Music Playlists:
Survey and Experiments . . . . . . . . . 26:1--26:??
Nachikethas A. Jagadeesan and
Bhaskar Krishnamachari Software-Defined Networking Paradigms in
Wireless Networks: a Survey . . . . . . 27:1--27:??
Emanuela Marasco and
Arun Ross A Survey on Antispoofing Schemes for
Fingerprint Recognition Systems . . . . 28:1--28:??
Pujan Ziaie A Model for Context in the Design of
Open Production Communities . . . . . . 29:1--29:??
Fanxin Kong and
Xue Liu A Survey on Green-Energy-Aware Power
Management for Datacenters . . . . . . . 30:1--30:??
Andy Cockburn and
Carl Gutwin and
Joey Scarr and
Sylvain Malacria Supporting Novice to Expert Transitions
in User Interfaces . . . . . . . . . . . 31:1--31:??
Jose Caceres-Cruz and
Pol Arias and
Daniel Guimarans and
Daniel Riera and
Angel A. Juan Rich Vehicle Routing Problem: Survey . . 32:1--32:??
Toni Mastelic and
Ariel Oleksiak and
Holger Claussen and
Ivona Brandic and
Jean-Marc Pierson and
Athanasios V. Vasilakos Cloud Computing: Survey on Energy
Efficiency . . . . . . . . . . . . . . . 33:1--33:??
Xin Li and
S. S. Iyengar On Computing Mapping of $3$D Objects: a
Survey . . . . . . . . . . . . . . . . . 34:1--34:??
Daniel Borrajo and
Anna Roubícková and
Ivan Serina Progress in Case-Based Planning . . . . 35:1--35:??
Xiaowei Zhou and
Can Yang and
Hongyu Zhao and
Weichuan Yu Low-Rank Modeling and Its Applications
in Image Analysis . . . . . . . . . . . 36:1--36:??
Felix Siegle and
Tanya Vladimirova and
Jòrgen Ilstad and
Omar Emam Mitigation of Radiation Effects in
SRAM-Based FPGAs for Space Applications 37:1--37:??
Dimitrios Rodopoulos and
Georgia Psychou and
Mohamed M. Sabry and
Francky Catthoor and
Antonis Papanikolaou and
Dimitrios Soudris and
Tobias G. Noll and
David Atienza Classification Framework for Analysis
and Modeling of Physically Induced
Reliability Violations . . . . . . . . . 38:1--38:??
Muhammad Tayyab Chaudhry and
Teck Chaw Ling and
Atif Manzoor and
Syed Asad Hussain and
Jongwon Kim Thermal-Aware Scheduling in Green Data
Centers . . . . . . . . . . . . . . . . 39:1--39:??
Johan Fabry and
Tom Dinkelaker and
Jacques Noyé and
Éric Tanter A Taxonomy of Domain-Specific Aspect
Languages . . . . . . . . . . . . . . . 40:1--40:??
Arpan Roy and
Santonu Sarkar and
Rajeshwari Ganesan and
Geetika Goel Secure the Cloud: From the Perspective
of a Service-Oriented Organization . . . 41:1--41:??
Robbert Van Renesse and
Deniz Altinbuken Paxos Made Moderately Complex . . . . . 42:1--42:??
Sidney K. D'Mello and
Jacqueline Kory A Review and Meta-Analysis of Multimodal
Affect Detection Systems . . . . . . . . 43:1--43:??
Adrien Maglo and
Guillaume Lavoué and
Florent Dupont and
Céline Hudelot $3$D Mesh Compression: Survey,
Comparisons, and Emerging Trends . . . . 44:1--44:??
Yago Díez and
Ferran Roure and
Xavier Lladó and
Joaquim Salvi A Qualitative Review on $3$D Coarse
Registration Methods . . . . . . . . . . 45:1--45:??
Carmelo Ardito and
Paolo Buono and
Maria Francesca Costabile and
Giuseppe Desolda Interaction with Large Displays: a
Survey . . . . . . . . . . . . . . . . . 46:1--46:??
Veljko Pejovic and
Mirco Musolesi Anticipatory Mobile Computing: a Survey
of the State of the Art and Research
Challenges . . . . . . . . . . . . . . . 47:1--47:??
Olga Zoidi and
Eftychia Fotiadou and
Nikos Nikolaidis and
Ioannis Pitas Graph-Based Label Propagation in Digital
Media: a Review . . . . . . . . . . . . 48:1--48:??
Nidhi Tiwari and
Santonu Sarkar and
Umesh Bellur and
Maria Indrawan Classification Framework of MapReduce
Scheduling Algorithms . . . . . . . . . 49:1--49:??
Steffen Wendzel and
Sebastian Zander and
Bernhard Fechner and
Christian Herdin Pattern-Based Survey and Categorization
of Network Covert Channel Techniques . . 50:1--50:??
Ahmad Fadzil M. Hani and
Irving Vitra Paputungan and
Mohd Fadzil Hassan Renegotiation in Service Level Agreement
Management for a Cloud-Based System . . 51:1--51:??
Eva Gibaja and
Sebastián Ventura A Tutorial on Multilabel Learning . . . 52:1--52:??
Aggeliki Sgora and
Dimitrios J. Vergados and
Dimitrios D. Vergados A Survey of TDMA Scheduling Schemes in
Wireless Multihop Networks . . . . . . . 53:1--53:??
Zheng Yang and
Chenshu Wu and
Zimu Zhou and
Xinglin Zhang and
Xu Wang and
Yunhao Liu Mobility Increases Localizability: a
Survey on Wireless Indoor Localization
using Inertial Sensors . . . . . . . . . 54:1--54:??
Emmanouil Vasilomanolakis and
Shankar Karuppayah and
Max Mühlhäuser and
Mathias Fischer Taxonomy and Survey of Collaborative
Intrusion Detection . . . . . . . . . . 55:1--55:??
Sarvnaz Karimi and
Chen Wang and
Alejandro Metke-Jimenez and
Raj Gaire and
Cecile Paris Text and Data Mining Techniques in
Adverse Drug Reaction Detection . . . . 56:1--56:??
Shu Shi and
Cheng-Hsin Hsu A Survey of Interactive Remote Rendering
Systems . . . . . . . . . . . . . . . . 57:1--57:??
Sufatrio and
Darell J. J. Tan and
Tong-Wei Chua and
Vrizlynn L. L. Thing Securing Android: a Survey, Taxonomy,
and Challenges . . . . . . . . . . . . . 58:1--58:??
Diarmuid Ó Coileáin and
Donal O'Mahony Accounting and Accountability in Content
Distribution Architectures: a Survey . . 59:1--59:??
B. R. de Araújo and
Daniel S. Lopes and
Pauline Jepp and
Joaquim A. Jorge and
Brian Wyvill A Survey on Implicit Surface
Polygonization . . . . . . . . . . . . . 60:1--60:??
Anirban Mukhopadhyay and
Ujjwal Maulik and
Sanghamitra Bandyopadhyay A Survey of Multiobjective Evolutionary
Clustering . . . . . . . . . . . . . . . 61:1--61:??
Mattias De Wael and
Stefan Marr and
Bruno De Fraine and
Tom Van Cutsem and
Wolfgang De Meuter Partitioned Global Address Space
Languages . . . . . . . . . . . . . . . 62:1--62:??
Zhi-Hui Zhan and
Xiao-Fang Liu and
Yue-Jiao Gong and
Jun Zhang and
Henry Shu-Hung Chung and
Yun Li Cloud Computing Resource Scheduling and
a Survey of Its Evolutionary Approaches 63:1--63:??
Fahimeh Alizadeh Moghaddam and
Patricia Lago and
Paola Grosso Energy-Efficient Networking Solutions in
Cloud-Based Environments: a Systematic
Literature Review . . . . . . . . . . . 64:1--64:??
Mehdi Sookhak and
Abdullah Gani and
Hamid Talebian and
Adnan Akhunzada and
Samee U. Khan and
Rajkumar Buyya and
Albert Y. Zomaya Remote Data Auditing in Cloud Computing
Environments: a Survey, Taxonomy, and
Open Issues . . . . . . . . . . . . . . 65:1--65:??
Andrzej Kamisi\'nski and
Piotr Cholda and
Andrzej Jajszczyk Assessing the Structural Complexity of
Computer and Communication Networks . . 66:1--66:??
Muhammad Imran and
Carlos Castillo and
Fernando Diaz and
Sarah Vieweg Processing Social Media Messages in Mass
Emergency: a Survey . . . . . . . . . . 67:1--67:??
Wei Huang and
Afshar Ganjali and
Beom Heyn Kim and
Sukwon Oh and
David Lie The State of Public
Infrastructure-as-a-Service Cloud
Security . . . . . . . . . . . . . . . . 68:1--68:??
Sparsh Mittal and
Jeffrey S. Vetter A Survey of CPU--GPU Heterogeneous
Computing Techniques . . . . . . . . . . 69:1--69:??
Tianyin Xu and
Yuanyuan Zhou Systems Approaches to Tackling
Configuration Errors: a Survey . . . . . 70:1--70:??
Guozhu Meng and
Yang Liu and
Jie Zhang and
Alexander Pokluda and
Raouf Boutaba Collaborative Security: a Survey and
Taxonomy . . . . . . . . . . . . . . . . 1:1--1:??
Claudio A. Ardagna and
Rasool Asal and
Ernesto Damiani and
Quang Hieu Vu From Security to Assurance in the Cloud:
a Survey . . . . . . . . . . . . . . . . 2:1--2:??
Stefan Mitsch and
André Platzer and
Werner Retschitzegger and
Wieland Schwinger Logic-Based Modeling Approaches for
Qualitative and Hybrid Reasoning in
Dynamic Spatial Systems . . . . . . . . 3:1--3:??
Olumuyiwa Ibidunmoye and
Francisco Hernández-Rodriguez and
Erik Elmroth Performance Anomaly Detection and
Bottleneck Identification . . . . . . . 4:1--4:??
Bisan Alsalibi and
Ibrahim Venkat and
K. G. Subramanian and
Syaheerah Lebai Lutfi and
Philippe De Wilde The Impact of Bio-Inspired Approaches
Toward the Advancement of Face
Recognition . . . . . . . . . . . . . . 5:1--5:??
Muhammad Naveed and
Erman Ayday and
Ellen W. Clayton and
Jacques Fellay and
Carl A. Gunter and
Jean-Pierre Hubaux and
Bradley A. Malin and
Xiaofeng Wang Privacy in the Genomic Era . . . . . . . 6:1--6:??
Bin Guo and
Zhu Wang and
Zhiwen Yu and
Yu Wang and
Neil Y. Yen and
Runhe Huang and
Xingshe Zhou Mobile Crowd Sensing and Computing: The
Review of an Emerging Human-Powered
Sensing Paradigm . . . . . . . . . . . . 7:1--7:??
Patricia Ruiz and
Pascal Bouvry Survey on Broadcast Algorithms for
Mobile Ad Hoc Networks . . . . . . . . . 8:1--8:??
Hyejeong Hong and
Jaeil Lim and
Hyunyul Lim and
Sungho Kang Lifetime Reliability Enhancement of
Microprocessors: Mitigating the Impact
of Negative Bias Temperature Instability 9:1--9:??
Erick Bauman and
Gbadebo Ayoade and
Zhiqiang Lin A Survey on Hypervisor-Based Monitoring:
Approaches, Applications, and Evolutions 10:1--10:??
Zoltán Ádám Mann Allocation of Virtual Machines in Cloud
Data Centers --- A Survey of Problem
Models and Optimization Algorithms . . . 11:1--11:??
Aleksandar Milenkoski and
Marco Vieira and
Samuel Kounev and
Alberto Avritzer and
Bryan D. Payne Evaluating Computer Intrusion Detection
Systems: a Survey of Common Practices 12:1--12:??
Bingdong Li and
Jinlong Li and
Ke Tang and
Xin Yao Many-Objective Evolutionary Algorithms:
a Survey . . . . . . . . . . . . . . . . 13:1--13:??
Klaus Schoeffmann and
Marco A. Hudelist and
Jochen Huber Video Interaction Tools: a Survey of
Recent Work . . . . . . . . . . . . . . 14:1--14:??
Matthew Edwards and
Awais Rashid and
Paul Rayson A Systematic Survey of Online Data
Mining Technology Intended for Law
Enforcement . . . . . . . . . . . . . . 15:1--15:??
Benoit Baudry and
Martin Monperrus The Multiple Facets of Software
Diversity: Recent Developments in Year
2000 and Beyond . . . . . . . . . . . . 16:1--16:??
Yunji Chen and
Shijin Zhang and
Qi Guo and
Ling Li and
Ruiyang Wu and
Tianshi Chen Deterministic Replay: a Survey . . . . . 17:1--17:47
Claus Ballegaard Nielsen and
Peter Gorm Larsen and
John Fitzgerald and
Jim Woodcock and
Jan Peleska Systems of Systems Engineering: Basic
Concepts, Model-Based Techniques, and
Research Directions . . . . . . . . . . 18:1--18:41
Brijesh Dongol and
John Derrick Verifying Linearisability: a Comparative
Survey . . . . . . . . . . . . . . . . . 19:1--19:43
Naveed Ul Hassan and
Aqsa Naeem and
Muhammad Adeel Pasha and
Tariq Jadoon and
Chau Yuen Indoor Positioning Using Visible LED
Lights: a Survey . . . . . . . . . . . . 20:1--20:32
Eduardo Velloso and
Dominik Schmidt and
Jason Alexander and
Hans Gellersen and
Andreas Bulling The Feet in Human--Computer Interaction:
a Survey of Foot-Based Interaction . . . 21:1--21:35
Tarandeep Kaur and
Inderveer Chana Energy Efficiency Techniques in Cloud
Computing: a Survey and Taxonomy . . . . 22:1--22:46
Mingming Guo and
Xinyu Jin and
Niki Pissinou and
Sebastian Zanlongo and
Bogdan Carbunar and
S. S. Iyengar In-Network Trajectory Privacy
Preservation . . . . . . . . . . . . . . 23:1--23:29
Vittorio P. Illiano and
Emil C. Lupu Detecting Malicious Data Injections in
Wireless Sensor Networks: a Survey . . . 24:1--24:33
Robert Ryan McCune and
Tim Weninger and
Greg Madey Thinking Like a Vertex: a Survey of
Vertex-Centric Frameworks for
Large-Scale Distributed Graph Processing 25:1--25:39
Jeroen Delvaux and
Roel Peeters and
Dawu Gu and
Ingrid Verbauwhede A Survey on Lightweight Entity
Authentication with Strong PUFs . . . . 26:1--26:42
Jones Granatyr and
Vanderson Botelho and
Otto Robert Lessing and
Edson Emílio Scalabrin and
Jean-Paul Barth\`es and
Fabrício Enembreck Trust and Reputation Models for
Multiagent Systems . . . . . . . . . . . 27:1--27:42
Jin-Hee Cho and
Kevin Chan and
Sibel Adali A Survey on Trust Modeling . . . . . . . 28:1--28:40
Mukesh Saini and
Abdulhameed Alelaiwi and
Abdulmotaleb El Saddik How Close are We to Realizing a
Pragmatic VANET Solution? A Meta-Survey 29:1--29:40
Roy Shilkrot and
Jochen Huber and
Jürgen Steimle and
Suranga Nanayakkara and
Pattie Maes Digital Digits: a Comprehensive Survey
of Finger Augmentation Devices . . . . . 30:1--30:29
Ramon Hugo De Souza and
Mário Antônio Ribeiro Dantas Mapping QoE through QoS in an Approach
to DDB Architectures: Research Analysis
and Conceptualization . . . . . . . . . 31:1--31:41
Giovani Gracioli and
Ahmed Alhammad and
Renato Mancuso and
Antônio Augusto Fröhlich and
Rodolfo Pellizzoni A Survey on Cache Management Mechanisms
for Real-Time Embedded Systems . . . . . 32:1--32:36
Angel Lagares Lemos and
Florian Daniel and
Boualem Benatallah Web Service Composition: a Survey of
Techniques and Tools . . . . . . . . . . 33:1--33:??
Asma Benmansour and
Abdelhamid Bouchachia and
Mohammed Feham Multioccupant Activity Recognition in
Pervasive Smart Home Environments . . . 34:1--34:??
Eleni Koutrouli and
Aphrodite Tsalgatidou Reputation Systems Evaluation Survey . . 35:1--35:??
Simone Brienza and
Sena Efsun Cebeci and
Seyed Saeid Masoumzadeh and
Helmut Hlavacs and
Öznur Özkasap and
Giuseppe Anastasi A Survey on Energy Efficiency in P2P
Systems: File Distribution, Content
Streaming, and Epidemics . . . . . . . . 36:1--36:??
Ryan Heartfield and
George Loukas A Taxonomy of Attacks and a Survey of
Defence Mechanisms for Semantic Social
Engineering Attacks . . . . . . . . . . 37:1--37:??
Andrea Hess and
Karin Anna Hummel and
Wilfried N. Gansterer and
Günter Haring Data-driven Human Mobility Modeling: a
Survey and Engineering Guidance for
Mobile Networking . . . . . . . . . . . 38:1--38:??
Mohammad Ashraful Hoque and
Matti Siekkinen and
Kashif Nizam Khan and
Yu Xiao and
Sasu Tarkoma Modeling, Profiling, and Debugging the
Energy Consumption of Mobile Devices . . 39:1--39:??
John Narayan and
Sandeep K. Shukla and
T. Charles Clancy A Survey of Automatic Protocol Reverse
Engineering Tools . . . . . . . . . . . 40:1--40:??
Elaheh Momeni and
Claire Cardie and
Nicholas Diakopoulos A Survey on Assessment and Ranking
Methodologies for User-Generated Content
on the Web . . . . . . . . . . . . . . . 41:1--41:??
Sukhpal Singh and
Inderveer Chana QoS-Aware Autonomic Resource Management
in Cloud Computing: a Systematic Review 42:1--42:??
Funmilade Faniyi and
Rami Bahsoon A Systematic Review of Service Level
Management in the Cloud . . . . . . . . 43:1--43:??
Roberto Natella and
Domenico Cotroneo and
Henrique S. Madeira Assessing Dependability with Software
Fault Injection: a Survey . . . . . . . 44:1--44:??
Sparsh Mittal A Survey of Techniques for Architecting
and Managing Asymmetric Multicore
Processors . . . . . . . . . . . . . . . 45:1--45:??
Daniele Sgandurra and
Emil Lupu Evolution of Attacks, Threat Models, and
Solutions for Virtualized Systems . . . 46:1--46:??
Gildas Avoine and
Antonin Beaujeant and
Julio Hernandez-Castro and
Louis Demay and
Philippe Teuwen A Survey of Security and Privacy Issues
in ePassport Protocols . . . . . . . . . 47:1--47:??
Maria Carla Calzarossa and
Luisa Massari and
Daniele Tessera Workload Characterization: a Survey
Revisited . . . . . . . . . . . . . . . 48:1--48:??
Yi Ren and
Ling Liu and
Qi Zhang and
Qingbo Wu and
Jianbo Guan and
Jinzhu Kong and
Huadong Dai and
Lisong Shao Shared-Memory Optimizations for
Inter-Virtual-Machine Communication . . 49:1--49:??
Barsha Mitra and
Shamik Sural and
Jaideep Vaidya and
Vijayalakshmi Atluri A Survey of Role Mining . . . . . . . . 50:1--50:??
Claudio M. De Farias and
Wei Li and
Flávia C. Delicato and
Luci Pirmez and
Albert Y. Zomaya and
Paulo F. Pires and
José N. De Souza A Systematic Review of Shared Sensor
Networks . . . . . . . . . . . . . . . . 51:1--51:??
Marco Crocco and
Marco Cristani and
Andrea Trucco and
Vittorio Murino Audio Surveillance: a Systematic Review 52:1--52:??
Halgurd S. Maghdid and
Ihsan Alshahib Lami and
Kayhan Zrar Ghafoor and
Jaime Lloret Seamless Outdoors-Indoors Localization
Solutions on Smartphones: Implementation
and Challenges . . . . . . . . . . . . . 53:1--53:??
Sparsh Mittal A Survey of Architectural Techniques for
Managing Process Variation . . . . . . . 54:1--54:??
Bernd Carsten Stahl and
Job Timmermans and
Brent Daniel Mittelstadt The Ethics of Computing: a Survey of the
Computing-Oriented Literature . . . . . 55:1--55:??
Niall Murray and
Brian Lee and
Yuansong Qiao and
Gabriel-Miro Muntean Olfaction-Enhanced Multimedia: a Survey
of Application Domains, Displays, and
Research Challenges . . . . . . . . . . 56:1--56:??
Niklas Palaghias and
Seyed Amir Hoseinitabatabaei and
Michele Nati and
Alexander Gluhak and
Klaus Moessner A Survey on Mobile Social Signal
Processing . . . . . . . . . . . . . . . 57:1--57:??
David C. Harrison and
Winston K. G. Seah and
Ramesh Rayudu Rare Event Detection and Propagation in
Wireless Sensor Networks . . . . . . . . 58:1--58:??
Sebastian Werner and
Javier Navaridas and
Mikel Luján A Survey on Design Approaches to
Circumvent Permanent Faults in
Networks-on-Chip . . . . . . . . . . . . 59:1--59:??
Liang Hu and
Xilong Che and
Si-Qing Zheng A Closer Look at GPGPU . . . . . . . . . 60:1--60:??
Marco Platania and
Daniel Obenshain and
Thomas Tantillo and
Yair Amir and
Neeraj Suri On Choosing Server- or Client-Side
Solutions for BFT . . . . . . . . . . . 61:1--61:??
Sparsh Mittal A Survey of Techniques for Approximate
Computing . . . . . . . . . . . . . . . 62:1--62:??
Edans Flavius De Oliveira Sandes and
Azzedine Boukerche and
Alba Cristina Magalhaes Alves De Melo Parallel Optimal Pairwise Biological
Sequence Comparison: Algorithms,
Platforms, and Classification . . . . . 63:1--63:??
Desmond Schmidt and
Kenneth Radke and
Seyit Camtepe and
Ernest Foo and
Michal Ren A Survey and Analysis of the GNSS
Spoofing Threat and Countermeasures . . 64:1--64:??
Juan Caballero and
Zhiqiang Lin Type Inference on Executables . . . . . 65:1--65:??
Junaid Shuja and
Abdullah Gani and
Kashif Bilal and
Atta Ur Rehman Khan and
Sajjad A. Madani and
Samee U. Khan and
Albert Y. Zomaya A Survey of Mobile Device
Virtualization: Taxonomy and State of
the Art . . . . . . . . . . . . . . . . 1:1--1:??
Muhammad Raisul Alam and
Marc St-Hilaire and
Thomas Kunz Computational Methods for Residential
Energy Cost Optimization in Smart Grids:
a Survey . . . . . . . . . . . . . . . . 2:1--2:??
Hans Hüttel and
Ivan Lanese and
Vasco T. Vasconcelos and
Luís Caires and
Marco Carbone and
Pierre-Malo Deniélou and
Dimitris Mostrous and
Luca Padovani and
António Ravara and
Emilio Tuosto and
Hugo Torres Vieira and
Gianluigi Zavattaro Foundations of Session Types and
Behavioural Contracts . . . . . . . . . 3:1--3:??
Sebastian Schrittwieser and
Stefan Katzenbeisser and
Johannes Kinder and
Georg Merzdovnik and
Edgar Weippl Protecting Software through Obfuscation:
Can It Keep Pace with Progress in Code
Analysis? . . . . . . . . . . . . . . . 4:1--4:??
Buke Ao and
Yongcai Wang and
Lu Yu and
Richard R. Brooks and
S. S. Iyengar On Precision Bound of Distributed
Fault-Tolerant Sensor Fusion Algorithms 5:1--5:??
Junbin Liu and
Sridha Sridharan and
Clinton Fookes Recent Advances in Camera Planning for
Large Area Surveillance: a Comprehensive
Review . . . . . . . . . . . . . . . . . 6:1--6:??
Suleman Khan and
Abdullah Gani and
Ainuddin Wahid Abdul Wahab and
Mustapha Aminu Bagiwa and
Muhammad Shiraz and
Samee U. Khan and
Rajkumar Buyya and
Albert Y. Zomaya Cloud Log Forensics: Foundations, State
of the Art, and Future Directions . . . 7:1--7:??
Dada Emmanuel Gbenga and
Effirul Ikhwan Ramlan Understanding the Limitations of
Particle Swarm Algorithm for Dynamic
Optimization Tasks: a Survey Towards the
Singularity of PSO for Swarm Robotic
Applications . . . . . . . . . . . . . . 8:1--8:??
Xiang Zuo and
Adriana Iamnitchi A Survey of Socially Aware Peer-to-Peer
Systems . . . . . . . . . . . . . . . . 9:1--9:??
Wenjun Jiang and
Guojun Wang and
Md Zakirul Alam Bhuiyan and
Jie Wu Understanding Graph-Based Trust
Evaluation in Online Social Networks:
Methodologies and Challenges . . . . . . 10:1--10:??
Fabrício A. Silva and
Azzedine Boukerche and
Thais R. M. Braga Silva and
Linnyer B. Ruiz and
Eduardo Cerqueira and
Antonio A. F. Loureiro Vehicular Networks: a New Challenge for
Content-Delivery-Based Applications . . 11:1--11:??
Ruogu Fang and
Samira Pouyanfar and
Yimin Yang and
Shu-Ching Chen and
S. S. Iyengar Computational Health Informatics in the
Big Data Age: a Survey . . . . . . . . . 12:1--12:??
Jun Tang and
Yong Cui and
Qi Li and
Kui Ren and
Jiangchuan Liu and
Rajkumar Buyya Ensuring Security and Privacy
Preservation for Cloud Data Services . . 13:1--13:??
Xirong Li and
Tiberio Uricchio and
Lamberto Ballan and
Marco Bertini and
Cees G. M. Snoek and
Alberto Del Bimbo Socializing the Semantic Gap: a
Comparative Survey on Image Tag
Assignment, Refinement, and Retrieval 14:1--14:??
Nadia Felix F. Da Silva and
Luiz F. S. Coletta and
Eduardo R. Hruschka A Survey and Comparative Study of Tweet
Sentiment Analysis via Semi-Supervised
Learning . . . . . . . . . . . . . . . . 15:1--15:??
Durgesh Samant and
Umesh Bellur Handling Boot Storms in Virtualized Data
Centers --- A Survey . . . . . . . . . . 16:1--16:??
Kaveh Hassani and
Won-Sook Lee Visualizing Natural Language
Descriptions: a Survey . . . . . . . . . 17:1--17:??
Ovidiu Dan and
Brian D. Davison Measuring and Predicting Search Engine
Users' Satisfaction . . . . . . . . . . 18:1--18:??
Paolo Viotti and
Marko Vukoli\'c Consistency in Non-Transactional
Distributed Storage Systems . . . . . . 19:1--19:??
Junbin Liang and
Jiannong Cao and
Rui Liu and
Tao Li Distributed Intelligent MEMS: a Survey
and a Real-Time Programming Framework 20:1--20:??
Salman Khwaja and
Mohammad Alshayeb Survey On Software Design-Pattern
Specification Languages . . . . . . . . 21:1--21:??
Alvaro Estebanez and
Diego R. Llanos and
Arturo Gonzalez-Escribano A Survey on Thread-Level Speculation
Techniques . . . . . . . . . . . . . . . 22:1--22:??
Brent Carrara and
Carlisle Adams Out-of-Band Covert Channels --- A Survey 23:1--23:??
Ruggero Donida Labati and
Angelo Genovese and
Enrique Muñoz and
Vincenzo Piuri and
Fabio Scotti and
Gianluca Sforza Biometric Recognition in Automated
Border Control: a Survey . . . . . . . . 24:1--24:??
Jiang Xiao and
Zimu Zhou and
Youwen Yi and
Lionel M. Ni A Survey on Wireless Indoor Localization
from the Device Perspective . . . . . . 25:1--25:??
Panagiotis Kokkinos and
Dimitris Kalogeras and
Anna Levin and
Emmanouel Varvarigos Survey: Live Migration and Disaster
Recovery over Long-Distance Networks . . 26:1--26:??
Emanuel Onica and
Pascal Felber and
Hugues Mercier and
Etienne Rivi\`ere Confidentiality-Preserving
Publish/Subscribe: a Survey . . . . . . 27:1--27:??
Anastasia Giachanou and
Fabio Crestani Like It or Not: a Survey of Twitter
Sentiment Analysis Methods . . . . . . . 28:1--28:??
Vini Kanvar and
Uday P. Khedker Heap Abstractions for Static Analysis 29:1--29:??
Éfren L. Souza and
Eduardo F. Nakamura and
Richard W. Pazzi Target Tracking for Sensor Networks: a
Survey . . . . . . . . . . . . . . . . . 30:1--30:??
Paula Branco and
Luís Torgo and
Rita P. Ribeiro A Survey of Predictive Modeling on
Imbalanced Domains . . . . . . . . . . . 31:1--31:??
Mashael Alsabah and
Ian Goldberg Performance and Security Improvements
for Tor: a Survey . . . . . . . . . . . 32:1--32:??
Shadi Khalifa and
Yehia Elshater and
Kiran Sundaravarathan and
Aparna Bhat and
Patrick Martin and
Fahim Imam and
Dan Rope and
Mike Mcroberts and
Craig Statchuk The Six Pillars for Building Big Data
Analytics Ecosystems . . . . . . . . . . 33:1--33:??
Sparsh Mittal A Survey of Recent Prefetching
Techniques for Processor Caches . . . . 35:1--35:??
Christoph Kofler and
Martha Larson and
Alan Hanjalic User Intent in Multimedia Search: a
Survey of the State of the Art and
Future Challenges . . . . . . . . . . . 36:1--36:??
Efthalia Karydi and
Konstantinos Margaritis Parallel and Distributed Collaborative
Filtering: a Survey . . . . . . . . . . 37:1--37:??
Meng Xu and
Chengyu Song and
Yang Ji and
Ming-Wei Shih and
Kangjie Lu and
Cong Zheng and
Ruian Duan and
Yeongjin Jang and
Byoungyoung Lee and
Chenxiong Qian and
Sangho Lee and
Taesoo Kim Toward Engineering a Secure Android
Ecosystem: a Survey of Existing
Techniques . . . . . . . . . . . . . . . 38:1--38:??
Emerson M. A. Xavier and
Francisco J. Ariza-López and
Manuel A. Ureña-Cámara A Survey of Measures and Methods for
Matching Geospatial Vector Datasets . . 39:1--39:??
Tahir Maqsood and
Osman Khalid and
Rizwana Irfan and
Sajjad A. Madani and
Samee U. Khan Scalability Issues in Online Social
Networks . . . . . . . . . . . . . . . . 40:1--40:??
Robert A. Bridges and
Neena Imam and
Tiffany M. Mintz Understanding GPU Power: a Survey of
Profiling, Modeling, and Simulation
Methods . . . . . . . . . . . . . . . . 41:1--41:??
Jiliang Tang and
Yi Chang and
Charu Aggarwal and
Huan Liu A Survey of Signed Network Mining in
Social Media . . . . . . . . . . . . . . 42:1--42:??
Jorge Blasco and
Thomas M. Chen and
Juan Tapiador and
Pedro Peris-Lopez A Survey of Wearable Biometric
Recognition Systems . . . . . . . . . . 43:1--43:??
Roman Trobec and
Radivoje Vasiljevi\'c and
Milo Tomasevi\'c and
Veljko Milutinovi\'c and
Ramon Beivide and
Mateo Valero Interconnection Networks in Petascale
Computer Systems: a Survey . . . . . . . 44:1--44:??
Jasmeet Singh and
Vishal Gupta Text Stemming: Approaches, Applications,
and Challenges . . . . . . . . . . . . . 45:1--45:??
Riccardo Coppola and
Maurizio Morisio Connected Car: Technologies, Issues,
Future Trends . . . . . . . . . . . . . 46:1--46:??
Keewon Cho and
Wooheon Kang and
Hyungjun Cho and
Changwook Lee and
Sungho Kang A Survey of Repair Analysis Algorithms
for Memories . . . . . . . . . . . . . . 47:1--47:??
Mateus L. Ribeiro and
Henrique Manoel Lederman and
Simone Elias and
Fátima L. S. Nunes Techniques and Devices Used in Palpation
Simulation with Haptic Feedback . . . . 48:1--48:??
Ilia Pietri and
Rizos Sakellariou Mapping Virtual Machines onto Physical
Machines in Cloud Computing: a Survey 49:1--49:??
Rui Shu and
Peipei Wang and
Sigmund A. Gorski III and
Benjamin Andow and
Adwait Nadkarni and
Luke Deshotels and
Jason Gionta and
William Enck and
Xiaohui Gu A Study of Security Isolation Techniques 50:1--50:??
Rodrigo Vieira Steiner and
Emil Lupu Attestation in Wireless Sensor Networks:
a Survey . . . . . . . . . . . . . . . . 51:1--51:??
Pedro Henriques Abreu and
Miriam Seoane Santos and
Miguel Henriques Abreu and
Bruno Andrade and
Daniel Castro Silva Predicting Breast Cancer Recurrence
Using Machine Learning Techniques: a
Systematic Review . . . . . . . . . . . 52:1--52:??
Jamshaid Sarwar Malik and
Ahmed Hemani Gaussian Random Number Generation: a
Survey on Hardware Architectures . . . . 53:1--53:??
Johann Brault-Baron Hypergraph Acyclicity Revisited . . . . 54:1--54:??
Bradley Reaves and
Jasmine Bowers and
Sigmund Albert Gorski III and
Olabode Anise and
Rahul Bobhate and
Raymond Cho and
Hiranava Das and
Sharique Hussain and
Hamza Karachiwala and
Nolen Scaife and
Byron Wright and
Kevin Butler and
William Enck and
Patrick Traynor *droid: Assessment and Evaluation of
Android Application Analysis Tools . . . 55:1--55:??
Aldeida Aleti and
Irene Moser A Systematic Literature Review of
Adaptive Parameter Control Methods for
Evolutionary Algorithms . . . . . . . . 56:1--56:??
Tuo Li and
Jude Angelo Ambrose and
Roshan Ragel and
Sri Parameswaran Processor Design for Soft Errors:
Challenges and State of the Art . . . . 57:1--57:??
Gabriel Martins Dias and
Boris Bellalta and
Simon Oechsner A Survey About Prediction-Based Data
Reduction in Wireless Sensor Networks 58:1--58:??
Joseph Gardiner and
Shishir Nagaraja On the Security of Machine Learning in
Malware C&C Detection: a Survey . . . . . 59:1--59:??
Gilles Bailly and
Eric Lecolinet and
Laurence Nigay Visual Menu Techniques . . . . . . . . . 60:1--60:??
Sven Kiljan and
Koen Simoens and
Danny De Cock and
Marko Van Eekelen and
Harald Vranken A Survey of Authentication and
Communications Security in Online
Banking . . . . . . . . . . . . . . . . 61:1--61:??
Marcus Pendleton and
Richard Garcia-Lebron and
Jin-Hee Cho and
Shouhuai Xu A Survey on Systems Security Metrics . . 62:1--62:??
Ilche Georgievski and
Marco Aiello Automated Planning for Ubiquitous
Computing . . . . . . . . . . . . . . . 63:1--63:??
Matthias Diener and
Eduardo H. M. Cruz and
Marco A. Z. Alves and
Philippe O. A. Navaux and
Israel Koren Affinity-Based Thread and Data Mapping
in Shared Memory Systems . . . . . . . . 64:1--64:??
Daniel Servos and
Sylvia L. Osborn Current Research and Open Problems in
Attribute-Based Access Control . . . . . 65:1--65:??
Chee Sun Liew and
Malcolm P. Atkinson and
Michelle Galea and
Tan Fong Ang and
Paul Martin and
Jano I. Van Hemert Scientific Workflows: Moving Across
Paradigms . . . . . . . . . . . . . . . 66:1--66:??
Maximilian Capraro and
Dirk Riehle Inner Source Definition, Benefits, and
Challenges . . . . . . . . . . . . . . . 67:1--67:??
Mohammad Hanif Jhaveri and
Orcun Cetin and
Carlos Gañán and
Tyler Moore and
Michel Van Eeten Abuse Reporting and the Fight Against
Cybercrime . . . . . . . . . . . . . . . 68:1--68:??
Víctor Martínez and
Fernando Berzal and
Juan-Carlos Cubero A Survey of Link Prediction in Complex
Networks . . . . . . . . . . . . . . . . 69:1--69:??
Chii Chang and
Satish Narayana Srirama and
Rajkumar Buyya Mobile Cloud Business Process Management
System for the Internet of Things: a
Survey . . . . . . . . . . . . . . . . . 70:1--70:??
Peratham Wiriyathammabhum and
Douglas Summers-Stay and
Cornelia Fermüller and
Yiannis Aloimonos Computer Vision and Natural Language
Processing: Recent Approaches in
Multimedia and Robotics . . . . . . . . 71:1--71:??
G. Pavai and
T. V. Geetha A Survey on Crossover Operators . . . . 72:1--72:??
Azzedine Boukerche and
Alexander Magnano and
Noura Aljeri Mobile IP Handover for Vehicular
Networks: Methods, Models, and
Classifications . . . . . . . . . . . . 73:1--73:??
Youngjoo Shin and
Dongyoung Koo and
Junbeom Hur A Survey of Secure Data Deduplication
Schemes for Cloud Storage Systems . . . 74:1--74:??
Nour Abura'ed and
Faisal Shah Khan and
Harish Bhaskar Advances in the Quantum Theoretical
Approach to Image Processing
Applications . . . . . . . . . . . . . . 75:1--75:??
Kimberly Tam and
Ali Feizollah and
Nor Badrul Anuar and
Rosli Salleh and
Lorenzo Cavallaro The Evolution of Android Malware and
Android Analysis Techniques . . . . . . 76:1--76:??
Tao Li and
Ning Xie and
Chunqiu Zeng and
Wubai Zhou and
Li Zheng and
Yexi Jiang and
Yimin Yang and
Hsin-Yu Ha and
Wei Xue and
Yue Huang and
Shu-Ching Chen and
Jainendra Navlakha and
S. S. Iyengar Data-Driven Techniques in Disaster
Information Management . . . . . . . . . 1:1--1:??
Marcello La Rosa and
Wil M. P. Van Der Aalst and
Marlon Dumas and
Fredrik P. Milani Business Process Variability Modeling: a
Survey . . . . . . . . . . . . . . . . . 2:1--2:??
Marwa Salayma and
Ahmed Al-Dubai and
Imed Romdhani and
Youssef Nasser Wireless Body Area Network (WBAN): a
Survey on Reliability, Fault Tolerance,
and Technologies Coexistence . . . . . . 3:1--3:??
Sayantan Nath and
Sonali Agarwal and
G. N. Pandey Evaluation of Knowledge Gaps in
Mathematical Applications of Thermal
Image Processing Techniques for Fire
Prevention . . . . . . . . . . . . . . . 4:1--4:??
Ting Su and
Ke Wu and
Weikai Miao and
Geguang Pu and
Jifeng He and
Yuting Chen and
Zhendong Su A Survey on Data-Flow Testing . . . . . 5:1--5:??
Arnab Kumar Biswas and
Dipak Ghosal and
Shishir Nagaraja A Survey of Timing Channels and
Countermeasures . . . . . . . . . . . . 6:1--6:??
Frank Dylla and
Jae Hee Lee and
Till Mossakowski and
Thomas Schneider and
André Van Delden and
Jasper Van De Ven and
Diedrich Wolter A Survey of Qualitative Spatial and
Temporal Calculi: Algebraic and
Computational Properties . . . . . . . . 7:1--7:??
Raghavendra Ramachandra and
Christoph Busch Presentation Attack Detection Methods
for Face Recognition Systems: a
Comprehensive Survey . . . . . . . . . . 8:1--8:??
Britta Meixner Hypervideos and Interactive Multimedia
Presentations . . . . . . . . . . . . . 9:1--9:??
Admela Jukan and
Xavi Masip-Bruin and
Nina Amla Smart Computing and Sensing Technologies
for Animal Welfare: a Systematic Review 10:1--10:??
Lianhua Chi and
Xingquan Zhu Hashing Techniques: a Survey and
Taxonomy . . . . . . . . . . . . . . . . 11:1--11:36
Milena Tsvetkova and
Taha Yasseri and
Eric T. Meyer and
J. Brian Pickering and
Vegard Engen and
Paul Walland and
Marika Lüders and
Asbjòrn Fòlstad and
George Bravos Understanding Human-Machine Networks: a
Cross-Disciplinary Survey . . . . . . . 12:1--12:??
Stefano Calzavara and
Riccardo Focardi and
Marco Squarcina and
Mauro Tempesta Surviving the Web: a Journey into Web
Session Security . . . . . . . . . . . . 13:1--13:??
Rabih Bashroush and
Muhammad Garba and
Rick Rabiser and
Iris Groher and
Goetz Botterweck CASE Tool Support for Variability
Management in Software Product Lines . . 14:1--14:??
Amparo Soler-Dominguez and
Angel A. Juan and
Renatas Kizys A Survey on Financial Applications of
Metaheuristics . . . . . . . . . . . . . 15:1--15:??
Nathan Burow and
Scott A. Carr and
Joseph Nash and
Per Larsen and
Michael Franz and
Stefan Brunthaler and
Mathias Payer Control-Flow Integrity: Precision,
Security, and Performance . . . . . . . 16:1--16:??
Faiz ul Muram and
Huy Tran and
Uwe Zdun Systematic Review of Software Behavioral
Model Consistency Checking . . . . . . . 17:1--17:??
Quinten David Soetens and
Romain Robbes and
Serge Demeyer Changes as First-Class Citizens: a
Research Perspective on Modern Software
Tooling . . . . . . . . . . . . . . . . 18:1--18:??
Joan Boyar and
Lene M. Favrholdt and
Christian Kudahl and
Kim S. Larsen and
Jesper W. Mikkelsen Online Algorithms with Advice: a Survey 19:1--19:??
Anastasia Ioannidou and
Elisavet Chatzilari and
Spiros Nikolopoulos and
Ioannis Kompatsiaris Deep Learning Advances in Computer
Vision with $3$D Data: a Survey . . . . 20:1--20:??
Ahmed Hussein and
Mohamed Medhat Gaber and
Eyad Elyan and
Chrisina Jayne Imitation Learning: a Survey of Learning
Methods . . . . . . . . . . . . . . . . 21:1--21:??
Joachim Gudmundsson and
Michael Horton Spatio-Temporal Analysis of Team Sports 22:1--22:??
Heitor Murilo Gomes and
Jean Paul Barddal and
Fabrício Enembreck and
Albert Bifet A Survey on Ensemble Learning for Data
Stream Classification . . . . . . . . . 23:1--23:??
Amit Kumar Singh and
Piotr Dziurzanski and
Hashan Roshantha Mendis and
Leandro Soares Indrusiak A Survey and Comparative Study of Hard
and Soft Real-Time Dynamic Resource
Allocation Strategies for Multi-\slash
Many-Core Systems . . . . . . . . . . . 24:1--24:??
Ali Yadollahi and
Ameneh Gholipour Shahraki and
Osmar R. Zaiane Current State of Text Sentiment Analysis
from Opinion to Emotion Mining . . . . . 25:1--25:??
Denis Weerasiri and
Moshe Chai Barukh and
Boualem Benatallah and
Quan Z. Sheng and
Rajiv Ranjan A Taxonomy and Survey of Cloud Resource
Orchestration Techniques . . . . . . . . 26:1--26:??
Sparsh Mittal A Survey of Techniques for Cache
Partitioning in Multicore Processors . . 27:1--27:??
Hanjiang Luo and
Kaishun Wu and
Rukhsana Ruby and
Feng Hong and
Zhongwen Guo and
Lionel M. Ni Simulation and Experimentation Platforms
for Underwater Acoustic Sensor Networks:
Advancements and Challenges . . . . . . 28:1--28:??
Rafaqut Kazmi and
Dayang N. A. Jawawi and
Radziah Mohamad and
Imran Ghani Effective Regression Test Case
Selection: a Systematic Literature
Review . . . . . . . . . . . . . . . . . 29:1--29:??
Cuong T. Do and
Nguyen H. Tran and
Choongseon Hong and
Charles A. Kamhoua and
Kevin A. Kwiat and
Erik Blasch and
Shaolei Ren and
Niki Pissinou and
Sundaraja Sitharama Iyengar Game Theory for Cyber Security and
Privacy . . . . . . . . . . . . . . . . 30:1--30:??
Mohamed Amine Kafi and
Jalel Ben Othman and
Nadjib Badache A Survey on Reliability Protocols in
Wireless Sensor Networks . . . . . . . . 31:1--31:??
Charith Perera and
Yongrui Qin and
Julio C. Estrella and
Stephan Reiff-Marganiec and
Athanasios V. Vasilakos Fog Computing for Sustainable Smart
Cities: a Survey . . . . . . . . . . . . 32:1--32:??
Baligh M. Al-Helali and
Sabri A. Mahmoud Arabic Online Handwriting Recognition
(AOHR): a Survey . . . . . . . . . . . . 33:1--33:??
Kok-Lim Alvin Yau and
Junaid Qadir and
Hooi Ling Khoo and
Mee Hong Ling and
Peter Komisarczuk A Survey on Reinforcement Learning
Models and Algorithms for Traffic Signal
Control . . . . . . . . . . . . . . . . 34:1--34:??
Cheol-Ho Hong and
Ivor Spence and
Dimitrios S. Nikolopoulos GPU Virtualization and Scheduling
Methods: a Comprehensive Survey . . . . 35:1--35:??
Muhammad Murad Khan and
Roliana Ibrahim and
Imran Ghani Cross Domain Recommender Systems: a
Systematic Literature Review . . . . . . 36:1--36:??
Kenneth O'Brien and
Ilia Pietri and
Ravi Reddy and
Alexey Lastovetsky and
Rizos Sakellariou A Survey of Power and Energy Predictive
Models in HPC Systems and Applications 37:1--37:??
Astrid Rheinländer and
Ulf Leser and
Goetz Graefe Optimization of Complex Dataflows with
User-Defined Functions . . . . . . . . . 38:1--38:??
Ahmad Barforoush and
Hossein Shirazi and
Hojjat Emami A New Classification Framework to
Evaluate the Entity Profiling on the
Web: Past, Present and Future . . . . . 39:1--39:??
Geong Sen Poh and
Ji-Jian Chin and
Wei-Chuen Yau and
Kim-Kwang Raymond Choo and
Moesfa Soeheila Mohamad Searchable Symmetric Encryption: Designs
and Challenges . . . . . . . . . . . . . 40:1--40:??
Yanfang Ye and
Tao Li and
Donald Adjeroh and
S. Sitharama Iyengar A Survey on Malware Detection Using Data
Mining Techniques . . . . . . . . . . . 41:1--41:??
Jeroen J. A. Keiren and
Peter Fontana and
Rance Cleaveland Corrections to ``A Menagerie of Timed
Automata'' . . . . . . . . . . . . . . . 42:1--42:??
Longbing Cao Data Science: a Comprehensive Overview 43:1--43:??
Alessandro Acquisti and
Idris Adjerid and
Rebecca Balebako and
Laura Brandimarte and
Lorrie Faith Cranor and
Saranga Komanduri and
Pedro Giovanni Leon and
Norman Sadeh and
Florian Schaub and
Manya Sleeper and
Yang Wang and
Shomir Wilson Nudges for Privacy and Security:
Understanding and Assisting Users'
Choices Online . . . . . . . . . . . . . 44:1--44:??
Tao Li and
Chunqiu Zeng and
Yexi Jiang and
Wubai Zhou and
Liang Tang and
Zheng Liu and
Yue Huang Data-Driven Techniques in Computing
System Management . . . . . . . . . . . 45:1--45:??
Pat Morin and
Wolfgang Mulzer and
Tommy Reddad Encoding Arguments . . . . . . . . . . . 46:1--46:??
Tim Storer Bridging the Chasm: a Survey of Software
Engineering Practice in Scientific
Programming . . . . . . . . . . . . . . 47:1--47:??
Jones Granatyr and
Nardine Osman and
João Dias and
Maria Augusta Silveira Netto Nunes and
Judith Masthoff and
Fabrício Enembreck and
Otto Robert Lessing and
Carles Sierra and
Ana Maria Paiva and
Edson Emílio Scalabrin The Need for Affective Trust Applied to
Trust and Reputation Models . . . . . . 48:1--48:??
Kiranbir Kaur and
Sandeep Sharma and
Karanjeet Singh Kahlon Interoperability and Portability
Approaches in Inter-Connected Clouds: a
Review . . . . . . . . . . . . . . . . . 49:1--49:??
Georgia Psychou and
Dimitrios Rodopoulos and
Mohamed M. Sabry and
Tobias Gemmeke and
David Atienza and
Tobias G. Noll and
Francky Catthoor Classification of Resilience Techniques
Against Functional Errors at Higher
Abstraction Layers of Digital Systems 50:1--50:??
Laure Soulier and
Lynda Tamine On the Collaboration Support in
Information Retrieval . . . . . . . . . 51:1--51:??
Andreas Schoknecht and
Tom Thaler and
Peter Fettke and
Andreas Oberweis and
Ralf Laue Similarity of Business Process Models
--- A State-of-the-Art Analysis . . . . 52:1--52:??
Michael Stein and
Mathias Fischer and
Immanuel Schweizer and
Max Mühlhäuser A Classification of Locality in Network
Research . . . . . . . . . . . . . . . . 53:1--53:??
Tanmoy Chakraborty and
Ayushi Dalmia and
Animesh Mukherjee and
Niloy Ganguly Metrics for Community Analysis: a Survey 54:1--54:??
Nguyen Khoi Tran and
Quan Z. Sheng and
Muhammad Ali Babar and
Lina Yao Searching the Web of Things: State of
the Art, Challenges, and Solutions . . . 55:1--55:??
Seyed Mohammad Ghaffarian and
Hamid Reza Shahriari Software Vulnerability Analysis and
Discovery Using Machine-Learning and
Data-Mining Techniques: a Survey . . . . 56:1--56:??
Zain Bin Tariq and
Dost Muhammad Cheema and
Muhammad Zahir Kamran and
Ijaz Haider Naqvi Non-GPS Positioning Systems: a Survey 57:1--57:??
Yangdong Deng and
Yufei Ni and
Zonghui Li and
Shuai Mu and
Wenjun Zhang Toward Real-Time Ray Tracing: a Survey
on Hardware Acceleration and
Microarchitecture Techniques . . . . . . 58:1--58:??
Kwangwon Sun and
Sukyoung Ryu Analysis of JavaScript Programs:
Challenges and Research Trends . . . . . 59:1--59:??
Rafael Caballero and
Adrián Riesco and
Josep Silva A Survey of Algorithmic Debugging . . . 60:1--60:??
Padma Jayaraman and
Ranjani Parthasarathi A Survey on Post-Silicon Functional
Validation for Multicore Architectures 61:1--61:??
Azzedine Boukerche and
Abdul Jabbar Siddiqui and
Abdelhamid Mammeri Automated Vehicle Detection and
Classification: Models, Methods, and
Techniques . . . . . . . . . . . . . . . 62:1--62:??
Changtao Zhong and
Nishanth Sastry Systems Applications of Social Networks 63:1--63:??
Radim Baca and
Michal Krátký and
Irena Holubová and
Martin Necaský and
Tomás Skopal and
Martin Svoboda and
Sherif Sakr Structural XML Query Processing . . . . 64:1--64:??
Pallavi Bagga and
Rahul Hans Mobile Agents System Security: a
Systematic Survey . . . . . . . . . . . 65:1--65:??
Esben Andreasen and
Liang Gong and
Anders Mòller and
Michael Pradel and
Marija Selakovic and
Koushik Sen and
Cristian-Alexandru Staicu A Survey of Dynamic Analysis and Test
Generation for JavaScript . . . . . . . 66:1--66:??
Niall Murray and
Oluwakemi A. Ademoye and
Gheorghita Ghinea and
Gabriel-Miro Muntean A Tutorial for Olfaction-Based
Multisensorial Media Application Design
and Evaluation . . . . . . . . . . . . . 67:1--67:??
Renzo Angles and
Marcelo Arenas and
Pablo Barceló and
Aidan Hogan and
Juan Reutter and
Domagoj Vrgoc Foundations of Modern Query Languages
for Graph Databases . . . . . . . . . . 68:1--68:??
Dorien Herremans and
Ching-Hua Chuan and
Elaine Chew A Functional Taxonomy of Music
Generation Systems . . . . . . . . . . . 69:1--69:??
Oscar Pulido-Prieto and
Ulises Juárez-Martínez A Survey of Naturalistic Programming
Technologies . . . . . . . . . . . . . . 70:1--70:??
Elias Alevizos and
Anastasios Skarlatidis and
Alexander Artikis and
Georgios Paliouras Probabilistic Complex Event Recognition:
a Survey . . . . . . . . . . . . . . . . 71:1--71:??
Francisco Martinez-Gil and
Miguel Lozano and
Ignacio García-Fernández and
Fernando Fernández Modeling, Evaluation, and Scale on
Artificial Pedestrians: a Literature
Review . . . . . . . . . . . . . . . . . 72:1--72:??
Aditya Joshi and
Pushpak Bhattacharyya and
Mark J. Carman Automatic Sarcasm Detection: a Survey 73:1--73:??
Pablo González and
Alberto Castaño and
Nitesh V. Chawla and
Juan José Del Coz A Review on Quantification Learning . . 74:1--74:??
Jordi Mongay Batalla and
Athanasios Vasilakos and
Mariusz Gajewski Secure Smart Homes: Opportunities and
Challenges . . . . . . . . . . . . . . . 75:1--75:??
Frank De Boer and
Vlad Serbanescu and
Reiner Hähnle and
Ludovic Henrio and
Justine Rochas and
Crystal Chang Din and
Einar Broch Johnsen and
Marjan Sirjani and
Ehsan Khamespanah and
Kiko Fernandez-Reyes and
Albert Mingkun Yang A Survey of Active Object Languages . . 76:1--76:??
Stefan Laube and
Rainer Böhme Strategic Aspects of Cyber Risk
Information Sharing . . . . . . . . . . 77:1--77:??
Eduardo Felipe Zambom Santana and
Ana Paula Chaves and
Marco Aurelio Gerosa and
Fabio Kon and
Dejan S. Milojicic Software Platforms for Smart Cities:
Concepts, Requirements, Challenges, and
a Unified Reference Architecture . . . . 78:1--78:??
Onur Tunali and
Mustafa Altun A Survey of Fault-Tolerance Algorithms
for Reconfigurable Nano-Crossbar Arrays 79:1--79:??
Irina Tal and
Gabriel-Miro Muntean Towards Reasoning Vehicles: a Survey of
Fuzzy Logic-Based Solutions in Vehicular
Networks . . . . . . . . . . . . . . . . 80:1--80:??
Xuanhua Shi and
Zhigao Zheng and
Yongluan Zhou and
Hai Jin and
Ligang He and
Bo Liu and
Qiang-Sheng Hua Graph Processing on GPUs: a Survey . . . 81:1--81:??
Alan Burns and
Robert I. Davis A Survey of Research into Mixed
Criticality Systems . . . . . . . . . . 82:1--82:??
Paulo Martins and
Leonel Sousa and
Artur Mariano A Survey on Fully Homomorphic
Encryption: an Engineering Perspective 83:1--83:??
Alejandro Torreño and
Eva Onaindia and
Antonín Komenda and
Michal Stolba Cooperative Multi-Agent Planning: a
Survey . . . . . . . . . . . . . . . . . 84:1--84:??
Pranjul Yadav and
Michael Steinbach and
Vipin Kumar and
Gyorgy Simon Mining Electronic Health Records (EHRs):
a Survey . . . . . . . . . . . . . . . . 85:1--85:??
Tempestt Neal and
Kalaivani Sundararajan and
Aneez Fatima and
Yiming Yan and
Yingfei Xiang and
Damon Woodard Surveying Stylometry Techniques and
Applications . . . . . . . . . . . . . . 86:1--86:??
Artem Voronkov and
Leonardo Horn Iwaya and
Leonardo A. Martucci and
Stefan Lindskog Systematic Literature Review on
Usability of Firewall Configuration . . 87:1--87:??
Elif Bilge Kavun and
Hristina Mihajloska and
Tolga Yalçin A Survey on Authenticated
Encryption--ASIC Designer's Perspective 88:1--88:??
Sebastian Werner and
Javier Navaridas and
Mikel Luján A Survey on Optical Network-on-Chip
Architectures . . . . . . . . . . . . . 89:1--89:??
Danial Hooshyar and
Moslem Yousefi and
Heuiseok Lim Data-Driven Approaches to Game Player
Modeling: a Systematic Literature Review 90:1--90:??
Yaser Mansouri and
Adel Nadjaran Toosi and
Rajkumar Buyya Data Storage Management in Cloud
Environments: Taxonomy, Survey, and
Future Directions . . . . . . . . . . . 91:1--91:??
Prakash Shrestha and
Nitesh Saxena An Offensive and Defensive Exposition of
Wearable Computing . . . . . . . . . . . 92:1--92:??
Niels Van Berkel and
Denzil Ferreira and
Vassilis Kostakos The Experience Sampling Method on Mobile
Devices . . . . . . . . . . . . . . . . 93:1--93:??
Jundong Li and
Kewei Cheng and
Suhang Wang and
Fred Morstatter and
Robert P. Trevino and
Jiliang Tang and
Huan Liu Feature Selection: a Data Perspective 94:1--94:??
Viivi Uurtio and
João M. Monteiro and
Jaz Kandola and
John Shawe-Taylor and
Delmiro Fernandez-Reyes and
Juho Rousu A Tutorial on Canonical Correlation
Methods . . . . . . . . . . . . . . . . 95:1--95:??
Richard Skarbez and
Frederick P. Brooks, Jr. and
Mary C. Whitton A Survey of Presence and Related
Concepts . . . . . . . . . . . . . . . . 96:1--96:??
Suining He and
Kang G. Shin Geomagnetism for Smartphone-Based Indoor
Localization: Challenges, Advances, and
Comparisons . . . . . . . . . . . . . . 97:1--97:??
Jhonny Mertz and
Ingrid Nunes Understanding Application-Level Caching
in Web Applications: a Comprehensive
Introduction and Survey of
State-of-the-Art Approaches . . . . . . 98:1--98:??
Filipe Betzel and
Karen Khatamifard and
Harini Suresh and
David J. Lilja and
John Sartori and
Ulya Karpuzcu Approximate Communication: Techniques
for Reducing Communication Bottlenecks
in Large-Scale Parallel Systems . . . . 1:1--1:??
Miriam Sturdee and
Jason Alexander Analysis and Classification of
Shape-Changing Interfaces for Design and
Application-based Research . . . . . . . 2:1--2:??
Szymon Wasik and
Maciej Antczak and
Jan Badura and
Artur Laskowski and
Tomasz Sternal A Survey on Online Judge Systems and
Their Applications . . . . . . . . . . . 3:1--3:??
Tsong Yueh Chen and
Fei-Ching Kuo and
Huai Liu and
Pak-Lok Poon and
Dave Towey and
T. H. Tse and
Zhi Quan Zhou Metamorphic Testing: a Review of
Challenges and Opportunities . . . . . . 4:1--4:??
Unaizah Obaidellah and
Mohammed Al Haek and
Peter C.-H. Cheng A Survey on the Usage of Eye-Tracking in
Computer Programming . . . . . . . . . . 5:1--5:??
Federica Paci and
Anna Squicciarini and
Nicola Zannone Survey on Access Control for
Community-Centered Collaborative Systems 6:1--6:??
Florian Daniel and
Pavel Kucherbaev and
Cinzia Cappiello and
Boualem Benatallah and
Mohammad Allahbakhsh Quality Control in Crowdsourcing: a
Survey of Quality Attributes, Assessment
Techniques, and Assurance Actions . . . 7:1--7:??
Marco A. S. Netto and
Rodrigo N. Calheiros and
Eduardo R. Rodrigues and
Renato L. F. Cunha and
Rajkumar Buyya HPC Cloud for Scientific and Business
Applications: Taxonomy, Vision, and
Research Challenges . . . . . . . . . . 8:1--8:??
Eliahu Khalastchi and
Meir Kalech On Fault Detection and Diagnosis in
Robotic Systems . . . . . . . . . . . . 9:1--9:??
Samira Pouyanfar and
Yimin Yang and
Shu-Ching Chen and
Mei-Ling Shyu and
S. S. Iyengar Multimedia Big Data Analytics: a Survey 10:1--10:??
Dimitris Gritzalis and
Giulia Iseppi and
Alexios Mylonas and
Vasilis Stavrou Exiting the Risk Assessment Maze: a
Meta-Survey . . . . . . . . . . . . . . 11:1--11:??
Dalia Nashat and
Ali A. Amer A Comprehensive Taxonomy of
Fragmentation and Allocation Techniques
in Distributed Database Design . . . . . 12:1--12:??
Bowen Zhou and
Rajkumar Buyya Augmentation Techniques for Mobile Cloud
Computing: a Taxonomy, Survey, and
Future Directions . . . . . . . . . . . 13:1--13:??
Jeremy A. Marvel and
Roger Bostelman and
Joe Falco Multi-Robot Assembly Strategies and
Metrics . . . . . . . . . . . . . . . . 14:1--14:??
Michal Gaziel-Yablowitz and
David G. Schwartz A Review and Assessment Framework for
Mobile-Based Emergency Intervention Apps 15:1--15:??
Mohammed Ali Al-Garadi and
Kasturi Dewi Varathan and
Sri Devi Ravana and
Ejaz Ahmed and
Ghulam Mujtaba and
Muhammad Usman Shahid Khan and
Samee U. Khan Analysis of Online Social Network
Connections for Identification of
Influential Users: Survey and Open
Research Issues . . . . . . . . . . . . 16:1--16:??
Martin Monperrus Automatic Software Repair: a
Bibliography . . . . . . . . . . . . . . 17:1--17:??
Zhijun Ding and
Xiaolun Li and
Changjun Jiang and
Mengchu Zhou Objectives and State-of-the-Art of
Location-Based Social Network
Recommender Systems . . . . . . . . . . 18:1--18:??
Rodolfo W. L. Coutinho and
Azzedine Boukerche and
Luiz F. M. Vieira and
Antonio A. F. Loureiro Underwater Wireless Sensor Networks: a
New Challenge for Topology Control-Based
Systems . . . . . . . . . . . . . . . . 19:1--19:??
Rodrigo Bruno and
Paulo Ferreira A Study on Garbage Collection Algorithms
for Big Data Environments . . . . . . . 20:1--20:??
Adriana Draghici and
Maarten Van Steen A Survey of Techniques for Automatically
Sensing the Behavior of a Crowd . . . . 21:1--21:??
Alexander Bergmayr and
Uwe Breitenbücher and
Nicolas Ferry and
Alessandro Rossini and
Arnor Solberg and
Manuel Wimmer and
Gerti Kappel and
Frank Leymann A Systematic Review of Cloud Modeling
Languages . . . . . . . . . . . . . . . 22:1--22:??
Francieli Zanon Boito and
Eduardo C. Inacio and
Jean Luca Bez and
Philippe O. A. Navaux and
Mario A. R. Dantas and
Yves Denneulin A Checkpoint of Research on Parallel I/O
for High-Performance Computing . . . . . 23:1--23:??
Ivan Brugere and
Brian Gallagher and
Tanya Y. Berger-Wolf Network Structure Inference, A Survey:
Motivations, Methods, and Applications 24:1--24:??
Ligang Zhang and
Brijesh Verma and
Dian Tjondronegoro and
Vinod Chandran Facial Expression Analysis under Partial
Occlusion: a Survey . . . . . . . . . . 25:1--25:??
Mohamad Gebai and
Michel R. Dagenais Survey and Analysis of Kernel and
Userspace Tracers on Linux: Design,
Implementation, and Overhead . . . . . . 26:1--26:??
Elisa Rojas and
Roberto Doriguzzi-Corin and
Sergio Tamurejo and
Andres Beato and
Arne Schwabe and
Kevin Phemius and
Carmen Guerrero Are We Ready to Drive Software-Defined
Networks? A Comprehensive Survey on
Management Tools and Techniques . . . . 27:1--27:??
Carolyn Lamb and
Daniel G. Brown and
Charles L. A. Clarke Evaluating Computational Creativity: an
Interdisciplinary Tutorial . . . . . . . 28:1--28:??
Yasmin Fathy and
Payam Barnaghi and
Rahim Tafazolli Large-Scale Indexing, Discovery, and
Ranking for the Internet of Things (IoT) 29:1--29:??
Willington Siabato and
Christophe Claramunt and
Sergio Ilarri and
Miguel Angel Manso-Callejo A Survey of Modelling Trends in Temporal
GIS . . . . . . . . . . . . . . . . . . 30:1--30:??
Zihao Shan and
Kui Ren and
Marina Blanton and
Cong Wang Practical Secure Computation
Outsourcing: a Survey . . . . . . . . . 31:1--31:??
Arkaitz Zubiaga and
Ahmet Aker and
Kalina Bontcheva and
Maria Liakata and
Rob Procter Detection and Resolution of Rumours in
Social Media: a Survey . . . . . . . . . 32:1--32:??
Miyuru Dayarathna and
Srinath Perera Recent Advancements in Event Processing 33:1--33:??
Wooi King Soo and
Teck-Chaw Ling and
Aung Htein Maw and
Su Thawda Win Survey on Load-Balancing Methods in
802.11 Infrastructure Mode Wireless
Networks for Improving Quality of
Service . . . . . . . . . . . . . . . . 34:1--34:??
Giulio Rossetti and
Rémy Cazabet Community Discovery in Dynamic Networks:
a Survey . . . . . . . . . . . . . . . . 35:1--35:??
Eran Toch and
Claudio Bettini and
Erez Shmueli and
Laura Radaelli and
Andrea Lanzi and
Daniele Riboni and
Bruno Lepri The Privacy Implications of Cyber
Security Systems: a Technological Survey 36:1--36:??
Muhamad Risqi U. Saputra and
Andrew Markham and
Niki Trigoni Visual SLAM and Structure from Motion in
Dynamic Environments: a Survey . . . . . 37:1--37:??
Hadi Ghanbari and
Tero Vartiainen and
Mikko Siponen Omission of Quality Software Development
Practices: a Systematic Literature
Review . . . . . . . . . . . . . . . . . 38:1--38:??
Chao Li and
Yushu Xue and
Jing Wang and
Weigong Zhang and
Tao Li Edge-Oriented Computing Paradigms: a
Survey on Architecture Design and System
Management . . . . . . . . . . . . . . . 39:1--39:??
Ali Davoudian and
Liu Chen and
Mengchi Liu A Survey on NoSQL Stores . . . . . . . . 40:1--40:43
Davi Silva Rodrigues and
Márcio Eduardo Delamaro and
Cléber Gimenez Corrêa and
Fátima L. S. Nunes Using Genetic Algorithms in Test Data
Generation: a Critical Systematic
Mapping . . . . . . . . . . . . . . . . 41:1--41:??
Rodolfo S. Antunes and
Lucas A. Seewald and
Vinicius F. Rodrigues and
Cristiano A. Da Costa and
Luiz Gonzaga, Jr. and
Rodrigo R. Righi and
Andreas Maier and
Björn Eskofier and
Malte Ollenschläger and
Farzad Naderi and
Rebecca Fahrig and
Sebastian Bauer and
Sigrun Klein and
Gelson Campanatti A Survey of Sensors in Healthcare
Workflow Monitoring . . . . . . . . . . 42:1--42:??
Matteo Turilli and
Mark Santcroos and
Shantenu Jha A Comprehensive Perspective on Pilot-Job
Systems . . . . . . . . . . . . . . . . 43:1--43:??
Tobias Brandt and
Marco Grawunder GeoStreams: a Survey . . . . . . . . . . 44:1--44:??
Y. V. Srinivasa Murthy and
Shashidhar G. Koolagudi Content-Based Music Information
Retrieval (CB-MIR) and Its Applications
toward the Music Industry: a Review . . 45:1--45:??
Konstantia Barmpatsalou and
Tiago Cruz and
Edmundo Monteiro and
Paulo Simoes Current and Future Trends in Mobile
Device Forensics: a Survey . . . . . . . 46:1--46:??
Nasir Saeed and
Haewoon Nam and
Mian Imtiaz Ul Haq and
Dost Bhatti Muhammad Saqib A Survey on Multidimensional Scaling . . 47:1--47:??
Paulo Angelo Alves Resende and
André Costa Drummond A Survey of Random Forest Based Methods
for Intrusion Detection Systems . . . . 48:1--48:??
Cláudio Gomes and
Casper Thule and
David Broman and
Peter Gorm Larsen and
Hans Vangheluwe Co-Simulation: a Survey . . . . . . . . 49:1--49:??
Roberto Baldoni and
Emilio Coppa and
Daniele Cono D'Elia and
Camil Demetrescu and
Irene Finocchi A Survey of Symbolic Execution
Techniques . . . . . . . . . . . . . . . 50:1--50:??
Fatemeh Shirazi and
Milivoj Simeonovski and
Muhammad Rizwan Asghar and
Michael Backes and
Claudia Diaz A Survey on Routing in Anonymous
Communication Protocols . . . . . . . . 51:1--51:??
Niels Van Dijkhuizen and
Jeroen Van Der Ham A Survey of Network Traffic
Anonymisation Techniques and
Implementations . . . . . . . . . . . . 52:1--52:??
Wellington Oliveira and
Daniel De Oliveira and
Vanessa Braganholo Provenance Analytics for Workflow-Based
Computational Experiments: a Survey . . 53:1--53:??
Nathan Hanford and
Vishal Ahuja and
Matthew K. Farrens and
Brian Tierney and
Dipak Ghosal A Survey of End-System Optimizations for
High-Speed Networks . . . . . . . . . . 54:1--54:??
Ali Ahmadian Ramaki and
Abbas Rasoolzadegan and
Abbas Ghaemi Bafghi A Systematic Mapping Study on Intrusion
Alert Analysis in Intrusion Detection
Systems . . . . . . . . . . . . . . . . 55:1--55:??
Stylianos I. Venieris and
Alexandros Kouris and
Christos-Savvas Bouganis Toolflows for Mapping Convolutional
Neural Networks on FPGAs: a Survey and
Future Directions . . . . . . . . . . . 56:1--56:??
Isabel Wagner and
David Eckhoff Technical Privacy Metrics: a Systematic
Survey . . . . . . . . . . . . . . . . . 57:1--57:??
Ayman Meidan and
Julián A. García-García and
Isabel Ramos and
María José Escalona Measuring Software Process: a Systematic
Mapping Study . . . . . . . . . . . . . 58:1--58:??
Jungmin Son and
Rajkumar Buyya A Taxonomy of Software-Defined
Networking (SDN)-Enabled Cloud Computing 59:1--59:??
Safiollah Heidari and
Yogesh Simmhan and
Rodrigo N. Calheiros and
Rajkumar Buyya Scalable Graph Processing Frameworks: a
Taxonomy and Open Challenges . . . . . . 60:1--60:??
Tao Chen and
Rami Bahsoon and
Xin Yao A Survey and Taxonomy of Self-Aware and
Self-Adaptive Cloud Autoscaling Systems 61:1--61:??
Yike Liu and
Tara Safavi and
Abhilash Dighe and
Danai Koutra Graph Summarization Methods and
Applications: a Survey . . . . . . . . . 62:1--62:??
Peter Ivie and
Douglas Thain Reproducibility in Scientific Computing 63:1--63:??
Jianzhong Qi and
Rui Zhang and
Christian S. Jensen and
Kotagiri Ramamohanarao and
Jiayuan He Continuous Spatial Query Processing: a
Survey of Safe Region Based Techniques 64:1--64:??
Kalaivani Sundararajan and
Damon L. Woodard Deep Learning for Biometrics: a Survey 65:1--65:??
Massimo Quadrana and
Paolo Cremonesi and
Dietmar Jannach Sequence-Aware Recommender Systems . . . 66:1--66:??
Yury Zhauniarovich and
Issa Khalil and
Ting Yu and
Marc Dacier A Survey on Malicious Domains Detection
through DNS Data Analysis . . . . . . . 67:1--67:??
Mireia FarrÚs Voice Disguise in Automatic Speaker
Recognition . . . . . . . . . . . . . . 68:1--68:??
Marcus Botacin and
Paulo Lício De Geus and
André Grégio Who Watches the Watchmen: a
Security-focused Review on Current
State-of-the-art Techniques, Tools, and
Methods for Systems and Binary Analysis
on Modern Platforms . . . . . . . . . . 69:1--69:??
Keman Huang and
Michael Siegel and
Stuart Madnick Systematically Understanding the Cyber
Attack Business: a Survey . . . . . . . 70:1--70:??
Zahraa S. Abdallah and
Mohamed Medhat Gaber and
Bala Srinivasan and
Shonali Krishnaswamy Activity Recognition with Evolving Data
Streams: a Review . . . . . . . . . . . 71:1--71:??
Kizheppatt Vipin and
Suhaib A. Fahmy FPGA Dynamic and Partial
Reconfiguration: a Survey of
Architectures, Methods, and Applications 72:1--72:??
Chenhao Qu and
Rodrigo N. Calheiros and
Rajkumar Buyya Auto-Scaling Web Applications in Clouds:
a Taxonomy and Survey . . . . . . . . . 73:1--73:??
Eugene Siow and
Thanassis Tiropanis and
Wendy Hall Analytics for the Internet of Things: a
Survey . . . . . . . . . . . . . . . . . 74:1--74:??
Peter Ochieng and
Swaib Kyanda Large-Scale Ontology Matching:
State-of-the-Art Analysis . . . . . . . 75:1--75:??
Jairo Giraldo and
David Urbina and
Alvaro Cardenas and
Junia Valente and
Mustafa Faisal and
Justin Ruths and
Nils Ole Tippenhauer and
Henrik Sandberg and
Richard Candell A Survey of Physics-Based Attack
Detection in Cyber-Physical Systems . . 76:1--76:??
Edward Toth and
Sanjay Chawla Group Deviation Detection Methods: a
Survey . . . . . . . . . . . . . . . . . 77:1--77:??
Lynda Tamine and
Mariam Daoud Evaluation in Contextual Information
Retrieval: Foundations and Recent
Advances within the Challenges of
Context Dynamicity and Data Privacy . . 78:1--78:??
Abbas Acar and
Hidayet Aksu and
A. Selcuk Uluagac and
Mauro Conti A Survey on Homomorphic Encryption
Schemes: Theory and Implementation . . . 79:1--79:??
Xiao Han and
Nizar Kheir and
Davide Balzarotti Deception Techniques in Computer
Security: a Research Perspective . . . . 80:1--80:??
Miltiadis Allamanis and
Earl T. Barr and
Premkumar Devanbu and
Charles Sutton A Survey of Machine Learning for Big
Code and Naturalness . . . . . . . . . . 81:1--81:??
Harcharan Jit Singh and
Seema Bawa Scalable Metadata Management Techniques
for Ultra-Large Distributed Storage
Systems --- A Systematic Review . . . . 82:1--82:??
Gowtham Atluri and
Anuj Karpatne and
Vipin Kumar Spatio-Temporal Data Mining: a Survey of
Problems and Methods . . . . . . . . . . 83:1--83:??
Marcin Wylot and
Manfred Hauswirth and
Philippe Cudré-Mauroux and
Sherif Sakr RDF Data Storage and Query Processing
Schemes: a Survey . . . . . . . . . . . 84:1--84:??
Paula Fortuna and
Sérgio Nunes A Survey on Automatic Detection of Hate
Speech in Text . . . . . . . . . . . . . 85:1--85:??
Adam Czajka and
Kevin W. Bowyer Presentation Attack Detection for Iris
Recognition: an Assessment of the
State-of-the-Art . . . . . . . . . . . . 86:1--86:??
Nishant Gupta and
Vibhash Yadav and
Mayank Singh Automated Regression Test Case
Generation for Web Application: a Survey 87:1--87:??
Mohammad Naim Rastgoo and
Bahareh Nakisa and
Andry Rakotonirainy and
Vinod Chandran and
Dian Tjondronegoro A Critical Review of Proactive Detection
of Driver Stress Levels Based on
Multimodal Measurements . . . . . . . . 88:1--88:??
Changsheng Wan and
Li Wang and
Vir V. Phoha A Survey on Gait Recognition . . . . . . 89:1--89:??
Christophe Kiennert and
Ziad Ismail and
Herve Debar and
Jean Leneutre A Survey on Game-Theoretic Approaches
for Intrusion Detection and Response
Optimization . . . . . . . . . . . . . . 90:1--90:??
Alexandra Covaci and
Longhao Zou and
Irina Tal and
Gabriel-Miro Muntean and
Gheorghita Ghinea Is Multimedia Multisensorial? --- A
Review of Mulsemedia Systems . . . . . . 91:1--91:??
Samira Pouyanfar and
Saad Sadiq and
Yilin Yan and
Haiman Tian and
Yudong Tao and
Maria Presa Reyes and
Mei-Ling Shyu and
Shu-Ching Chen and
S. S. Iyengar A Survey on Deep Learning: Algorithms,
Techniques, and Applications . . . . . . 92:1--92:??
Riccardo Guidotti and
Anna Monreale and
Salvatore Ruggieri and
Franco Turini and
Fosca Giannotti and
Dino Pedreschi A Survey of Methods for Explaining Black
Box Models . . . . . . . . . . . . . . . 93:1--93:??
Gildas Avoine and
Muhammed Ali Bingöl and
Ioana Boureanu and
Srdjan Capkun and
Gerhard Hancke and
Süleyman Kardas and
Chong Hee Kim and
Cédric Lauradoux and
Benjamin Martin and
Jorge Munilla and
Alberto Peinado and
Kasper Bonne Rasmussen and
Dave Singelée and
Aslan Tchamkerten and
Rolando Trujillo-Rasua and
Serge Vaudenay Security of Distance-Bounding: a Survey 94:1--94:??
Rui Henriques and
Sara C. Madeira Triclustering Algorithms for
Three-Dimensional Data Analysis: a
Comprehensive Survey . . . . . . . . . . 95:1--95:??
Amir H. Ashouri and
William Killian and
John Cavazos and
Gianluca Palermo and
Cristina Silvano A Survey on Compiler Autotuning using
Machine Learning . . . . . . . . . . . . 96:1--96:??
Dileep Kumar and
Akash Gandhamal and
Sanjay Talbar and
Ahmad Fadzil Mohd Hani Knee Articular Cartilage Segmentation
from MR Images: a Review . . . . . . . . 97:1--97:??
Ming Liu and
Zhi Xue and
Xianghua Xu and
Changmin Zhong and
Jinjun Chen Host-Based Intrusion Detection System
with System Calls: Review and Future
Trends . . . . . . . . . . . . . . . . . 98:1--98:??
Kevin Doherty and
Gavin Doherty Engagement in HCI: Conception, Theory
and Measurement . . . . . . . . . . . . 99:1--99:??
Giannis Tziakouris and
Rami Bahsoon and
Muhammad Ali Babar A Survey on Self-Adaptive Security for
Large-scale Open Environments . . . . . 100:1--100:??
Diego De Siqueira Braga and
Marco Niemann and
Bernd Hellingrath and
Fernando Buarque De Lima Neto Survey on Computational Trust and
Reputation Models . . . . . . . . . . . 101:1--101:??
Felipe Grando and
Lisandro Z. Granville and
Luis C. Lamb Machine Learning in Network Centrality
Measures: Tutorial and Outlook . . . . . 102:1--102:??
Vaia Moustaka and
Athena Vakali and
Leonidas G. Anthopoulos A Systematic Review for Smart City Data
Analytics . . . . . . . . . . . . . . . 103:1--103:??
Sukhpal Singh Gill and
Rajkumar Buyya A Taxonomy and Future Directions for
Sustainable Cloud Computing: 360 Degree
View . . . . . . . . . . . . . . . . . . 104:1--104:??
Rajkumar Buyya and
Satish Narayana Srirama and
Giuliano Casale and
Rodrigo Calheiros and
Yogesh Simmhan and
Blesson Varghese and
Erol Gelenbe and
Bahman Javadi and
Luis Miguel Vaquero and
Marco A. S. Netto and
Adel Nadjaran Toosi and
Maria Alejandra Rodriguez and
Ignacio M. Llorente and
Sabrina De Capitani Di Vimercati and
Pierangela Samarati and
Dejan Milojicic and
Carlos Varela and
Rami Bahsoon and
Marcos Dias De Assunção and
Omer Rana and
Wanlei Zhou and
Hai Jin and
Wolfgang Gentzsch and
Albert Y. Zomaya and
Haiying Shen A Manifesto for Future Generation Cloud
Computing: Research Directions for the
Next Decade . . . . . . . . . . . . . . 105:1--105:??
Alisa Smirnova and
Philippe Cudré-Mauroux Relation Extraction Using Distant
Supervision: a Survey . . . . . . . . . 106:1--106:??
M. Ziad Nayyer and
Imran Raza and
Syed Asad Hussain A Survey of Cloudlet-Based Mobile
Augmentation Approaches for Resource
Optimization . . . . . . . . . . . . . . 107:1--107:??
Andreas Biòrn-Hansen and
Tor-Morten Grònli and
Gheorghita Ghinea A Survey and Taxonomy of Core Concepts
and Research Challenges in
Cross-Platform Mobile Development . . . 108:1--108:??
Yasir Imtiaz Khan and
Alexandros Konios and
Nicolas Guelfi A Survey of Petri Nets Slicing . . . . . 109:1--109:??
Ping Wang and
Yan Li and
Chandan K. Reddy Machine Learning for Survival Analysis:
a Survey . . . . . . . . . . . . . . . . 110:1--110:??
Ana Juan Ferrer and
Joan Manuel Marqu\`es and
Josep Jorba Towards the Decentralised Cloud: Survey
on Approaches and Challenges for Mobile,
Ad hoc, and Edge Computing . . . . . . . 111:1--111:??
Qiong Gui and
Maria V. Ruiz-Blondet and
Sarah Laszlo and
Zhanpeng Jin A Survey on Brain Biometrics . . . . . . 112:1--112:??
Brett W. Israelsen and
Nisar R. Ahmed ``Dave \ldots I can assure you \ldots
that it's going to be all right \ldots''
A Definition, Case for, and Survey of
Algorithmic Assurances in
Human--Autonomy Trust Relationships . . 113:1--113:??
Michel S. Bonfim and
Kelvin L. Dias and
Stenio F. L. Fernandes Integrated NFV/SDN Architectures: a
Systematic Literature Review . . . . . . 114:1--114:??
Janibul Bashir and
Eldhose Peter and
Smruti R. Sarangi A Survey of On-Chip Optical
Interconnects . . . . . . . . . . . . . 115:1--115:??
Jasenka Dizdarevi\'c and
Francisco Carpio and
Admela Jukan and
Xavi Masip-Bruin A Survey of Communication Protocols for
Internet of Things and Related
Challenges of Fog and Cloud Computing
Integration . . . . . . . . . . . . . . 116:1--116:??
Moises Diaz and
Miguel A. Ferrer and
Donato Impedovo and
Muhammad Imran Malik and
Giuseppe Pirlo and
Réjean Plamondon A Perspective Analysis of Handwritten
Signature Technology . . . . . . . . . . 117:1--117:??
MD. Zakir Hossain and
Ferdous Sohel and
Mohd Fairuz Shiratuddin and
Hamid Laga A Comprehensive Survey of Deep Learning
for Image Captioning . . . . . . . . . . 118:1--118:??
Abdessalam Elhabbash and
Faiza Samreen and
James Hadley and
Yehia Elkhatib Cloud Brokerage: a Systematic Survey . . 119:1--119:??
Pawan Kumar and
Rakesh Kumar Issues and Challenges of Load Balancing
Techniques in Cloud Computing: a Survey 120:1--120:??
Amani Abu Jabal and
Maryam Davari and
Elisa Bertino and
Christian Makaya and
Seraphin Calo and
Dinesh Verma and
Alessandra Russo and
Christopher Williams Methods and Tools for Policy Analysis 121:1--121:??
Abdul Manazir and
Khalid Raza Recent Developments in Cartesian Genetic
Programming and its Variants . . . . . . 122:1--122:??
Shirin Tavara Parallel Computing of Support Vector
Machines: a Survey . . . . . . . . . . . 123:1--123:??
Rafael Luiz Testa and
Cléber Gimenez Corrêa and
Ariane Machado-Lima and
Fátima L. S. Nunes Synthesis of Facial Expressions in
Photographs: Characteristics,
Approaches, and Challenges . . . . . . . 124:1--124:??
Marco Patrignani and
Amal Ahmed and
Dave Clarke Formal Approaches to Secure Compilation:
a Survey of Fully Abstract Compilation
and Related Work . . . . . . . . . . . . 125:1--125:??
Juan A. Rico-Gallego and
Juan C. Díaz-Martín and
Ravi Reddy Manumachu and
Alexey L. Lastovetsky A Survey of Communication Performance
Models for High-Performance Computing 126:1--126:??
Niklas Kolbe and
Sylvain Kubler and
Jérémy Robert and
Yves Le Traon and
Arkady Zaslavsky Linked Vocabulary Recommendation Tools
for Internet of Things: a Survey . . . . 127:1--127:??
Jin-Hee Cho and
Shouhuai Xu and
Patrick M. Hurley and
Matthew Mackay and
Trevor Benjamin and
Mark Beaumont STRAM: Measuring the Trustworthiness of
Computer-Based Systems . . . . . . . . . 128:1--128:??
Hamid Nejatollahi and
Nikil Dutt and
Sandip Ray and
Francesco Regazzoni and
Indranil Banerjee and
Rosario Cammarota Post-Quantum Lattice-Based Cryptography
Implementations: a Survey . . . . . . . 129:1--129:??
Sandro Pinto and
Nuno Santos Demystifying Arm TrustZone: a
Comprehensive Survey . . . . . . . . . . 130:1--130:??
Jiajian Xiao and
Philipp Andelfinger and
David Eckhoff and
Wentong Cai and
Alois Knoll A Survey on Agent-based Simulation Using
Hardware Accelerators . . . . . . . . . 131:1--131:??
Sulav Malla and
Ken Christensen A Survey on Power Management Techniques
for Oversubscription of Multi-Tenant
Data Centers . . . . . . . . . . . . . . 1:1--1:??
Jianyu Wang and
Jianli Pan and
Flavio Esposito and
Prasad Calyam and
Zhicheng Yang and
Prasant Mohapatra Edge Cloud Offloading Algorithms:
Issues, Methods, and Perspectives . . . 2:1--2:??
Vaibhavi Kalgutkar and
Ratinder Kaur and
Hugo Gonzalez and
Natalia Stakhanova and
Alina Matyukhina Code Authorship Attribution: Methods and
Challenges . . . . . . . . . . . . . . . 3:1--3:??
Walter Didimo and
Giuseppe Liotta and
Fabrizio Montecchiani A Survey on Graph Drawing Beyond
Planarity . . . . . . . . . . . . . . . 4:1--4:??
Shuai Zhang and
Lina Yao and
Aixin Sun and
Yi Tay Deep Learning Based Recommender System:
a Survey and New Perspectives . . . . . 5:1--5:??
Matheus R. F. MendonÇa and
Artur Ziviani and
AndrÉ M. S. Barreto Graph-Based Skill Acquisition For
Reinforcement Learning . . . . . . . . . 6:1--6:??
Jing Zhang and
Wanqing Li and
Philip Ogunbona and
Dong Xu Recent Advances in Transfer Learning for
Cross-Dataset Visual Recognition: a
Problem-Oriented Perspective . . . . . . 7:1--7:??
Minxian Xu and
Rajkumar Buyya Brownout Approach for Adaptive
Management of Resources and Applications
in Cloud Computing Systems: a Taxonomy
and Future Directions . . . . . . . . . 8:1--8:??
Ping Xiao and
Hannu Toivonen and
Oskar Gross and
Amílcar Cardoso and
João Correia and
Penousal Machado and
Pedro Martins and
Hugo Goncalo Oliveira and
Rahul Sharma and
Alexandre Miguel Pinto and
Alberto Díaz and
Virginia Francisco and
Pablo Gervás and
Raquel Hervás and
Carlos León and
Jamie Forth and
Matthew Purver and
Geraint A. Wiggins and
Dragana Miljkovi\'c and
Vid Podpecan and
Senja Pollak and
Jan Kralj and
Martin Znidarsic and
Marko Bohanec and
Nada Lavrac and
Tanja Urbancic and
Frank Van Der Velde and
Stuart Battersby Conceptual Representations for
Computational Concept Creation . . . . . 9:1--9:??
Yongjun Hong and
Uiwon Hwang and
Jaeyoon Yoo and
Sungroh Yoon How Generative Adversarial Networks and
Their Variants Work: an Overview . . . . 10:1--10:??
Azzedine Boukerche and
Shichao Guan and
Robson E. De Grande Sustainable Offloading in Mobile Cloud
Computing: Algorithmic Design and
Implementation . . . . . . . . . . . . . 11:1--11:??
Rajendra Patil and
Chirag Modi An Exhaustive Survey on Security
Concerns and Solutions at Different
Components of Virtualization . . . . . . 12:1--12:??
Junyu Xuan and
Jie Lu and
Guangquan Zhang A Survey on Bayesian Nonparametric
Learning . . . . . . . . . . . . . . . . 13:1--13:??
Francisco J. Cazorla and
Leonidas Kosmidis and
Enrico Mezzetti and
Carles Hernandez and
Jaume Abella and
Tullio Vardanega Probabilistic Worst-Case Timing
Analysis: Taxonomy and Comprehensive
Survey . . . . . . . . . . . . . . . . . 14:1--14:??
Karam Abdulahhad and
Catherine Berrut and
Jean-Pierre Chevallet and
Gabriella Pasi Modeling Information Retrieval by Formal
Logic: a Survey . . . . . . . . . . . . 15:1--15:??
Graham Cormode and
Hossein Jowhari $ L_p $ Samplers and Their Applications:
a Survey . . . . . . . . . . . . . . . . 16:1--16:??
Thiago H. Silva and
Aline Carneiro Viana and
Fabrício Benevenuto and
Leandro Villas and
Juliana Salles and
Antonio Loureiro and
Daniele Quercia Urban Computing Leveraging
Location-Based Social Network Data: a
Survey . . . . . . . . . . . . . . . . . 17:1--17:??
Federico Reghenzani and
Giuseppe Massari and
William Fornaciari The Real-Time Linux Kernel: a Survey on
PREEMPT\_RT . . . . . . . . . . . . . . 18:1--18:??
Usama Ahmed and
Imran Raza and
Syed Asad Hussain Trust Evaluation in Cross-Cloud
Federation: Survey and Requirement
Analysis . . . . . . . . . . . . . . . . 19:1--19:??
Annushree Bablani and
Damodar Reddy Edla and
Diwakar Tripathi and
Ramalingaswamy Cheruku Survey on Brain-Computer Interface: an
Emerging Computational Intelligence
Paradigm . . . . . . . . . . . . . . . . 20:1--20:??
Parnika Bhat and
Kamlesh Dutta A Survey on Various Threats and Current
State of Security in Android Platform 21:1--21:??
Ranran Bian and
Yun Sing Koh and
Gillian Dobbie and
Anna Divoli Identifying Top-$k$ Nodes in Social
Networks: a Survey . . . . . . . . . . . 22:1--22:??
Sai Manoj Pudukotai Dinakarrao and
Axel Jantsch and
Muhammad Shafique Computer-aided Arrhythmia Diagnosis with
Bio-signal Processing: a Survey of
Trends and Techniques . . . . . . . . . 23:1--23:??
Djamel Djenouri and
Roufaida Laidi and
Youcef Djenouri and
Ilangko Balasingham Machine Learning for Smart Building
Applications: Review and Taxonomy . . . 24:1--24:??
Mihai Gabriel Constantin and
Miriam Redi and
Gloria Zen and
Bogdan Ionescu Computational Understanding of Visual
Interestingness Beyond Semantics:
Literature Survey and Analysis of
Covariates . . . . . . . . . . . . . . . 25:1--25:??
Miqing Li and
Xin Yao Quality Evaluation of Solution Sets in
Multiobjective Optimisation: a Survey 26:1--26:??
Isil Oz and
Sanem Arslan A Survey on Multithreading Alternatives
for Soft Error Fault Tolerance . . . . . 27:1--27:??
Rochak Swami and
Mayank Dave and
Virender Ranga Software-defined Networking-based DDoS
Defense Mechanisms . . . . . . . . . . . 28:1--28:??
Yara Rizk and
Mariette Awad and
Edward W. Tunstel Cooperative Heterogeneous Multi-Robot
Systems: a Survey . . . . . . . . . . . 29:1--29:??
Ivan Homoliak and
Flavio Toffalini and
Juan Guarnizo and
Yuval Elovici and
Martín Ochoa Insight Into Insiders and IT: a Survey
of Insider Threat Taxonomies, Analysis,
Modeling, and Countermeasures . . . . . 30:1--30:??
Thiago Rateke and
Karla A. Justen and
Vito F. Chiarella and
Antonio C. Sobieranski and
Eros Comunello and
Aldo Von Wangenheim Passive Vision Region-Based Road
Detection: a Literature Review . . . . . 31:1--31:??
Wei Wang and
Longbing Cao Negative Sequence Analysis: a Review . . 32:1--32:??
Athira Nambiar and
Alexandre Bernardino and
Jacinto C. Nascimento Gait-based Person Re-identification: a
Survey . . . . . . . . . . . . . . . . . 33:1--33:??
Azzedine Boukerche and
Qi Zhang Countermeasures against Worm Spreading:
a New Challenge for Vehicular Networks 34:1--34:??
Milad Afzalan and
Farrokh Jazizadeh Indoor Positioning Based on Visible
Light Communication: a Performance-based
Survey of Real-world Prototypes . . . . 35:1--35:??
Henriette Röger and
Ruben Mayer A Comprehensive Survey on
Parallelization and Elasticity in Stream
Processing . . . . . . . . . . . . . . . 36:1--36:??
Chadni Islam and
Muhammad Ali Babar and
Surya Nepal A Multi-Vocal Review of Security
Orchestration . . . . . . . . . . . . . 37:1--37:??
Ayman Taha and
Ali S. Hadi Anomaly Detection Methods for
Categorical Data: a Review . . . . . . . 38:1--38:??
Aditya Sundararajan and
Arif I. Sarwat and
Alexander Pons A Survey on Modality Characteristics,
Performance Evaluation Metrics, and
Security for Traditional and Wearable
Biometric Systems . . . . . . . . . . . 39:1--39:??
Erwei Wang and
James J. Davis and
Ruizhe Zhao and
Ho-Cheung Ng and
Xinyu Niu and
Wayne Luk and
Peter Y. K. Cheung and
George A. Constantinides Deep Neural Network Approximation for
Custom Hardware: Where We've Been, Where
We're Going . . . . . . . . . . . . . . 40:1--40:??
Hadi Habibzadeh and
Cem Kaptan and
Tolga Soyata and
Burak Kantarci and
Azzedine Boukerche Smart City System Design: a
Comprehensive Study of the Application
and Data Planes . . . . . . . . . . . . 41:1--41:??
Hameedah Sultan and
Anjali Chauhan and
Smruti R. Sarangi A Survey of Chip-level Thermal
Simulators . . . . . . . . . . . . . . . 42:1--42:??
Mustansar Fiaz and
Arif Mahmood and
Sajid Javed and
Soon Ki Jung Handcrafted and Deep Trackers: Recent
Visual Object Tracking Approaches and
Trends . . . . . . . . . . . . . . . . . 43:1--43:??
Elisa Mannes and
Carlos Maziero Naming Content on the Network Layer: a
Security Analysis of the
Information-Centric Network Model . . . 44:1--44:??
Tommi Gröndahl and
N. Asokan Text Analysis in Adversarial Settings:
Does Deception Leave a Stylistic Trace? 45:1--45:??
Yongsen Ma and
Gang Zhou and
Shuangquan Wang WiFi Sensing with Channel State
Information: a Survey . . . . . . . . . 46:1--46:??
João Felipe Pimentel and
Juliana Freire and
Leonardo Murta and
Vanessa Braganholo A Survey on Collecting, Managing, and
Analyzing Provenance from Scripts . . . 47:1--47:??
Lucian José Gonçales and
Kleinner Farias and
Toacy Cavalcante De Oliveira and
Murilo Scholl Comparison of Software Design Models: an
Extended Systematic Mapping Study . . . 48:1--48:??
Matthias Wenzl and
Georg Merzdovnik and
Johanna Ullrich and
Edgar Weippl From Hack to Elaborate Technique --- a
Survey on Binary Rewriting . . . . . . . 49:1--49:37
Katerina El Raheb and
Marina Stergiou and
Akrivi Katifori and
Yannis Ioannidis Dance Interactive Learning Systems: a
Study on Interaction Workflow and
Teaching Approaches . . . . . . . . . . 50:1--50:??
Rui Zhang and
Rui Xue and
Ling Liu Security and Privacy on Blockchain . . . 51:1--51:??
Mohammad Bakhshalipour and
Seyedali Tabaeiaghdaei and
Pejman Lotfi-Kamran and
Hamid Sarbazi-Azad Evaluation of Hardware Data Prefetchers
on Server Processors . . . . . . . . . . 52:1--52:??
Lorena Gonzalez-Manzano and
Jose M. De Fuentes and
Arturo Ribagorda Leveraging User-related Internet of
Things for Continuous Authentication: a
Survey . . . . . . . . . . . . . . . . . 53:1--53:??
Muhammad Usman and
Mian Ahmad Jan and
Xiangjian He and
Jinjun Chen A Survey on Big Multimedia Data
Processing and Management in Smart
Cities . . . . . . . . . . . . . . . . . 54:1--54:??
Jiaheng Lu and
Irena Holubová Multi-model Databases: a New Journey to
Handle the Variety of Data . . . . . . . 55:1--55:??
Claire Maiza and
Hamza Rihani and
Juan M. Rivas and
Joël Goossens and
Sebastian Altmeyer and
Robert I. Davis A Survey of Timing Verification
Techniques for Multi-Core Real-Time
Systems . . . . . . . . . . . . . . . . 56:1--56:??
Hu Xiong and
Yan Wu and
Zhenyu Lu A Survey of Group Key Agreement
Protocols with Constant Rounds . . . . . 57:1--57:??
Estêvão B. Saleme and
Alexandra Covaci and
Gebremariam Mesfin and
Celso A. S. Santos and
Gheorghita Ghinea Mulsemedia DIY: a Survey of Devices and
a Tutorial for Building Your Own
Mulsemedia Environment . . . . . . . . . 58:1--58:??
Tessema M. Mengistu and
Dunren Che Survey and Taxonomy of Volunteer
Computing . . . . . . . . . . . . . . . 59:1--59:??
Samia Oukemeni and
Helena Rif\`a-Pous and
Joan Manuel Marqu\`es Puig Privacy Analysis on Microblogging Online
Social Networks: a Survey . . . . . . . 60:1--60:??
Stephan Winter and
Martin Tomko and
Maria Vasardani and
Kai-Florian Richter and
Kourosh Khoshelham and
Mohsen Kalantari Infrastructure-Independent Indoor
Localization and Navigation . . . . . . 61:1--61:??
Roberto Castañeda Lozano and
Christian Schulte Survey on Combinatorial Register
Allocation and Instruction Scheduling 62:1--62:??
S. Chandrakala and
S. L. Jayalakshmi Environmental Audio Scene and Sound
Event Recognition for Autonomous
Surveillance: a Survey and Comparative
Studies . . . . . . . . . . . . . . . . 63:1--63:??
Fuqiang Gu and
Xuke Hu and
Milad Ramezani and
Debaditya Acharya and
Kourosh Khoshelham and
Shahrokh Valaee and
Jianga Shang Indoor Localization Improved by Spatial
Context --- a Survey . . . . . . . . . . 64:1--64:??
Tal Ben-Nun and
Torsten Hoefler Demystifying Parallel and Distributed
Deep Learning: an In-depth Concurrency
Analysis . . . . . . . . . . . . . . . . 65:1--65:??
Xiaofeng Liao and
Zhiming Zhao Unsupervised Approaches for Textual
Semantic Annotation, A Survey . . . . . 66:1--66:??
Parminder Kaur and
Husanbir Singh Pannu and
Avleen Kaur Malhi Comprehensive Study of Continuous
Orthogonal Moments --- a Systematic
Review . . . . . . . . . . . . . . . . . 67:1--67:??
Mainak Adhikari and
Tarachand Amgoth and
Satish Narayana Srirama A Survey on Scheduling Strategies for
Workflows in Cloud Environment and
Emerging Trends . . . . . . . . . . . . 68:1--68:??
Rob Van Glabbeek and
Peter Höfner Progress, Justness, and Fairness . . . . 69:1--69:??
Melinda McDaniel and
Veda C. Storey Evaluating Domain Ontologies:
Clarification, Classification, and
Challenges . . . . . . . . . . . . . . . 70:1--70:??
Ching-Ling Fan and
Wen-Chih Lo and
Yu-Tung Pai and
Cheng-Hsin Hsu A Survey on $ 360^\circ $ Video
Streaming: Acquisition, Transmission,
and Display . . . . . . . . . . . . . . 71:1--71:??
Madalena Ribeiro and
Abel J. P. Gomes Recoloring Algorithms for Colorblind
People: a Survey . . . . . . . . . . . . 72:1--72:??
Swarnendu Ghosh and
Nibaran Das and
Ishita Das and
Ujjwal Maulik Understanding Deep Learning Techniques
for Image Segmentation . . . . . . . . . 73:1--73:??
Z. Berkay Celik and
Earlence Fernandes and
Eric Pauley and
Gang Tan and
Patrick McDaniel Program Analysis of Commodity IoT
Applications for Security and Privacy:
Challenges and Opportunities . . . . . . 74:1--74:??
Wojciech Wide\l and
Maxime Audinot and
Barbara Fila and
Sophie Pinchinat Beyond 2014: Formal Methods for Attack
Tree-based Security Modeling . . . . . . 75:1--75:??
Saeed Rashidi and
Majid Jalili and
Hamid Sarbazi-Azad A Survey on PCM Lifetime Enhancement
Schemes . . . . . . . . . . . . . . . . 76:1--76:??
Joanna Bergström and
Kasper Hornbæk Human--Computer Interaction on the Skin 77:1--77:??
Davide Maiorca and
Battista Biggio and
Giorgio Giacinto Towards Adversarial Malware Detection:
Lessons Learned from PDF-based Attacks 78:1--78:??
Harsurinder Kaur and
Husanbir Singh Pannu and
Avleen Kaur Malhi A Systematic Review on Imbalanced Data
Challenges in Machine Learning:
Applications and Solutions . . . . . . . 79:1--79:??
Patricia Arias-Cabarcos and
Christian Krupitzer and
Christian Becker A Survey on Adaptive Authentication . . 80:1--80:??
Stefanos Georgiou and
Stamatia Rizou and
Diomidis Spinellis Software Development Lifecycle for
Energy Efficiency: Techniques and Tools 81:1--81:??
Jeffrey Pawlick and
Edward Colbert and
Quanyan Zhu A Game-theoretic Taxonomy and Survey of
Defensive Deception for Cybersecurity
and Privacy . . . . . . . . . . . . . . 82:1--82:??
Sam Fletcher and
Md. Zahidul Islam Decision Tree Classification with
Differential Privacy: a Survey . . . . . 83:1--83:??
Sara Kardani Moghaddam and
Rajkumar Buyya and
Kotagiri Ramamohanarao Performance-Aware Management of Cloud
Resources: a Taxonomy and Future
Directions . . . . . . . . . . . . . . . 84:1--84:??
Alistair Moffat Huffman Coding . . . . . . . . . . . . . 85:1--85:35
Maria De Marsico and
Alessio Mecca A Survey on Gait Recognition via
Wearable Sensors . . . . . . . . . . . . 86:1--86:??
Mashael Almoqbel and
Songhua Xu Computational Mining of Social Media to
Curb Terrorism . . . . . . . . . . . . . 87:1--87:??
Ori Or-Meir and
Nir Nissim and
Yuval Elovici and
Lior Rokach Dynamic Malware Analysis in the Modern
Era --- a State of the Art Survey . . . 88:1--88:??
Vincent Labatut and
Xavier Bost Extraction and Analysis of Fictional
Character Networks: a Survey . . . . . . 89:1--89:??
Zeineb Rejiba and
Xavier Masip-Bruin and
Eva Marín-Tordera A Survey on Mobility-Induced Service
Migration in the Fog, Edge, and Related
Computing Paradigms . . . . . . . . . . 90:1--90:??
Farha Jahan and
Weiqing Sun and
Quamar Niyaz and
Mansoor Alam Security Modeling of Autonomous Systems:
a Survey . . . . . . . . . . . . . . . . 91:1--91:??
Weiqing Min and
Shuqiang Jiang and
Linhu Liu and
Yong Rui and
Ramesh Jain A Survey on Food Computing . . . . . . . 92:1--92:??
Antonia Bertolino and
Guglielmo De Angelis and
Micael Gallego and
Boni García and
Francisco Gortázar and
Francesca Lonetti and
Eda Marchetti A Systematic Review on Cloud Testing . . 93:1--93:??
Thang Le Duc and
Rafael García Leiva and
Paolo Casari and
Per-Olov Östberg Machine Learning Methods for Reliable
Resource Provisioning in Edge-Cloud
Computing: a Survey . . . . . . . . . . 94:1--94:??
Mutaz Barika and
Saurabh Garg and
Albert Y. Zomaya and
Lizhe Wang and
Aad Van Moorsel and
Rajiv Ranjan Orchestrating Big Data Analysis
Workflows in the Cloud: Research
Challenges, Survey, and Future
Directions . . . . . . . . . . . . . . . 95:1--95:??
Rodrigo Gonçalves and
Carina Friedrich Dorneles Automated Expertise Retrieval: a
Taxonomy-Based Survey and Open Issues 96:1--96:??
Cheol-Ho Hong and
Blesson Varghese Resource Management in Fog/Edge
Computing: a Survey on Architectures,
Infrastructure, and Algorithms . . . . . 97:1--97:??
Ka-Chun Wong and
Jiao Zhang and
Shankai Yan and
Xiangtao Li and
Qiuzhen Lin and
Sam Kwong and
Cheng Liang DNA Sequencing Technologies: Sequencing
Data Protocols and Bioinformatics Tools 98:1--98:??
Hong-Ning Dai and
Raymond Chi-Wing Wong and
Hao Wang and
Zibin Zheng and
Athanasios V. Vasilakos Big Data Analytics for Large-scale
Wireless Networks: Challenges and
Opportunities . . . . . . . . . . . . . 99:1--99:??
Matt Luckcuck and
Marie Farrell and
Louise A. Dennis and
Clare Dixon and
Michael Fisher Formal Specification and Verification of
Autonomous Robotic Systems: a Survey . . 100:1--100:??
Mike Maksimov and
Sahar Kokaly and
Marsha Chechik A Survey of Tool-supported Assurance
Case Assessment Techniques . . . . . . . 101:1--101:??
Paulo Henrique Pisani and
Abir Mhenni and
Romain Giot and
Estelle Cherrier and
Norman Poh and
André Carlos Ponce de Leon Ferreira de Carvalho and
Christophe Rosenberger and
Najoua Essoukri Ben Amara Adaptive Biometric Systems: Review and
Perspectives . . . . . . . . . . . . . . 102:1--102:??
Michalis Mountantonakis and
Yannis Tzitzikas Large-scale Semantic Integration of
Linked Data: a Survey . . . . . . . . . 103:1--103:??
Hrishav Bakul Barua and
Kartick Chandra Mondal A Comprehensive Survey on Cloud Data
Mining (CDM) Frameworks and Algorithms 104:1--104:??
Ioannis Mademlis and
Nikos Nikolaidis and
Anastasios Tefas and
Ioannis Pitas and
Tilman Wagner and
Alberto Messina Autonomous UAV Cinematography: a
Tutorial and a Formalized Shot-Type
Taxonomy . . . . . . . . . . . . . . . . 105:1--105:??
Vivekraj V. K. and
Debashis Sen and
Balasubramanian Raman Video Skimming: Taxonomy and
Comprehensive Survey . . . . . . . . . . 106:1--106:??
Ana C. Lorena and
Luís P. F. Garcia and
Jens Lehmann and
Marcilio C. P. Souto and
Tin Kam Ho How Complex Is Your Classification
Problem?: a Survey on Measuring
Classification Complexity . . . . . . . 107:1--107:??
Caesar Wu and
Rajkumar Buyya and
Kotagiri Ramamohanarao Cloud Pricing Models: Taxonomy, Survey,
and Interdisciplinary Challenges . . . . 108:1--108:??
Galal M. Binmakhashen and
Sabri A. Mahmoud Document Layout Analysis: a
Comprehensive Survey . . . . . . . . . . 109:1--109:??
Jaybie A. De Guzman and
Kanchana Thilakarathna and
Aruna Seneviratne Security and Privacy Approaches in Mixed
Reality: a Literature Survey . . . . . . 110:1--110:??
Muhammad Usman and
Mian Ahmad Jan and
Xiangjian He and
Jinjun Chen A Survey on Representation Learning
Efforts in Cybersecurity Domain . . . . 111:1--111:??
Tomás Foltýnek and
Norman Meuschke and
Bela Gipp Academic Plagiarism Detection: a
Systematic Literature Review . . . . . . 112:1--112:??
Yannis Lilis and
Anthony Savidis A Survey of Metaprogramming Languages 113:1--113:??
Anh Cat Le Ngo and
Raphaël C.-W. Phan Seeing the Invisible: Survey of Video
Motion Magnification and Small Motion
Analysis . . . . . . . . . . . . . . . . 114:1--114:??
Nayyer Aafaq and
Ajmal Mian and
Wei Liu and
Syed Zulqarnain Gilani and
Mubarak Shah Video Description: a Survey of Methods,
Datasets, and Evaluation Metrics . . . . 115:1--115:??
Madhushree Basavarajaiah and
Priyanka Sharma Survey of Compressed Domain Video
Summarization Techniques . . . . . . . . 116:1--116:29
Mario Gleirscher and
Simon Foster and
Jim Woodcock New Opportunities for Integrated Formal
Methods . . . . . . . . . . . . . . . . 117:1--117:??
Leibo Liu and
Jianfeng Zhu and
Zhaoshi Li and
Yanan Lu and
Yangdong Deng and
Jie Han and
Shouyi Yin and
Shaojun Wei A Survey of Coarse-Grained
Reconfigurable Architecture and Design:
Taxonomy, Challenges, and Applications 118:1--118:??
Aditya Joshi and
Sarvnaz Karimi and
Ross Sparks and
Cécile Paris and
C. Raina Macintyre Survey of Text-based Epidemic
Intelligence: a Computational
Linguistics Perspective . . . . . . . . 119:1--119:??
Mathias Humbert and
Benjamin Trubert and
Kévin Huguenin A Survey on Interdependent Privacy . . . 122:1--122:??
Ju Ren and
Deyu Zhang and
Shiwen He and
Yaoxue Zhang and
Tao Li A Survey on End-Edge-Cloud Orchestrated
Network Computing Paradigms: Transparent
Computing, Mobile Edge Computing, Fog
Computing, and Cloudlet . . . . . . . . 125:1--125:??
Amir Afianian and
Salman Niksefat and
Babak Sadeghiyan and
David Baptiste Malware Dynamic Analysis Evasion
Techniques: a Survey . . . . . . . . . . 1--28
Leonardo Leite and
Carla Rocha and
Fabio Kon and
Dejan Milojicic and
Paulo Meirelles A Survey of DevOps Concepts and
Challenges . . . . . . . . . . . . . . . 1--35
Robert A. Bridges and
Tarrah R. Glass-Vanderlan and
Michael D. Iannacone and
Maria S. Vincent and
Qian (Guenevere) Chen A Survey of Intrusion Detection Systems
Leveraging Host Data . . . . . . . . . . 1--35
Menasha Thilakaratne and
Katrina Falkner and
Thushari Atapattu A Systematic Review on Literature-based
Discovery: General Overview,
Methodology, & Statistical Analysis . . . 1--34
Mukesh Kumar Saini and
Neeraj Goel How Smart Are Smart Classrooms? A Review
of Smart Classroom Technologies . . . . 1--28
Mikhail Drobyshevskiy and
Denis Turdakov Random Graph Modeling: a Survey of the
Concepts . . . . . . . . . . . . . . . . 1--36
Juhee Bae and
Tove Helldin and
Maria Riveiro and
S\lawomir Nowaczyk and
Mohamed-Rafik Bouguelia and
Göran Falkman Interactive Clustering: a Comprehensive
Review . . . . . . . . . . . . . . . . . 1:1--1:39
Xinxin Fan and
Ling Liu and
Rui Zhang and
Quanliang Jing and
Jingping Bi Decentralized Trust Management: Risk
Analysis and Trust Aggregation . . . . . 2:1--2:33
Ruben Mayer and
Hans-Arno Jacobsen Scalable Deep Learning on Distributed
Infrastructures: Challenges, Techniques,
and Tools . . . . . . . . . . . . . . . 3:1--3:37
Junjie Chen and
Jibesh Patra and
Michael Pradel and
Yingfei Xiong and
Hongyu Zhang and
Dan Hao and
Lu Zhang A Survey of Compiler Testing . . . . . . 4:1--4:36
Allison Randal The Ideal Versus the Real: Revisiting
the History of Virtual Machines and
Containers . . . . . . . . . . . . . . . 5:1--5:31
Nuno Paulino and
João Canas Ferreira and
João M. P. Cardoso Improving Performance and Energy
Consumption in Embedded Systems via
Binary Acceleration: a Survey . . . . . 6:1--6:36
Gerasimos Razis and
Ioannis Anagnostopoulos and
Sherali Zeadally Modeling Influence with Semantics in
Social Networks: a Survey . . . . . . . 7:1--7:38
Mohammad Etemad and
Alptekin Küpçü Generic Dynamic Data Outsourcing
Framework for Integrity Verification . . 8:1--8:32
John Kolb and
Moustafa AbdelBaky and
Randy H. Katz and
David E. Culler Core Concepts, Challenges, and Future
Directions in Blockchain: a Centralized
Tutorial . . . . . . . . . . . . . . . . 9:1--9:39
Muhammad H. Hilman and
Maria A. Rodriguez and
Rajkumar Buyya Multiple Workflows Scheduling in
Multi-tenant Distributed Systems: a
Taxonomy and Future Directions . . . . . 10:1--10:39
Dong Liu and
Yue Li and
Jianping Lin and
Houqiang Li and
Feng Wu Deep Learning-Based Video Coding: a
Review and a Case Study . . . . . . . . 11:1--11:35
Dilek Küçük and
Fazli Can Stance Detection: a Survey . . . . . . . 12:1--12:37
Yuri D. V. Yasuda and
Luiz Eduardo G. Martins and
Fabio A. M. Cappabianco Autonomous Visual Navigation for Mobile
Robots: a Systematic Literature Review 13:1--13:34
Shweta Suran and
Vishwajeet Pattanaik and
Dirk Draheim Frameworks for Collective Intelligence:
a Systematic Literature Review . . . . . 14:1--14:36
Vijini Mallawaarachchi and
Lakmal Meegahapola and
Roshan Madhushanka and
Eranga Heshan and
Dulani Meedeniya and
Sampath Jayarathna Change Detection and Notification of Web
Pages: a Survey . . . . . . . . . . . . 15:1--15:35
Marcos A. M. Vieira and
Matheus S. Castanho and
Racyus D. G. Pacífico and
Elerson R. S. Santos and
Eduardo P. M. Câmara Júnior and
Luiz F. M. Vieira Fast Packet Processing with eBPF and
XDP: Concepts, Code, Challenges, and
Applications . . . . . . . . . . . . . . 16:1--16:36
Ofir Landau and
Rami Puzis and
Nir Nissim Mind Your Mind: EEG-Based
Brain--Computer Interfaces and Their
Security in Cyber Space . . . . . . . . 17:1--17:38
Laphou Lao and
Zecheng Li and
Songlin Hou and
Bin Xiao and
Songtao Guo and
Yuanyuan Yang A Survey of IoT Applications in
Blockchain Systems: Architecture,
Consensus, and Traffic Modeling . . . . 18:1--18:32
Hadi Brais and
Rajshekar Kalayappan and
Preeti Ranjan Panda A Survey of Cache Simulators . . . . . . 19:1--19:32
Nektaria Kaloudi and
Jingyue Li The AI-Based Cyber Threat Landscape: a
Survey . . . . . . . . . . . . . . . . . 20:1--20:34
Chu Luo and
Jorge Goncalves and
Eduardo Velloso and
Vassilis Kostakos A Survey of Context Simulation for
Testing Mobile Context-Aware
Applications . . . . . . . . . . . . . . 21:1--21:39
Nevin Cini and
Gulay Yalcin A Methodology for Comparing the
Reliability of GPU-Based and CPU-Based
HPCs . . . . . . . . . . . . . . . . . . 22:1--22:33
Stijn Heldens and
Pieter Hijma and
Ben Van Werkhoven and
Jason Maassen and
Adam S. Z. Belloum and
Rob V. Van Nieuwpoort The Landscape of Exascale Research: a
Data-Driven Literature Analysis . . . . 23:1--23:43
Sartaj Sahni and
Albert Y. Zomaya In Memoriam Eliezer Dekel (1948--2020) 23:1--23:2
Sunny Rai and
Shampa Chakraverty A Survey on Computational Metaphor
Processing . . . . . . . . . . . . . . . 24:1--24:37
João B. F. Sequeiros and
Francisco T. Chimuco and
Musa G. Samaila and
Mário M. Freire and
Pedro R. M. Inácio Attack and System Modeling Applied to
IoT, Cloud, and Mobile Ecosystems:
Embedding Security by Design . . . . . . 25:1--25:32
Peijin Cong and
Guo Xu and
Tongquan Wei and
Keqin Li A Survey of Profit Optimization
Techniques for Cloud Providers . . . . . 26:1--26:35
Erikson Júlio De Aguiar and
Bruno S. Faiçal and
Bhaskar Krishnamachari and
Jó Ueyama A Survey of Blockchain-Based Strategies
for Healthcare . . . . . . . . . . . . . 27:1--27:27
Jian Wu and
Victor S. Sheng and
Jing Zhang and
Hua Li and
Tetiana Dadakova and
Christine Leon Swisher and
Zhiming Cui and
Pengpeng Zhao Multi-Label Active Learning Algorithms
for Image Classification: Overview and
Future Promise . . . . . . . . . . . . . 28:1--28:35
Jesús Guillermo Falcón-Cardona and
Carlos A. Coello Coello Indicator-based Multi-objective
Evolutionary Algorithms: a Comprehensive
Survey . . . . . . . . . . . . . . . . . 29:1--29:35
Joost Verbraeken and
Matthijs Wolting and
Jonathan Katzy and
Jeroen Kloppenburg and
Tim Verbelen and
Jan S. Rellermeyer A Survey on Distributed Machine Learning 30:1--30:33
George Papadakis and
Dimitrios Skoutas and
Emmanouil Thanos and
Themis Palpanas Blocking and Filtering Techniques for
Entity Resolution: a Survey . . . . . . 31:1--31:42
Erdem Sahin and
Elena Stoykova and
Jani Mäkinen and
Atanas Gotchev Computer-Generated Holograms for $3$D
Imaging: a Survey . . . . . . . . . . . 32:1--32:35
Stefano Cherubin and
Giovanni Agosta Tools for Reduced Precision Computation:
a Survey . . . . . . . . . . . . . . . . 33:1--33:35
Behrouz Zolfaghari and
Gautam Srivastava and
Swapnoneel Roy and
Hamid R. Nemati and
Fatemeh Afghah and
Takeshi Koshiba and
Abolfazl Razi and
Khodakhast Bibak and
Pinaki Mitra and
Brijesh Kumar Rai Content Delivery Networks: State of the
Art, Trends, and Future Roadmap . . . . 34:1--34:34
Iqbal Alam and
Kashif Sharif and
Fan Li and
Zohaib Latif and
M. M. Karim and
Sujit Biswas and
Boubakr Nour and
Yu Wang A Survey of Network Virtualization
Techniques for Internet of Things Using
SDN and NFV . . . . . . . . . . . . . . 35:1--35:40
Angela Bonifati and
Irena Holubová and
Arnau Prat-Pérez and
Sherif Sakr Graph Generators: State of the Art and
Open Challenges . . . . . . . . . . . . 36:1--36:30
Ying Lu and
Lingkun Luo and
Di Huang and
Yunhong Wang and
Liming Chen Knowledge Transfer in Vision
Recognition: a Survey . . . . . . . . . 37:1--37:35
Peijin Cong and
Junlong Zhou and
Liying Li and
Kun Cao and
Tongquan Wei and
Keqin Li A Survey of Hierarchical Energy
Optimization for Mobile Edge Computing:
a Perspective from End Devices to the
Cloud . . . . . . . . . . . . . . . . . 38:1--38:44
Alan Valejo and
Vinícius Ferreira and
Renato Fabbri and
Maria Cristina Ferreira de Oliveira and
Alneu de Andrade Lopes A Critical Survey of the Multilevel
Method in Complex Networks . . . . . . . 39:1--39:35
Jakapan Suaboot and
Adil Fahad and
Zahir Tari and
John Grundy and
Abdun Naser Mahmood and
Abdulmohsen Almalawi and
Albert Y. Zomaya and
Khalil Drira A Taxonomy of Supervised Learning for
IDSs in SCADA Environments . . . . . . . 40:1--40:37
Guangjie Li and
Hui Liu and
Ally S. Nyamawe A Survey on Renamings of Software
Entities . . . . . . . . . . . . . . . . 41:1--41:38
Niclas Kannengießer and
Sebastian Lins and
Tobias Dehling and
Ali Sunyaev Trade-offs between Distributed Ledger
Technology Characteristics . . . . . . . 42:1--42:37
Herodotos Herodotou and
Yuxing Chen and
Jiaheng Lu A Survey on Automatic Parameter Tuning
for Big Data Processing Systems . . . . 43:1--43:37
Santiago Figueroa-Lorenzo and
Javier Añorga and
Saioa Arrizabalaga A Survey of IIoT Protocols: a Measure of
Vulnerability Risk Analysis Based on
CVSS . . . . . . . . . . . . . . . . . . 44:1--44:53
Federico Sierra-Arriaga and
Rodrigo Branco and
Ben Lee Security Issues and Challenges for
Virtualization Technologies . . . . . . 45:1--45:37
Xuezhi Zeng and
Saurabh Garg and
Mutaz Barika and
Albert Y. Zomaya and
Lizhe Wang and
Massimo Villari and
Dan Chen and
Rajiv Ranjan SLA Management for Big Data Analytical
Applications in Clouds: a Taxonomy Study 46:1--46:40
Charulata Patil and
Manasi Patwardhan Visual Question Generation: The State of
the Art . . . . . . . . . . . . . . . . 47:1--47:22
Ricardo Macedo and
João Paulo and
José Pereira and
Alysson Bessani A Survey and Classification of
Software-Defined Storage Systems . . . . 48:1--48:38
A'Aeshah Alhakamy and
Mihran Tuceryan Real-time Illumination and Visual
Coherence for Photorealistic
Augmented/Mixed Reality . . . . . . . . 49:1--49:34
Xunyun Liu and
Rajkumar Buyya Resource Management and Scheduling in
Distributed Stream Processing Systems: a
Taxonomy, Review, and Future Directions 50:1--50:41
Phillip Stanley-Marbell and
Armin Alaghi and
Michael Carbin and
Eva Darulova and
Lara Dolecek and
Andreas Gerstlauer and
Ghayoor Gillani and
Djordje Jevdjic and
Thierry Moreau and
Mattia Cacciotti and
Alexandros Daglis and
Natalie Enright Jerger and
Babak Falsafi and
Sasa Misailovic and
Adrian Sampson and
Damien Zufferey Exploiting Errors for Efficiency: a
Survey from Circuits to Applications . . 51:1--51:39
Elgìn Akpinar and
Yelìz Yesìlada and
Selìm Temìzer The Effect of Context on Small Screen
and Wearable Device Users' Performance
--- A Systematic Review . . . . . . . . 52:1--52:44
J. Stanley Warford and
David Vega and
Scott M. Staley A Calculational Deductive System for
Linear Temporal Logic . . . . . . . . . 53:1--53:38
Rangan Das and
Sagnik Sen and
Ujjwal Maulik A Survey on Fuzzy Deep Neural Networks 54:1--54:25
Azzedine Boukerche and
Lining Zheng and
Omar Alfandi Outlier Detection: Methods, Models, and
Classification . . . . . . . . . . . . . 55:1--55:37
Olivier Beaumont and
Louis-Claude Canon and
Lionel Eyraud-Dubois and
Giorgio Lucarelli and
Loris Marchal and
Clément Mommessin and
Bertrand Simon and
Denis Trystram Scheduling on Two Types of Resources: a
Survey . . . . . . . . . . . . . . . . . 56:1--56:36
Bardh Prenkaj and
Paola Velardi and
Giovanni Stilo and
Damiano Distante and
Stefano Faralli A Survey of Machine Learning Approaches
for Student Dropout Prediction in Online
Courses . . . . . . . . . . . . . . . . 57:1--57:34
Leila Ismail and
Huned Materwala Computing Server Power Modeling in a
Data Center: Survey, Taxonomy, and
Performance Evaluation . . . . . . . . . 58:1--58:34
Thomas Welsh and
Elhadj Benkhelifa On Resilience in Cloud Computing: a
Survey of Techniques across the Cloud
Domain . . . . . . . . . . . . . . . . . 59:1--59:36
Saeed Anwar and
Salman Khan and
Nick Barnes A Deep Journey into Super-resolution: a
Survey . . . . . . . . . . . . . . . . . 60:1--60:34
Bert-Jan Butijn and
Damian A. Tamburri and
Willem-Jan van den Heuvel Blockchains: a Systematic Multivocal
Literature Review . . . . . . . . . . . 61:1--61:37
Triet H. M. Le and
Hao Chen and
Muhammad Ali Babar Deep Learning for Source Code Modeling
and Generation: Models, Applications,
and Challenges . . . . . . . . . . . . . 62:1--62:38
Yaqing Wang and
Quanming Yao and
James T. Kwok and
Lionel M. Ni Generalizing from a Few Examples: a
Survey on Few-shot Learning . . . . . . 63:1--63:34
Sebastian Zepf and
Javier Hernandez and
Alexander Schmitt and
Wolfgang Minker and
Rosalind W. Picard Driver Emotion Recognition for
Intelligent Vehicles: a Survey . . . . . 64:1--64:30
Farah A\"\it Salaht and
Frédéric Desprez and
Adrien Lebre An Overview of Service Placement Problem
in Fog and Edge Computing . . . . . . . 65:1--65:35
Alex Serban and
Erik Poll and
Joost Visser Adversarial Examples on Object
Recognition: a Comprehensive Survey . . 66:1--66:38
Huashan Chen and
Marcus Pendleton and
Laurent Njilla and
Shouhuai Xu A Survey on Ethereum Systems Security:
Vulnerabilities, Attacks, and Defenses 67:1--67:43
Bin Guo and
Yasan Ding and
Lina Yao and
Yunji Liang and
Zhiwen Yu The Future of False Information
Detection on Social Media: New
Perspectives and Trends . . . . . . . . 68:1--68:36
Patrick Emami and
Panos M. Pardalos and
Lily Elefteriadou and
Sanjay Ranka Machine Learning Methods for Data
Association in Multi-Object Tracking . . 69:1--69:34
Alexander Wood and
Kayvan Najarian and
Delaram Kahrobaei Homomorphic Encryption for Machine
Learning in Medicine and Bioinformatics 70:1--70:35
Kan Ngamakeur and
Sira Yongchareon and
Jian Yu and
Saeed Ur Rehman A Survey on Device-free Indoor
Localization and Tracking in the
Multi-resident Environment . . . . . . . 71:1--71:29
Isra Mohamed Ali and
Maurantonio Caprolu and
Roberto Di Pietro Foundations, Properties, and Security
Applications of Puzzles: a Survey . . . 72:1--72:38
Xincai Fei and
Fangming Liu and
Qixia Zhang and
Hai Jin and
Hongxin Hu Paving the Way for NFV Acceleration: a
Taxonomy, Survey and Future Directions 73:1--73:42
Michael Feldmann and
Christian Scheideler and
Stefan Schmid Survey on Algorithms for
Self-stabilizing Overlay Networks . . . 74:1--74:24
Ruocheng Guo and
Lu Cheng and
Jundong Li and
P. Richard Hahn and
Huan Liu A Survey of Learning Causality with
Data: Problems and Methods . . . . . . . 75:1--75:37
Angeliki Kritikakou and
Rafail Psiakis and
Francky Catthoor and
Olivier Sentieys Binary Tree Classification of Rigid
Error Detection and Correction
Techniques . . . . . . . . . . . . . . . 76:1--76:38
Jorge Calvo-Zaragoza and
Jan Hajic Jr. and
Alexander Pacha Understanding Optical Music Recognition 77:1--77:35
Salvador Lucas Context-sensitive Rewriting . . . . . . 78:1--78:36
Jon Perez Cerrolaza and
Roman Obermaisser and
Jaume Abella and
Francisco J. Cazorla and
Kim Grüttner and
Irune Agirre and
Hamidreza Ahmadian and
Imanol Allende Multi-core Devices for Safety-critical
Systems: a Survey . . . . . . . . . . . 79:1--79:38
Azzedine Boukerche and
Victor Soto Computation Offloading and Retrieval for
Vehicular Edge Computing: Algorithms,
Models, and Classification . . . . . . . 80:1--80:35
Pascal Weisenburger and
Johannes Wirth and
Guido Salvaneschi A Survey of Multitier Programming . . . 81:1--81:35
Bin Qian and
Jie Su and
Zhenyu Wen and
Devki Nandan Jha and
Yinhao Li and
Yu Guan and
Deepak Puthal and
Philip James and
Renyu Yang and
Albert Y. Zomaya and
Omer Rana and
Lizhe Wang and
Maciej Koutny and
Rajiv Ranjan Orchestrating the Development Lifecycle
of Machine Learning-based IoT
Applications: a Taxonomy and Survey . . 82:1--82:47
Yinghui Zhang and
Robert H. Deng and
Shengmin Xu and
Jianfei Sun and
Qi Li and
Dong Zheng Attribute-based Encryption for Cloud
Computing Access Control: a Survey . . . 83:1--83:41
Yanjiao Chen and
Baolin Zheng and
Zihan Zhang and
Qian Wang and
Chao Shen and
Qian Zhang Deep Learning on Mobile and Embedded
Devices: State-of-the-art, Challenges,
and Future Directions . . . . . . . . . 84:1--84:37
Saad Khan and
Simon Parkinson and
Liam Grant and
Na Liu and
Stephen Mcguire Biometric Systems Utilising Health Data
from Wearable Devices: Applications and
Future Challenges in Computer Security 85:1--85:29
Tomohiro Harada and
Enrique Alba Parallel Genetic Algorithms: a Useful
Survey . . . . . . . . . . . . . . . . . 86:1--86:39
Adrian Pekar and
Jozef Mocnej and
Winston K. G. Seah and
Iveta Zolotova Application Domain-Based Overview of IoT
Network Traffic Characteristics . . . . 87:1--87:33
Redowan Mahmud and
Kotagiri Ramamohanarao and
Rajkumar Buyya Application Management in Fog Computing
Environments: a Taxonomy, Review and
Future Directions . . . . . . . . . . . 88:1--88:43
Pratima Sharma and
Rajni Jindal and
Malaya Dutta Borah Blockchain Technology for Cloud Storage:
a Systematic Literature Review . . . . . 89:1--89:32
Gexiang Zhang and
Zeyi Shang and
Sergey Verlan and
Miguel Á. Martínez-del-Amor and
Chengxun Yuan and
Luis Valencia-Cabrera and
Mario J. Pérez-Jiménez An Overview of Hardware Implementation
of Membrane Computing Models . . . . . . 90:1--90:38
Juan A. Álvarez-García and
Bozidara Cvetkovi\'c and
Mitja Lustrek A Survey on Energy Expenditure
Estimation Using Wearable Devices . . . 91:1--91:35
Noura Aljeri and
Azzedine Boukerche Mobility Management in $5$G-enabled
Vehicular Networks: Models, Protocols,
and Classification . . . . . . . . . . . 92:1--92:35
Mariam Khader and
Ghazi Al-Naymat Density-based Algorithms for Big Data
Clustering Using MapReduce Framework: a
Comprehensive Study . . . . . . . . . . 93:1--93:38
Roniel S. De Sousa and
Azzedine Boukerche and
Antonio A. F. Loureiro Vehicle Trajectory Similarity: Models,
Methods, and Applications . . . . . . . 94:1--94:32
Ramon Canal and
Carles Hernandez and
Rafa Tornero and
Alessandro Cilardo and
Giuseppe Massari and
Federico Reghenzani and
William Fornaciari and
Marina Zapater and
David Atienza and
Ariel Oleksiak and
Wojciech PiAtek and
Jaume Abella Predictive Reliability and Fault
Management in Exascale Systems: State of
the Art and Perspectives . . . . . . . . 95:1--95:32
Miralem Mehic and
Marcin Niemiec and
Stefan Rass and
Jiajun Ma and
Momtchil Peev and
Alejandro Aguado and
Vicente Martin and
Stefan Schauer and
Andreas Poppe and
Christoph Pacher and
Miroslav Voznak Quantum Key Distribution: a Networking
Perspective . . . . . . . . . . . . . . 96:1--96:41
Zeyad A. Al-Odat and
Mazhar Ali and
Assad Abbas and
Samee U. Khan Secure Hash Algorithms and the
Corresponding FPGA Optimization
Techniques . . . . . . . . . . . . . . . 97:1--97:36
Sagar Uprety and
Dimitris Gkoumas and
Dawei Song A Survey of Quantum Theory Inspired
Approaches to Information Retrieval . . 98:1--98:39
Raj Dabre and
Chenhui Chu and
Anoop Kunchukuttan A Survey of Multilingual Neural Machine
Translation . . . . . . . . . . . . . . 99:1--99:38
Weiwei Lin and
Fang Shi and
Wentai Wu and
Keqin Li and
Guangxin Wu and
Al-Alas Mohammed A Taxonomy and Survey of Power Models
and Power Modeling for Cloud Servers . . 100:1--100:41
Deya Chatterjee and
Shrisha Rao Computational Sustainability: a
Socio-technical Perspective . . . . . . 101:1--101:29
Maram Bani Younes and
Azzedine Boukerche Traffic Efficiency Applications over
Downtown Roads: a New Challenge for
Intelligent Connected Vehicles . . . . . 102:1--102:30
María A. Cornejo-Lupa and
Regina P. Ticona-Herrera and
Yudith Cardinale and
Dennis Barrios-Aranibar A Survey of Ontologies for Simultaneous
Localization and Mapping in Mobile
Robots . . . . . . . . . . . . . . . . . 103:1--103:26
Kai Bu and
Avery Laird and
Yutian Yang and
Linfeng Cheng and
Jiaqing Luo and
Yingjiu Li and
Kui Ren Unveiling the Mystery of Internet Packet
Forwarding: a Survey of Network Path
Validation . . . . . . . . . . . . . . . 104:1--104:34
Gonzalo Navarro and
Javiel Rojas-Ledesma Predecessor Search . . . . . . . . . . . 105:1--105:35
Yashar Deldjoo and
Markus Schedl and
Paolo Cremonesi and
Gabriella Pasi Recommender Systems Leveraging
Multimedia Content . . . . . . . . . . . 106:1--106:38
Jingwen Wang and
Xuyang Jing and
Zheng Yan and
Yulong Fu and
Witold Pedrycz and
Laurence T. Yang A Survey on Trust Evaluation Based on
Machine Learning . . . . . . . . . . . . 107:1--107:36
Hao Wang and
Dit-Yan Yeung A Survey on Bayesian Deep Learning . . . 108:1--108:37
Xinyi Zhou and
Reza Zafarani A Survey of Fake News: Fundamental
Theories, Detection Methods, and
Opportunities . . . . . . . . . . . . . 109:1--109:40
Ali Davoudian and
Mengchi Liu Big Data Systems: a Software Engineering
Perspective . . . . . . . . . . . . . . 110:1--110:39
Kui Yu and
Xianjie Guo and
Lin Liu and
Jiuyong Li and
Hao Wang and
Zhaolong Ling and
Xindong Wu Causality-based Feature Selection:
Methods and Evaluations . . . . . . . . 111:1--111:36
Furkan Alaca and
Paul C. Van Oorschot Comparative Analysis and Framework
Evaluating Web Single Sign-on Systems 112:1--112:34
Peter J. Denning Working Set Analytics . . . . . . . . . 113:1--113:36
Albert Y. Zomaya In Memoriam Sherif Sakr (1979--2020) . . 113e:1--113e:1
Aditya Singh Rathore and
Zhengxiong Li and
Weijin Zhu and
Zhanpeng Jin and
Wenyao Xu A Survey on Heart Biometrics . . . . . . 114:1--114:38
Sara N. Matheu and
José L. Hernández-Ramos and
Antonio F. Skarmeta and
Gianmarco Baldini A Survey of Cybersecurity Certification
for the Internet of Things . . . . . . . 115:1--115:36
Jide S. Edu and
Jose M. Such and
Guillermo Suarez-Tangil Smart Home Personal Assistants: a
Security and Privacy Review . . . . . . 116:1--116:36
Marimuthu C. and
K. Chandrasekaran and
Sridhar Chimalakonda Energy Diagnosis of Android
Applications: a Thematic Taxonomy and
Survey . . . . . . . . . . . . . . . . . 117:1--117:36
Pamela Zave and
Jennifer Rexford Patterns and Interactions in Network
Security . . . . . . . . . . . . . . . . 118:1--118:37
K. K. Santhosh and
D. P. Dogra and
P. P. Roy Anomaly Detection in Road Traffic Using
Visual Surveillance: a Survey . . . . . 119:1--119:26
Elakkiya Ellavarason and
Richard Guest and
Farzin Deravi and
Raul Sanchez-Riello and
Barbara Corsetti Touch-dynamics based Behavioural
Biometrics on Mobile Devices --- A
Review from a Usability and Performance
Perspective . . . . . . . . . . . . . . 120:1--120:36
Marco Zimmerling and
Luca Mottola and
Silvia Santini Synchronous Transmissions in Low-Power
Wireless: a Survey of Communication
Protocols and Network Services . . . . . 121:1--121:39
Nazar Waheed and
Xiangjian He and
Muhammad Ikram and
Muhammad Usman and
Saad Sajid Hashmi and
Muhammad Usman Security and Privacy in IoT Using
Machine Learning and Blockchain: Threats
and Countermeasures . . . . . . . . . . 122:1--122:37
Riemer van Rozen Languages of Games and Play: a
Systematic Mapping Study . . . . . . . . 123:1--123:37
Michele Coscia and
Andres Gomez-Lievano and
James Mcnerney and
Frank Neffke The Node Vector Distance Problem in
Complex Networks . . . . . . . . . . . . 124:1--124:27
Giulio Ermanno Pibiri and
Rossano Venturini Techniques for Inverted Index
Compression . . . . . . . . . . . . . . 125:1--125:36
Junyang Qiu and
Jun Zhang and
Wei Luo and
Lei Pan and
Surya Nepal and
Yang Xiang A Survey of Android Malware Detection
with Deep Neural Models . . . . . . . . 126:1--126:36
Vassilis Christophides and
Vasilis Efthymiou and
Themis Palpanas and
George Papadakis and
Kostas Stefanidis An Overview of End-to-End Entity
Resolution for Big Data . . . . . . . . 127:1--127:42
Furkan Turan and
Ingrid Verbauwhede Trust in FPGA-accelerated Cloud
Computing . . . . . . . . . . . . . . . 128:1--128:28
Ruba Skaik and
Diana Inkpen Using Social Media for Mental Health
Surveillance: a Review . . . . . . . . . 129:1--129:31
Sarah Masud Preum and
Sirajum Munir and
Meiyi Ma and
Mohammad Samin Yasar and
David J. Stone and
Ronald Williams and
Homa Alemzadeh and
John A. Stankovic A Review of Cognitive Assistants for
Healthcare: Trends, Prospects, and
Future Directions . . . . . . . . . . . 130:1--130:37
Maggi Bansal and
Inderveer Chana and
Siobhán Clarke A Survey on IoT Big Data: Current
Status, 13 V's Challenges, and Future
Directions . . . . . . . . . . . . . . . 131:1--131:59
Suzanne Tolmeijer and
Markus Kneer and
Cristina Sarasua and
Markus Christen and
Abraham Bernstein Implementations in Machine Ethics: a
Survey . . . . . . . . . . . . . . . . . 132:1--132:38
Liehuang Zhu and
Md M. Karim and
Kashif Sharif and
Chang Xu and
Fan Li and
Xiaojiang Du and
Mohsen Guizani SDN Controllers: a Comprehensive
Analysis and Performance Evaluation
Study . . . . . . . . . . . . . . . . . 133:1--133:40
Azzedine Boukerche and
Peng Sun Design of Algorithms and Protocols for
Underwater Acoustic Wireless Sensor
Networks . . . . . . . . . . . . . . . . 134:1--134:34
Miljana Mladenovi\'c and
Vera Osmjanski and
Stasa Vujici\'c Stankovi\'c Cyber-aggression, Cyberbullying, and
Cyber-grooming: a Survey and Research
Challenges . . . . . . . . . . . . . . . 1:1--1:42
Avani Vyas and
Sujata Pal and
Barun Kumar Saha Relay-based Communications in WBANs: a
Comprehensive Survey . . . . . . . . . . 2:1--2:34
Ángel Jesús Varela-Vaca and
Antonia M. Reina Quintero Smart Contract Languages: a Multivocal
Mapping Study . . . . . . . . . . . . . 3:1--3:38
Hongbo Jiang and
Jie Li and
Ping Zhao and
Fanzi Zeng and
Zhu Xiao and
Arun Iyengar Location Privacy-preserving Mechanisms
in Location-based Services: a
Comprehensive Survey . . . . . . . . . . 4:1--4:36
Christopher Wright and
William A. Moeglein and
Saurabh Bagchi and
Milind Kulkarni and
Abraham A. Clements Challenges in Firmware Re-Hosting,
Emulation, and Analysis . . . . . . . . 5:1--5:36
Renjie Gu and
Chaoyue Niu and
Fan Wu and
Guihai Chen and
Chun Hu and
Chengfei Lyu and
Zhihua Wu From Server-Based to Client-Based
Machine Learning: a Comprehensive Survey 6:1--6:36
Yisroel Mirsky and
Wenke Lee The Creation and Detection of Deepfakes:
a Survey . . . . . . . . . . . . . . . . 7:1--7:41
Joan Boyar and
Lene M. Favrholdt and
Kim S. Larsen Relative Worst-order Analysis: a Survey 8:1--8:21
Prasanna Ravi and
James Howe and
Anupam Chattopadhyay and
Shivam Bhasin Lattice-based Key-sharing Schemes: a
Survey . . . . . . . . . . . . . . . . . 9:1--9:39
Behroz Mirza and
Tahir Q. Syed and
Behraj Khan and
Yameen Malik Potential Deep Learning Solutions to
Persistent and Emerging Big Data
Challenges --- a Practitioners' Cookbook 10:1--10:39
Sergio López Bernal and
Alberto Huertas Celdrán and
Gregorio Martínez Pérez and
Michael Taynnan Barros and
Sasitharan Balasubramaniam Security in Brain-Computer Interfaces:
State-of-the-Art, Opportunities, and
Future Challenges . . . . . . . . . . . 11:1--11:35
Leah Zhang-Kennedy and
Sonia Chiasson A Systematic Review of Multimedia Tools
for Cybersecurity Awareness and
Education . . . . . . . . . . . . . . . 12:1--12:39
Shengming Jiang Networking in Oceans: a Survey . . . . . 13:1--13:33
Weitao Xu and
Junqing Zhang and
Shunqi Huang and
Chengwen Luo and
Wei Li Key Generation for Internet of Things: a
Contemporary Survey . . . . . . . . . . 14:1--14:37
Paolo Bellavista and
Luca Foschini and
Alessio Mora Decentralised Learning in Federated
Deployment Environments: a System-Level
Survey . . . . . . . . . . . . . . . . . 15:1--15:38
Zarin Tasnim Sandhie and
Jill Arvindbhai Patel and
Farid Uddin Ahmed and
Masud H. Chowdhury Investigation of Multiple-valued Logic
Technologies for Beyond-binary Era . . . 16:1--16:30
Rayan Chikhi and
Jan Holub and
Paul Medvedev Data Structures to Represent a Set of
$k$-long DNA Sequences . . . . . . . . . 17:1--17:22
Víctor Adrián Sosa Hernández and
Raúl Monroy and
Miguel Angel Medina-Pérez and
Octavio Loyola-González and
Francisco Herrera A Practical Tutorial for Decision Tree
Induction: Evaluation Measures for
Candidate Splits and Opportunities . . . 18:1--18:38
Stefano Mariani and
Giacomo Cabri and
Franco Zambonelli Coordination of Autonomous Vehicles:
Taxonomy and Survey . . . . . . . . . . 19:1--19:33
Zara Nasar and
Syed Waqar Jaffry and
Muhammad Kamran Malik Named Entity Recognition and Relation
Extraction: State-of-the-Art . . . . . . 20:1--20:39
Emad Aliwa and
Omer Rana and
Charith Perera and
Peter Burnap Cyberattacks and Countermeasures for
In-Vehicle Networks . . . . . . . . . . 21:1--21:37
Bosheng Song and
Kenli Li and
David Orellana-Martín and
Mario J. Pérez-Jiménez and
Ignacio PéRez-Hurtado A Survey of Nature-Inspired Computing:
Membrane Computing . . . . . . . . . . . 22:1--22:31
Anna Minaeva and
Zdenek Hanzálek Survey on Periodic Scheduling for
Time-triggered Hard Real-time Systems 23:1--23:32
Tobias Distler Byzantine Fault-tolerant State-machine
Replication from a Systems Perspective 24:1--24:38
Abdullah Qasem and
Paria Shirani and
Mourad Debbabi and
Lingyu Wang and
Bernard Lebel and
Basile L. Agba Automatic Vulnerability Detection in
Embedded Devices and Firmware: Survey
and Layered Taxonomies . . . . . . . . . 25:1--25:42
Gonzalo Navarro Indexing Highly Repetitive String
Collections, Part II: Compressed Indexes 26:1--26:32
Fan Zhou and
Xovee Xu and
Goce Trajcevski and
Kunpeng Zhang A Survey of Information Cascade
Analysis: Models, Predictions, and
Recent Advances . . . . . . . . . . . . 27:1--27:36
Pedro Ribeiro and
Pedro Paredes and
Miguel E. P. Silva and
David Aparicio and
Fernando Silva A Survey on Subgraph Counting: Concepts,
Algorithms, and Applications to Network
Motifs and Graphlets . . . . . . . . . . 28:1--28:36
Gonzalo Navarro Indexing Highly Repetitive String
Collections, Part I: Repetitiveness
Measures . . . . . . . . . . . . . . . . 29:1--29:31
Azzedine Boukerche and
Zhijun Hou Object Detection Using Deep Learning
Methods in Traffic Scenarios . . . . . . 30:1--30:35
Bo Liu and
Ming Ding and
Sina Shaham and
Wenny Rahayu and
Farhad Farokhi and
Zihuai Lin When Machine Learning Meets Privacy: a
Survey and Outlook . . . . . . . . . . . 31:1--31:36
Chenning Li and
Zhichao Cao and
Yunhao Liu Deep AI Enabled Ubiquitous Wireless
Sensing: a Survey . . . . . . . . . . . 32:1--32:35
Kelsey Harley and
Rodney Cooper Information Integrity: Are We There Yet? 33:1--33:35
El-Ghazali Talbi Automated Design of Deep Neural
Networks: a Survey and Unified Taxonomy 34:1--34:37
Yashar Deldjoo and
Tommaso Di Noia and
Felice Antonio Merra A Survey on Adversarial Recommender
Systems: From Attack/Defense Strategies
to Generative Adversarial Networks . . . 35:1--35:38
Sarra Bouhenni and
Sa\"\id Yahiaoui and
Nadia Nouali-Taboudjemat and
Hamamache Kheddouci A Survey on Distributed Graph Pattern
Matching in Massive Graphs . . . . . . . 36:1--36:35
Zhengwei Wang and
Qi She and
Tomás E. Ward Generative Adversarial Networks in
Computer Vision: a Survey and Taxonomy 37:1--37:38
Guansong Pang and
Chunhua Shen and
Longbing Cao and
Anton Van Den Hengel Deep Learning for Anomaly Detection: a
Review . . . . . . . . . . . . . . . . . 38:1--38:38
Sheng Wang and
Zhifeng Bao and
J. Shane Culpepper and
Gao Cong A Survey on Trajectory Data Management,
Analytics, and Learning . . . . . . . . 39:1--39:36
Christian Meurisch and
Max Mühlhäuser Data Protection in AI Services: a Survey 40:1--40:38
Dhivya Chandrasekaran and
Vijay Mago Evolution of Semantic Similarity --- a
Survey . . . . . . . . . . . . . . . . . 41:1--41:37
Xiaoxue Chen and
Lianwen Jin and
Yuanzhi Zhu and
Canjie Luo and
Tianwei Wang Text Recognition in the Wild: a Survey 42:1--42:35
Suha S. Al-Thanyyan and
Aqil M. Azmi Automated Text Simplification: a Survey 43:1--43:36
Huawei Huang and
Wei Kong and
Sicong Zhou and
Zibin Zheng and
Song Guo A Survey of State-of-the-Art on
Blockchains: Theories, Modelings, and
Tools . . . . . . . . . . . . . . . . . 44:1--44:42
Sameen Maruf and
Fahimeh Saleh and
Gholamreza Haffari A Survey on Document-level Neural
Machine Translation: Methods and
Evaluation . . . . . . . . . . . . . . . 45:1--45:36
Arlino Magalhaes and
Jose Maria Monteiro and
Angelo Brayner Main Memory Database Recovery: a Survey 46:1--46:36
Mohammed Hassanin and
Salman Khan and
Murat Tahtali Visual Affordance and Function
Understanding: a Survey . . . . . . . . 47:1--47:35
Matteo Magnani and
Obaida Hanteer and
Roberto Interdonato and
Luca Rossi and
Andrea Tagarelli Community Detection in Multiplex
Networks . . . . . . . . . . . . . . . . 48:1--48:35
Clayson Celes and
Azzedine Boukerche and
Antonio A. F. Loureiro Mobility Trace Analysis for Intelligent
Vehicular Networks: Methods, Models, and
Applications . . . . . . . . . . . . . . 49:1--49:38
Bushra Sabir and
Faheem Ullah and
M. Ali Babar and
Raj Gaire Machine Learning for Detecting Data
Exfiltration: a Review . . . . . . . . . 50:1--50:47
Irfan Ul Haq and
Juan Caballero A Survey of Binary Code Similarity . . . 51:1--51:38
Shyamali Mitra and
Nibaran Das and
Soumyajyoti Dey and
Sukanta Chakraborty and
Mita Nasipuri and
Mrinal Kanti Naskar Cytology Image Analysis Techniques
Toward Automation: Systematically
Revisited . . . . . . . . . . . . . . . 52:1--52:41
Ilona Bluemke and
Agnieszka Malanowska Software Testing Effort Estimation and
Related Problems: a Systematic
Literature Review . . . . . . . . . . . 53:1--53:38
Wenjie Xiong and
Jakub Szefer Survey of Transient Execution Attacks
and Their Mitigations . . . . . . . . . 54:1--54:36
Liping Zhao and
Waad Alhoshan and
Alessio Ferrari and
Keletso J. Letsholo and
Muideen A. Ajagbe and
Erol-Valeriu Chioasca and
Riza T. Batista-Navarro Natural Language Processing for
Requirements Engineering: a Systematic
Mapping Study . . . . . . . . . . . . . 55:1--55:41
Ane Blázquez-García and
Angel Conde and
Usue Mori and
Jose A. Lozano A Review on Outlier/Anomaly Detection in
Time Series Data . . . . . . . . . . . . 56:1--56:33
Syed Wasif Abbas Hamdani and
Haider Abbas and
Abdul Rehman Janjua and
Waleed Bin Shahid and
Muhammad Faisal Amjad and
Jahanzaib Malik and
Malik Hamza Murtaza and
Mohammed Atiquzzaman and
Abdul Waheed Khan Cybersecurity Standards in the Context
of Operating System: Practical Aspects,
Analysis, and Comparisons . . . . . . . 57:1--57:36
Xi Li and
Zehua Wang and
Victor C. M. Leung and
Hong Ji and
Yiming Liu and
Heli Zhang Blockchain-empowered Data-driven
Networks: a Survey and Outlook . . . . . 58:1--58:38
Petr Spelda and
Vit Stritecky Human Induction in Machine Learning: a
Survey of the Nexus . . . . . . . . . . 59:1--59:18
Jun Huang and
Debiao He and
Mohammad S. Obaidat and
Pandi Vijayakumar and
Min Luo and
Kim-Kwang Raymond Choo The Application of the Blockchain
Technology in Voting Systems: a Review 60:1--60:28
Boubakr Nour and
Hakima Khelifi and
Rasheed Hussain and
Spyridon Mastorakis and
Hassine Moungla Access Control Mechanisms in Named Data
Networks: a Comprehensive Survey . . . . 61:1--61:35
Shervin Minaee and
Nal Kalchbrenner and
Erik Cambria and
Narjes Nikzad and
Meysam Chenaghlu and
Jianfeng Gao Deep Learning--based Text
Classification: a Comprehensive Review 62:1--62:40
Divya Saxena and
Jiannong Cao Generative Adversarial Networks (GANs):
Challenges, Solutions, and Future
Directions . . . . . . . . . . . . . . . 63:1--63:42
Zhabiz Gharibshah and
Xingquan Zhu User Response Prediction in Online
Advertising . . . . . . . . . . . . . . 64:1--64:43
Gilberto Astolfi and
Fábio Prestes Cesar Rezende and
João Vitor De Andrade Porto and
Edson Takashi Matsubara and
Hemerson Pistori Syntactic Pattern Recognition in
Computer Vision: a Systematic Review . . 65:1--65:35
Blesson Varghese and
Nan Wang and
David Bermbach and
Cheol-Ho Hong and
Eyal De Lara and
Weisong Shi and
Christopher Stewart A Survey on Edge Performance
Benchmarking . . . . . . . . . . . . . . 66:1--66:33
Danilo Avola and
Luigi Cinque and
Alessio Fagioli and
Gianluca Foresti and
Alessio Mecca Ultrasound Medical Imaging Techniques: a
Survey . . . . . . . . . . . . . . . . . 67:1--67:38
Khan Muhammad and
Mohammad S. Obaidat and
Tanveer Hussain and
Javier Del Ser and
Neeraj Kumar and
Mohammad Tanveer and
Faiyaz Doctor Fuzzy Logic in Surveillance Big Video
Data Analysis: Comprehensive Review,
Challenges, and Research Directions . . 68:1--68:33
Ahmed Alharbi and
Hai Dong and
Xun Yi and
Zahir Tari and
Ibrahim Khalil Social Media Identity Deception
Detection: a Survey . . . . . . . . . . 69:1--69:35
Felipe L. Gewers and
Gustavo R. Ferreira and
Henrique F. De Arruda and
Filipi N. Silva and
Cesar H. Comin and
Diego R. Amancio and
Luciano Da F.Costa Principal Component Analysis: a Natural
Approach to Data Exploration . . . . . . 70:1--70:34
Aidan Hogan and
Eva Blomqvist and
Michael Cochez and
Claudia D'amato and
Gerard De Melo and
Claudio Gutierrez and
Sabrina Kirrane and
José Emilio Labra Gayo and
Roberto Navigli and
Sebastian Neumaier and
Axel-Cyrille Ngonga Ngomo and
Axel Polleres and
Sabbir M. Rashid and
Anisa Rula and
Lukas Schmelzeisen and
Juan Sequeda and
Steffen Staab and
Antoine Zimmermann Knowledge Graphs . . . . . . . . . . . . 71:1--71:37
Wen-Huang Cheng and
Sijie Song and
Chieh-Yun Chen and
Shintami Chusnul Hidayati and
Jiaying Liu Fashion Meets Computer Vision: a Survey 72:1--72:41
Rob Dunne and
Tim Morris and
Simon Harper A Survey of Ambient Intelligence . . . . 73:1--73:27
H. M. Dipu Kabir and
Abbas Khosravi and
Subrota K. Mondal and
Mustaneer Rahman and
Saeid Nahavandi and
Rajkumar Buyya Uncertainty-aware Decisions in Cloud
Computing: Foundations and Future
Directions . . . . . . . . . . . . . . . 74:1--74:30
Fei Chen and
Duming Luo and
Tao Xiang and
Ping Chen and
Junfeng Fan and
Hong-Linh Truong IoT Cloud Security Review: a Case Study
Approach Using Emerging
Consumer-oriented Applications . . . . . 75:1--75:36
Pengzhen Ren and
Yun Xiao and
Xiaojun Chang and
Po-yao Huang and
Zhihui Li and
Xiaojiang Chen and
Xin Wang A Comprehensive Survey of Neural
Architecture Search: Challenges and
Solutions . . . . . . . . . . . . . . . 76:1--76:34
Kaixuan Chen and
Dalin Zhang and
Lina Yao and
Bin Guo and
Zhiwen Yu and
Yunhao Liu Deep Learning for Sensor-based Human
Activity Recognition: Overview,
Challenges, and Opportunities . . . . . 77:1--77:40
Daniel Russo and
Klaas-Jan Stol PLS-SEM for Software Engineering
Research: an Introduction and Survey . . 78:1--78:38
Abdus Salam and
Rolf Schwitter and
Mehmet A. Orgun Probabilistic Rule Learning Systems: a
Survey . . . . . . . . . . . . . . . . . 79:1--79:16
Elena Almaraz Luengo and
Luis Javier García Villalba Recommendations on Statistical
Randomness Test Batteries for
Cryptographic Purposes . . . . . . . . . 80:1--80:34
Katie Seaborn and
Norihisa P. Miyake and
Peter Pennefather and
Mihoko Otake-Matsuura Voice in Human-Agent Interaction: a
Survey . . . . . . . . . . . . . . . . . 81:1--81:43
Oliver Michel and
Roberto Bifulco and
Gábor Rétvári and
Stefan Schmid The Programmable Data Plane:
Abstractions, Architectures, Algorithms,
and Applications . . . . . . . . . . . . 82:1--82:36
Wei Hu and
Armaiti Ardeshiricham and
Ryan Kastner Hardware Information Flow Tracking . . . 83:1--83:39
Azzedine Boukerche and
Xiren Ma Vision-based Autonomous Vehicle
Recognition: a New Challenge for Deep
Learning-based Systems . . . . . . . . . 84:1--84:37
Bekir Afsar and
Kaisa Miettinen and
Francisco Ruiz Assessing the Performance of Interactive
Multiobjective Optimization Methods: a
Survey . . . . . . . . . . . . . . . . . 85:1--85:27
Nikhil Tripathi and
Neminath Hubballi Application Layer Denial-of-Service
Attacks and Defense Mechanisms: a Survey 86:1--86:33
Yunbo Tang and
Dan Chen and
Xiaoli Li Dimensionality Reduction Methods for
Brain Imaging Data Analysis . . . . . . 87:1--87:36
Matteo Ridolfi and
Abdil Kaya and
Rafael Berkvens and
Maarten Weyn and
Wout Joseph and
Eli De Poorter Self-calibration and Collaborative
Localization for UWB Positioning
Systems: a Survey and Future Research
Directions . . . . . . . . . . . . . . . 88:1--88:27
Nuno Laranjeiro and
João Agnelo and
Jorge Bernardino A Systematic Review on Software
Robustness Assessment . . . . . . . . . 89:1--89:65
Boyuan Chen and
Zhen Ming (Jack) Jiang A Survey of Software Log Instrumentation 90:1--90:34
Varsha S. Lalapura and
J. Amudha and
Hariramn Selvamuruga Satheesh Recurrent Neural Networks for Edge
Intelligence: a Survey . . . . . . . . . 91:1--91:38
Antonia Bertolino and
Pietro Braione and
Guglielmo De Angelis and
Luca Gazzola and
Fitsum Kifetew and
Leonardo Mariani and
Matteo Orr\`u and
Mauro Pezz\`e and
Roberto Pietrantuono and
Stefano Russo and
Paolo Tonella A Survey of Field-based Testing
Techniques . . . . . . . . . . . . . . . 92:1--92:39
Jean-Michel Bruel and
Sophie Ebersold and
Florian Galinier and
Manuel Mazzara and
Alexandr Naumchev and
Bertrand Meyer The Role of Formalism in System
Requirements . . . . . . . . . . . . . . 93:1--93:36
Liang Zhao Event Prediction in the Big Data Era: a
Systematic Survey . . . . . . . . . . . 94:1--94:37
Sin Kit Lo and
Qinghua Lu and
Chen Wang and
Hye-Young Paik and
Liming Zhu A Systematic Literature Review on
Federated Machine Learning: From a
Software Engineering Perspective . . . . 95:1--95:39
Abdulaziz Alashaikh and
Eisa Alanazi and
Ala Al-Fuqaha A Survey on the Use of Preferences for
Virtual Machine Placement in Cloud Data
Centers . . . . . . . . . . . . . . . . 96:1--96:39
Xing Huang and
Tsung-Yi Ho and
Wenzhong Guo and
Bing Li and
Krishnendu Chakrabarty and
Ulf Schlichtmann Computer-aided Design Techniques for
Flow-based Microfluidic Lab-on-a-chip
Systems . . . . . . . . . . . . . . . . 97:1--97:29
Jana Dunfield and
Neel Krishnaswami Bidirectional Typing . . . . . . . . . . 98:1--98:38
Mohanad Abukmeil and
Stefano Ferrari and
Angelo Genovese and
Vincenzo Piuri and
Fabio Scotti A Survey of Unsupervised Generative
Models for Exploratory Data Analysis and
Representation Learning . . . . . . . . 99:1--99:40
Adilla Susungi and
Claude Tadonki Intermediate Representations for
Explicitly Parallel Programs . . . . . . 100:1--100:24
Subodha Charles and
Prabhat Mishra A Survey of Network-on-Chip Security
Attacks and Countermeasures . . . . . . 101:1--101:36
Atheer Aljeraisy and
Masoud Barati and
Omer Rana and
Charith Perera Privacy Laws and Privacy by Design
Schemes for the Internet of Things: a
Developer's Perspective . . . . . . . . 102:1--102:38
Arwa I. Alhussain and
Aqil M. Azmi Automatic Story Generation: a Survey of
Approaches . . . . . . . . . . . . . . . 103:1--103:38
Marie Al-Ghossein and
Talel Abdessalem and
Anthony Barré A Survey on Stream-Based Recommender
Systems . . . . . . . . . . . . . . . . 104:1--104:36
Dietmar Jannach and
Ahtsham Manzoor and
Wanling Cai and
Li Chen A Survey on Conversational Recommender
Systems . . . . . . . . . . . . . . . . 105:1--105:36
Yuan Luo and
Ya Xiao and
Long Cheng and
Guojun Peng and
Danfeng (Daphne) Yao Deep Learning-based Anomaly Detection in
Cyber-physical Systems: Progress and
Opportunities . . . . . . . . . . . . . 106:1--106:36
Maya Dotan and
Yvonne-Anne Pignolet and
Stefan Schmid and
Saar Tochner and
Aviv Zohar Survey on Blockchain Networking:
Context, State-of-the-Art, Challenges 107:1--107:34
Ishai Rosenberg and
Asaf Shabtai and
Yuval Elovici and
Lior Rokach Adversarial Machine Learning Attacks and
Defense Methods in the Cyber Security
Domain . . . . . . . . . . . . . . . . . 108:1--108:36
Shubham Pateria and
Budhitama Subagdja and
Ah-hwee Tan and
Chai Quek Hierarchical Reinforcement Learning: a
Comprehensive Survey . . . . . . . . . . 109:1--109:35
Vimal Dwivedi and
Vishwajeet Pattanaik and
Vipin Deval and
Abhishek Dixit and
Alex Norta and
Dirk Draheim Legally Enforceable Smart-Contract
Languages: a Systematic Literature
Review . . . . . . . . . . . . . . . . . 110:1--110:34
Rob Ashmore and
Radu Calinescu and
Colin Paterson Assuring the Machine Learning Lifecycle:
Desiderata, Methods, and Challenges . . 111:1--111:39
Peter Kietzmann and
Thomas C. Schmidt and
Matthias Wählisch A Guideline on Pseudorandom Number
Generation (PRNG) in the IoT . . . . . . 112:1--112:38
Eman Badr Images in Space and Time: Real Big Data
in Healthcare . . . . . . . . . . . . . 113:1--113:38
Swati Jaiswal and
Uday P. Khedker and
Alan Mycroft A Unified Model for Context-Sensitive
Program Analyses:: The Blind Men and the
Elephant . . . . . . . . . . . . . . . . 114:1--114:37
Ninareh Mehrabi and
Fred Morstatter and
Nripsuta Saxena and
Kristina Lerman and
Aram Galstyan A Survey on Bias and Fairness in Machine
Learning . . . . . . . . . . . . . . . . 115:1--115:35
Harley Vera-Olivera and
Ruizhe Guo and
Ruben Cruz Huacarpuma and
Ana Paula Bernardi Da Silva and
Ari Melo Mariano and
Maristela Holanda Data Modeling and NoSQL Databases --- a
Systematic Mapping Review . . . . . . . 116:1--116:26
Routa Moussaileb and
Nora Cuppens and
Jean-Louis Lanet and
Hél\`ene Le Bouder A Survey on Windows-based Ransomware
Taxonomy and Detection Mechanisms . . . 117:1--117:36
Ratnabali Pal and
Arif Ahmed Sekh and
Debi Prosad Dogra and
Samarjit Kar and
Partha Pratim Roy and
Dilip K. Prasad Topic-based Video Analysis: a Survey . . 118:1--118:34
Andreia P. Guerreiro and
Carlos M. Fonseca and
Luís Paquete The Hypervolume Indicator: Computational
Problems and Algorithms . . . . . . . . 119:1--119:42
Yuta Itoh and
Tobias Langlotz and
Jonathan Sutton and
Alexander Plopski Towards Indistinguishable Augmented
Reality: a Survey on Optical See-through
Head-mounted Displays . . . . . . . . . 120:1--120:36
Bilal Rauf and
Haider Abbas and
Muhammad Usman and
Tanveer A. Zia and
Waseem Iqbal and
Yawar Abbas and
Hammad Afzal Application Threats to Exploit
Northbound Interface Vulnerabilities in
Software Defined Networks . . . . . . . 121:1--121:36
Xiaoxuan Lou and
Tianwei Zhang and
Jun Jiang and
Yinqian Zhang A Survey of Microarchitectural
Side-channel Vulnerabilities, Attacks,
and Defenses in Cryptography . . . . . . 122:1--122:37
Eva Papadogiannaki and
Sotiris Ioannidis A Survey on Encrypted Network Traffic
Analysis Applications, Techniques, and
Countermeasures . . . . . . . . . . . . 123:1--123:35
Thi Tuyet Hai Nguyen and
Adam Jatowt and
Mickael Coustaty and
Antoine Doucet Survey of Post-OCR Processing Approaches 124:1--124:37
Panagiotis Oikonomou and
Anna Karanika and
Christos Anagnostopoulos and
Kostas Kolomvatsos On the Use of Intelligent Models towards
Meeting the Challenges of the Edge Mesh 125:1--125:42
Shufan Fei and
Zheng Yan and
Wenxiu Ding and
Haomeng Xie Security Vulnerabilities of SGX and
Countermeasures: a Survey . . . . . . . 126:1--126:36
Sindhu Padakandla A Survey of Reinforcement Learning
Algorithms for Dynamically Varying
Environments . . . . . . . . . . . . . . 127:1--127:25
Pádraig Cunningham and
Sarah Jane Delany $k$-Nearest Neighbour Classifiers --- a
Tutorial . . . . . . . . . . . . . . . . 128:1--128:25
El-Ghazali Talbi Machine Learning into Metaheuristics: a
Survey and Taxonomy . . . . . . . . . . 129:1--129:32
Shilin He and
Pinjia He and
Zhuangbin Chen and
Tianyi Yang and
Yuxin Su and
Michael R. Lyu A Survey on Automated Log Analysis for
Reliability Engineering . . . . . . . . 130:1--130:37
Xuefei Yin and
Yanming Zhu and
Jiankun Hu A Comprehensive Survey of
Privacy-preserving Federated Learning: a
Taxonomy, Review, and Future Directions 131:1--131:36
Zhipeng Cai and
Zuobin Xiong and
Honghui Xu and
Peng Wang and
Wei Li and
Yi Pan Generative Adversarial Networks: a
Survey Toward Private and Secure
Applications . . . . . . . . . . . . . . 132:1--132:38
Azzedine Boukerche and
Mingzhi Sha Design Guidelines on Deep Learning-based
Pedestrian Detection Methods for
Supporting Autonomous Vehicles . . . . . 133:1--133:36
Thomas PlÖtz Applying Machine Learning for Sensor
Data Analysis in Interactive Systems:
Common Pitfalls of Pragmatic Use and
Ways to Avoid Them . . . . . . . . . . . 134:1--134:25
Ankur Lohachab and
Saurabh Garg and
Byeong Kang and
Muhammad Bilal Amin and
Junmin Lee and
Shiping Chen and
Xiwei Xu Towards Interconnected Blockchains: a
Comprehensive Review of the Role of
Interoperability among Disparate
Blockchains . . . . . . . . . . . . . . 135:1--135:39
Lefeng Zhang and
Tianqing Zhu and
Ping Xiong and
Wanlei Zhou and
Philip S. Yu More than Privacy: Adopting Differential
Privacy in Game-theoretic Mechanism
Design . . . . . . . . . . . . . . . . . 136:1--136:37
Michael Braun and
Florian Weber and
Florian Alt Affective Automotive User
Interfaces-Reviewing the State of Driver
Affect Research and Emotion Regulation
in the Car . . . . . . . . . . . . . . . 137:1--137:26
Sophie Dramé-Maigné and
Maryline Laurent and
Laurent Castillo and
Hervé Ganem Centralized, Distributed, and Everything
in between: Reviewing Access Control
Solutions for the IoT . . . . . . . . . 138:1--138:34
Yuantian Miao and
Chao Chen and
Lei Pan and
Qing-Long Han and
Jun Zhang and
Yang Xiang Machine Learning-based Cyber Attacks
Targeting on Controlled Information: a
Survey . . . . . . . . . . . . . . . . . 139:1--139:36
Luciano Ignaczak and
Guilherme Goldschmidt and
Cristiano André Da Costa and
Rodrigo Da Rosa Righi Text Mining in Cybersecurity: a
Systematic Literature Review . . . . . . 140:1--140:36
Tharindu Fernando and
Harshala Gammulle and
Simon Denman and
Sridha Sridharan and
Clinton Fookes Deep Learning for Medical Anomaly
Detection --- a Survey . . . . . . . . . 141:1--141:37
Salonik Resch and
Ulya R. Karpuzcu Benchmarking Quantum Computers and the
Impact of Quantum Noise . . . . . . . . 142:1--142:35
Hugo B. Lima and
Carlos G. R. Dos Santos and
Bianchi S. Meiguins A Survey of Music Visualization
Techniques . . . . . . . . . . . . . . . 143:1--143:29
Yohan Bonescki Gumiel and
Lucas Emanuel Silva e Oliveira and
Vincent Claveau and
Natalia Grabar and
Emerson Cabrera Paraiso and
Claudia Moro and
Deborah Ribeiro Carvalho Temporal Relation Extraction in Clinical
Texts: a Systematic Review . . . . . . . 144:1--144:36
Uttam Chauhan and
Apurva Shah Topic Modeling Using Latent Dirichlet
allocation: a Survey . . . . . . . . . . 145:1--145:35
Lynda Tamine and
Lorraine Goeuriot Semantic Information Retrieval on
Medical Texts: Research Challenges,
Survey, and Open Issues . . . . . . . . 146:1--146:38
Christian Berger and
Philipp Eichhammer and
Hans P. Reiser and
Jörg Domaschka and
Franz J. Hauck and
Gerhard Habiger A Survey on Resilience in the IoT:
Taxonomy, Classification, and Discussion
of Resilience Mechanisms . . . . . . . . 147:1--147:39
Palina Tolmach and
Yi Li and
Shang-Wei Lin and
Yang Liu and
Zengxiang Li A Survey of Smart Contract Formal
Specification and Verification . . . . . 148:1--148:38
Jihyeok Park and
Hongki Lee and
Sukyoung Ryu A Survey of Parametric Static Analysis 149:1--149:37
Douglas Paulo De Mattos and
Débora C. Muchaluat-Saade and
Gheorghita Ghinea Beyond Multimedia Authoring: On the Need
for Mulsemedia Authoring Tools . . . . . 150:1--150:31
Jie Zhang and
Zhihao Qu and
Chenxi Chen and
Haozhao Wang and
Yufeng Zhan and
Baoliu Ye and
Song Guo Edge Learning: The Enabling Technology
for Distributed Big Data Analytics in
the Edge . . . . . . . . . . . . . . . . 151:1--151:36
Alexandro Baldassin and
João Barreto and
Daniel Castro and
Paolo Romano Persistent Memory: a Survey of
Programming Support and Implementations 152:1--152:37
Julio Juárez and
Cipriano (Pano) Santos and
Carlos A. Brizuela A Comprehensive Review and a Taxonomy
Proposal of Team Formation Problems . . 153:1--153:33
Shoujin Wang and
Longbing Cao and
Yan Wang and
Quan Z. Sheng and
Mehmet A. Orgun and
Defu Lian A Survey on Session-based Recommender
Systems . . . . . . . . . . . . . . . . 154:1--154:38
Nathan Magrofuoco and
Paolo Roselli and
Jean Vanderdonckt Two-dimensional Stroke Gesture
Recognition: a Survey . . . . . . . . . 155:1--155:36
Djalel Chefrour One-Way Delay Measurement From
Traditional Networks to SDN: a Survey 156:1--156:35
Abdul Jabbar and
Xi Li and
Bourahla Omar A Survey on Generative Adversarial
Networks: Variants, Applications, and
Training . . . . . . . . . . . . . . . . 157:1--157:49
Jianguo Chen and
Kenli Li and
Zhaolei Zhang and
Keqin Li and
Philip S. Yu A Survey on Applications of Artificial
Intelligence in Fighting Against
COVID-19 . . . . . . . . . . . . . . . . 158:1--158:32
Xingwei Zhang and
Xiaolong Zheng and
Wenji Mao Adversarial Perturbation Defense on Deep
Neural Networks . . . . . . . . . . . . 159:1--159:36
Jinglin Zou and
Debiao He and
Sherali Zeadally and
Neeraj Kumar and
Huaqun Wang and
Kkwang Raymond Choo Integrated Blockchain and Cloud
Computing Systems: a Systematic Survey,
Solutions, and Challenges . . . . . . . 160:1--160:36
Akbar Telikani and
Amirhessam Tahmassebi and
Wolfgang Banzhaf and
Amir H. Gandomi Evolutionary Machine Learning: a Survey 161:1--161:35
Weijia Zhang and
Jiuyong Li and
Lin Liu A Unified Survey of Treatment Effect
Heterogeneity Modelling and Uplift
Modelling . . . . . . . . . . . . . . . 162:1--162:36
Vinicius Souza and
Anderson Maciel and
Luciana Nedel and
Regis Kopper Measuring Presence in Virtual
Environments: a Survey . . . . . . . . . 163:1--163:37
Gopika Ajaykumar and
Maureen Steele and
Chien-Ming Huang A Survey on End-User Robot Programming 164:1--164:36
Lik-Hang Lee and
Tristan Braud and
Simo Hosio and
Pan Hui Towards Augmented Reality Driven
Human-City Interaction: Current Research
on Mobile Headsets and Future Challenges 165:1--165:38
Satyaki Roy and
Preetam Ghosh and
Nirnay Ghosh and
Sajal K. Das Transcriptional Regulatory Network
Topology with Applications to
Bio-inspired Networking: a Survey . . . 166:1--166:36
Haiman Tian and
Maria Presa-Reyes and
Yudong Tao and
Tianyi Wang and
Samira Pouyanfar and
Alonso Miguel and
Steven Luis and
Mei-Ling Shyu and
Shu-Ching Chen and
Sundaraja Sitharama Iyengar Data Analytics for Air Travel Data: a
Survey and New Perspectives . . . . . . 167:1--167:35
Rafael Belchior and
André Vasconcelos and
Sérgio Guerreiro and
Miguel Correia A Survey on Blockchain Interoperability:
Past, Present, and Future Trends . . . . 168:1--168:41
Royson Lee and
Stylianos I. Venieris and
Nicholas D. Lane Deep Neural Network-based Enhancement
for Image and Video Streaming Systems: a
Survey and Future Directions . . . . . . 169:1--169:30
M. G. Sarwar Murshed and
Christopher Murphy and
Daqing Hou and
Nazar Khan and
Ganesh Ananthanarayanan and
Faraz Hussain Machine Learning at the Network Edge: a
Survey . . . . . . . . . . . . . . . . . 170:1--170:37
Maxime Lamothe and
Yann-Gaël Guéhéneuc and
Weiyi Shang A Systematic Review of API Evolution
Literature . . . . . . . . . . . . . . . 171:1--171:36
Jessica McBroom and
Irena Koprinska and
Kalina Yacef A Survey of Automated Programming Hint
Generation: The HINTS Framework . . . . 172:1--172:27
Giuseppe Desolda and
Lauren S. Ferro and
Andrea Marrella and
Tiziana Catarci and
Maria Francesca Costabile Human Factors in Phishing Attacks: a
Systematic Literature Review . . . . . . 173:1--173:35
Ye Tian and
Langchun Si and
Xingyi Zhang and
Ran Cheng and
Cheng He and
Kay Chen Tan and
Yaochu Jin Evolutionary Large-Scale Multi-Objective
Optimization: a Survey . . . . . . . . . 174:1--174:34
Shubhra Kanti Karmaker (``Santu'') and
Md. Mahadi Hassan and
Micah J. Smith and
Lei Xu and
Chengxiang Zhai and
Kalyan Veeramachaneni AutoML to Date and Beyond: Challenges
and Opportunities . . . . . . . . . . . 175:1--175:36
Alexandre H. T. Dias and
Luiz. H. A. Correia and
Neumar Malheiros A Systematic Literature Review on
Virtual Machine Consolidation . . . . . 176:1--176:38
Fuqiang Gu and
Mu-Huan Chung and
Mark Chignell and
Shahrokh Valaee and
Baoding Zhou and
Xue Liu A Survey on Deep Learning for Human
Activity Recognition . . . . . . . . . . 177:1--177:34
Konstantinos Arakadakis and
Pavlos Charalampidis and
Antonis Makrogiannakis and
Alexandros Fragkiadakis Firmware Over-the-air Programming
Techniques for IoT Networks --- A Survey 178:1--178:36
Lázaro Bustio-Martínez and
René Cumplido and
Martín Letras and
Raudel Hernández-León and
Claudia Feregrino-Uribe and
José Hernández-Palancar FPGA/GPU-based Acceleration for Frequent
Itemsets Mining: a Comprehensive Review 179:1--179:35
Pengzhen Ren and
Yun Xiao and
Xiaojun Chang and
Po-Yao Huang and
Zhihui Li and
Brij B. Gupta and
Xiaojiang Chen and
Xin Wang A Survey of Deep Active Learning . . . . 180:1--180:40
Efstratios Kakaletsis and
Charalampos Symeonidis and
Maria Tzelepi and
Ioannis Mademlis and
Anastasios Tefas and
Nikos Nikolaidis and
Ioannis Pitas Computer Vision for Autonomous UAV
Flight Safety: an Overview and a
Vision-based Safe Landing Pipeline
Example . . . . . . . . . . . . . . . . 181:1--181:37
Dylan Chou and
Meng Jiang A Survey on Data-driven Network
Intrusion Detection . . . . . . . . . . 182:1--182:36
Lingxi Xie and
Xin Chen and
Kaifeng Bi and
Longhui Wei and
Yuhui Xu and
Lanfei Wang and
Zhengsu Chen and
An Xiao and
Jianlong Chang and
Xiaopeng Zhang and
Qi Tian Weight-Sharing Neural Architecture
Search: a Battle to Shrink the
Optimization Gap . . . . . . . . . . . . 183:1--183:37
Carlos Bermejo and
Pan Hui A Survey on Haptic Technologies for
Mobile Augmented Reality . . . . . . . . 184:1--184:35
Ismaeel Al Ridhawi and
Ouns Bouachir and
Moayad Aloqaily and
Azzedine Boukerche Design Guidelines for Cooperative
UAV-supported Services and Applications 185:1--185:35
Pasika Ranaweera and
Anca Jurcut and
Madhusanka Liyanage MEC-enabled 5G Use Cases: a Survey on
Security Vulnerabilities and
Countermeasures . . . . . . . . . . . . 186:1--186:37
Xiongkuo Min and
Ke Gu and
Guangtao Zhai and
Xiaokang Yang and
Wenjun Zhang and
Patrick Le Callet and
Chang Wen Chen Screen Content Quality Assessment:
Overview, Benchmark, and Beyond . . . . 187:1--187:36
Frank Siqueira and
Joseph G. Davis Service Computing for Industry 4.0:
State of the Art, Challenges, and
Research Opportunities . . . . . . . . . 188:1--188:38
Denise Maria Vecino Sato and
Sheila Cristiana De Freitas and
Jean Paul Barddal and
Edson Emilio Scalabrin A Survey on Concept Drift in Process
Mining . . . . . . . . . . . . . . . . . 189:1--189:38
Bing Zhang and
Jingyue Li and
Jiadong Ren and
Guoyan Huang Efficiency and Effectiveness of Web
Application Vulnerability Detection
Approaches: a Review . . . . . . . . . . 190:1--190:35
Sergi Abadal and
Akshay Jain and
Robert Guirado and
Jorge López-Alonso and
Eduard Alarcón Computing Graph Neural Networks: a
Survey from Algorithms to Accelerators 191:1--191:38
Meriem Guerar and
Luca Verderame and
Mauro Migliardi and
Francesco Palmieri and
Alessio Merlo Gotta CAPTCHA 'Em All: a Survey of 20
Years of the Human-or-computer Dilemma 192:1--192:33
José Mena and
Oriol Pujol and
Jordi Vitri\`a A Survey on Uncertainty Estimation in
Deep Learning Classification Systems
from a Bayesian Perspective . . . . . . 193:1--193:35
Josef Schmid and
Alfred Höss and
Björn W. Schuller A Survey on Client Throughput Prediction
Algorithms in Wired and Wireless
Networks . . . . . . . . . . . . . . . . 194:1--194:33
Asma Aloufi and
Peizhao Hu and
Yongsoo Song and
Kristin Lauter Computing Blindfolded on Data
Homomorphically Encrypted under Multiple
Keys: a Survey . . . . . . . . . . . . . 195:1--195:37
Chao Liu and
Xin Xia and
David Lo and
Cuiyun Gao and
Xiaohu Yang and
John Grundy Opportunities and Challenges in Code
Search Tools . . . . . . . . . . . . . . 196:1--196:40
Timothy McIntosh and
A. S. M. Kayes and
Yi-Ping Phoebe Chen and
Alex Ng and
Paul Watters Ransomware Mitigation in the Modern Era:
a Comprehensive Review, Research
Challenges, and Future Directions . . . 197:1--197:36
René Mayrhofer and
Stephan Sigg Adversary Models for Mobile Device
Authentication . . . . . . . . . . . . . 198:1--198:35
Gábor E. Gévay and
Juan Soto and
Volker Markl Handling Iterations in Distributed
Dataflow Systems . . . . . . . . . . . . 199:1--199:38
Salman Khan and
Muzammal Naseer and
Munawar Hayat and
Syed Waqas Zamir and
Fahad Shahbaz Khan and
Mubarak Shah Transformers in Vision: a Survey . . . . 200:1--200:??
Géraldin Nanfack and
Paul Temple and
Beno\^\it Frénay Constraint Enforcement on Decision
Trees: a Survey . . . . . . . . . . . . 201:1--201:??
Nhu-Ngoc Dao and
Anh-Tien Tran and
Ngo Hoang Tu and
Tran Thien Thanh and
Vo Nguyen Quoc Bao and
Sungrae Cho A Contemporary Survey on Live Video
Streaming from a Computation-Driven
Perspective . . . . . . . . . . . . . . 202:1--202:??
Pablo Messina and
Pablo Pino and
Denis Parra and
Alvaro Soto and
Cecilia Besa and
Sergio Uribe and
Marcelo And\'ìa and
Cristian Tejos and
Claudia Prieto and
Daniel Capurro A Survey on Deep Learning and
Explainability for Automatic Report
Generation from Medical Images . . . . . 203:1--203:??
Ross Gruetzemacher and
David Paradice Deep Transfer Learning & Beyond:
Transformer Language Models in
Information Systems Research . . . . . . 204:1--204:??
Isaac Ronald Ward and
Jack Joyner and
Casey Lickfold and
Yulan Guo and
Mohammed Bennamoun A Practical Tutorial on Graph Neural
Networks . . . . . . . . . . . . . . . . 205:1--205:??
Yanming Yang and
Xin Xia and
David Lo and
John Grundy A Survey on Deep Learning for Software
Engineering . . . . . . . . . . . . . . 206:1--206:??
Ying Zhao and
Jinjun Chen A Survey on Differential Privacy for
Unstructured Data Content . . . . . . . 207:1--207:??
Ms. Aayushi Bansal and
Dr. Rewa Sharma and
Dr. Mamta Kathuria A Systematic Review on Data Scarcity
Problem in Deep Learning: Solution and
Applications . . . . . . . . . . . . . . 208:1--208:??
Xin Wang and
Sisi Duan and
James Clavin and
Haibin Zhang BFT in Blockchains: From Protocols to
Use Cases . . . . . . . . . . . . . . . 209:1--209:??
Torsten Schlett and
Christian Rathgeb and
Olaf Henniger and
Javier Galbally and
Julian Fierrez and
Christoph Busch Face Image Quality Assessment: a
Literature Survey . . . . . . . . . . . 210:1--210:??
Vijay Kumar Yadav and
Nitish Andola and
Shekhar Verma and
S. Venkatesan A Survey of Oblivious Transfer Protocol 211:1--211:??
Hang Du and
Hailin Shi and
Dan Zeng and
Xiao-Ping Zhang and
Tao Mei The Elements of End-to-end Deep Face
Recognition: a Survey of Recent Advances 212:1--212:??
Claudio Filipi Gonçalves Dos Santos and
João Paulo Papa Avoiding Overfitting: a Survey on
Regularization Methods for Convolutional
Neural Networks . . . . . . . . . . . . 213:1--213:??
Misael C. Júnior and
Domenico Amalfitano and
Lina Garcés and
Anna Rita Fasolino and
Stevão A. Andrade and
Márcio Delamaro Dynamic Testing Techniques of
Non-functional Requirements in Mobile
Apps: a Systematic Mapping Study . . . . 214:1--214:??
Rob Churchill and
Lisa Singh The Evolution of Topic Modeling . . . . 215:1--215:??
Daniel Martin and
Sandra Malpica and
Diego Gutierrez and
Belen Masia and
Ana Serrano Multimodality in VR: a Survey . . . . . 216:1--216:??
Zhiheng Zhong and
Minxian Xu and
Maria Alejandra Rodriguez and
Chengzhong Xu and
Rajkumar Buyya Machine Learning-based Orchestration of
Containers: a Taxonomy and Future
Directions . . . . . . . . . . . . . . . 217:1--217:??
Farkhanda Zafar and
Hasan Ali Khattak and
Moayad Aloqaily and
Rasheed Hussain Carpooling in Connected and Autonomous
Vehicles: Current Solutions and Future
Directions . . . . . . . . . . . . . . . 218:1--218:??
Md Mahbub Alam and
Luis Torgo and
Albert Bifet A Survey on Spatio-temporal Data
Analytics Systems . . . . . . . . . . . 219:1--219:??
Zijun Li and
Linsong Guo and
Jiagan Cheng and
Quan Chen and
Bingsheng He and
Minyi Guo The Serverless Computing Survey: a
Technical Primer for Design Architecture 220:1--220:??
Peng Liu and
Lizhe Wang and
Rajiv Ranjan and
Guojin He and
Lei Zhao A Survey on Active Deep Learning: From
Model Driven to Data Driven . . . . . . 221:1--221:??
Anupama Mampage and
Shanika Karunasekera and
Rajkumar Buyya A Holistic View on Resource Management
in Serverless Computing Environments:
Taxonomy and Future Directions . . . . . 222:1--222:??
Pablo Sánchez and
Alejandro Bellogín Point-of-Interest Recommender Systems
Based on Location-Based Social Networks:
a Survey from an Experimental
Perspective . . . . . . . . . . . . . . 223:1--223:??
Paula Delgado-Santos and
Giuseppe Stragapede and
Ruben Tolosana and
Richard Guest and
Farzin Deravi and
Ruben Vera-Rodriguez A Survey of Privacy Vulnerabilities of
Mobile Device Sensors . . . . . . . . . 224:1--224:??
Hasini Witharana and
Yangdi Lyu and
Subodha Charles and
Prabhat Mishra A Survey on Assertion-based Hardware
Verification . . . . . . . . . . . . . . 225:1--225:??
Fabian Fagerholm and
Michael Felderer and
Davide Fucci and
Michael Unterkalmsteiner and
Bogdan Marculescu and
Markus Martini and
Lars Göran Wallgren Tengberg and
Robert Feldt and
Bettina Lehtelä and
Balázs Nagyváradi and
Jehan Khattak Cognition in Software Engineering: a
Taxonomy and Survey of a Half-Century of
Research . . . . . . . . . . . . . . . . 226:1--226:??
Wenhao Yu and
Chenguang Zhu and
Zaitang Li and
Zhiting Hu and
Qingyun Wang and
Heng Ji and
Meng Jiang A Survey of Knowledge-enhanced Text
Generation . . . . . . . . . . . . . . . 227:1--227:??
Harindu Korala and
Dimitrios Georgakopoulos and
Prem Prakash Jayaraman and
Ali Yavari A Survey of Techniques for Fulfilling
the Time-Bound Requirements of
Time-Sensitive IoT Applications . . . . 228:1--228:??
Hakan Kayan and
Matthew Nunes and
Omer Rana and
Pete Burnap and
Charith Perera Cybersecurity of Industrial
Cyber-Physical Systems: a Review . . . . 229:1--229:??
Xiaogang Zhu and
Sheng Wen and
Seyit Camtepe and
Yang Xiang Fuzzing: a Survey for Roadmap . . . . . 230:1--230:??
Jakub \vZádn\'ìk and
Markku Mäkitalo and
Jarno Vanne and
Pekka Jääskeläinen Image and Video Coding Techniques for
Ultra-low Latency . . . . . . . . . . . 231:1--231:??
Anirudh Chandramouli and
Ashish Choudhury and
Arpita Patra A Survey on Perfectly Secure Verifiable
Secret-sharing . . . . . . . . . . . . . 232:1--232:??
Bushra Jamil and
Humaira Ijaz and
Mohammad Shojafar and
Kashif Munir and
Rajkumar Buyya Resource Allocation and Task Scheduling
in Fog Computing and Internet of
Everything Environments: a Taxonomy,
Review, and Future Directions . . . . . 233:1--233:??
Ajay Mittal and
Sabrina Dhalla and
Savita Gupta and
Aastha Gupta Automated Analysis of Blood Smear Images
for Leukemia Detection: a Comprehensive
Review . . . . . . . . . . . . . . . . . 234:1--234:??
Hongsheng Hu and
Zoran Salcic and
Lichao Sun and
Gillian Dobbie and
Philip S. Yu and
Xuyun Zhang Membership Inference Attacks on Machine
Learning: a Survey . . . . . . . . . . . 235:1--235:??
Rajeev Muralidhar and
Renata Borovica-Gajic and
Rajkumar Buyya Energy Efficient Computing Systems:
Architectures, Abstractions and Modeling
to Techniques and Standards . . . . . . 236:1--236:??
Valeria Cardellini and
Francesco Lo Presti and
Matteo Nardelli and
Gabriele Russo Russo Runtime Adaptation of Data Stream
Processing Systems: The State of the Art 237:1--237:??
Harun Oz and
Ahmet Aris and
Albert Levi and
A. Selcuk Uluagac A Survey on Ransomware: Evolution,
Taxonomy, and Defense Solutions . . . . 238:1--238:??
Hossein Shafiei and
Ahmad Khonsari and
Payam Mousavi Serverless Computing: a Survey of
Opportunities, Challenges, and
Applications . . . . . . . . . . . . . . 239:1--239:??
Sabah Suhail and
Rasheed Hussain and
Raja Jurdak and
Alma Oracevic and
Khaled Salah and
Choong Seon Hong and
Raimundas Matulevi\vcius Blockchain-Based Digital Twins: Research
Trends, Issues, and Future Challenges 240:1--240:??
Matheus A. O. Ribeiro and
Fátima L. S. Nunes Left Ventricle Segmentation in Cardiac
MR: a Systematic Mapping of the Past
Decade . . . . . . . . . . . . . . . . . 241:1--241:??
Simone Antonelli and
Danilo Avola and
Luigi Cinque and
Donato Crisostomi and
Gian Luca Foresti and
Fabio Galasso and
Marco Raoul Marini and
Alessio Mecca and
Daniele Pannone Few-Shot Object Detection: a Survey . . 242:1--242:??
Shengmei Liu and
Xiaokun Xu and
Mark Claypool A Survey and Taxonomy of Latency
Compensation Techniques for Network
Computer Games . . . . . . . . . . . . . 243:1--243:??
Shuren Qi and
Yushu Zhang and
Chao Wang and
Jiantao Zhou and
Xiaochun Cao A Survey of Orthogonal Moments for Image
Representation: Theory, Implementation,
and Evaluation . . . . . . . . . . . . . 1:1--1:??
Kinza Sarwar and
Sira Yongchareon and
Jian Yu and
Saeed Ur Rehman A Survey on Privacy Preservation in
Fog-Enabled Internet of Things . . . . . 2:1--2:??
Fabrizio Cicala and
Weicheng Wang and
Tianhao Wang and
Ninghui Li and
Elisa Bertino and
Faming Liang and
Yang Yang PURE: a Framework for Analyzing
Proximity-based Contact Tracing
Protocols . . . . . . . . . . . . . . . 3:1--3:??
Rodolfo Meneguette and
Robson De Grande and
Jo Ueyama and
Geraldo P. Rocha Filho and
Edmundo Madeira Vehicular Edge Computing: Architecture,
Resource Management, Security, and
Challenges . . . . . . . . . . . . . . . 4:1--4:??
Chao Yu and
Jiming Liu and
Shamim Nemati and
Guosheng Yin Reinforcement Learning in Healthcare: a
Survey . . . . . . . . . . . . . . . . . 5:1--5:??
Fan Xu and
Victor S. Sheng and
Mingwen Wang A Unified Perspective for Disinformation
Detection and Truth Discovery in Social
Sensing: a Survey . . . . . . . . . . . 6:1--6:??
Massimiliano Luca and
Gianni Barlacchi and
Bruno Lepri and
Luca Pappalardo A Survey on Deep Learning for Human
Mobility . . . . . . . . . . . . . . . . 7:1--7:??
Gabriel Resende Machado and
Eugênio Silva and
Ronaldo Ribeiro Goldschmidt Adversarial Machine Learning in Image
Classification: a Survey Toward the
Defender's Perspective . . . . . . . . . 8:1--8:??
Abhishek Hazra and
Mainak Adhikari and
Tarachand Amgoth and
Satish Narayana Srirama A Comprehensive Survey on
Interoperability for IIoT: Taxonomy,
Standards, and Future Directions . . . . 9:1--9:??
Claudio D. T. Barros and
Matheus R. F. Mendonça and
Alex B. Vieira and
Artur Ziviani A Survey on Embedding Dynamic Graphs . . 10:1--10:??
Viktor Rosenfeld and
Sebastian Breß and
Volker Markl Query Processing on Heterogeneous
CPU/GPU Systems . . . . . . . . . . . . 11:1--11:??
Giannis Bekoulis and
Christina Papagiannopoulou and
Nikos Deligiannis A Review on Fact Extraction and
Verification . . . . . . . . . . . . . . 12:1--12:??
Junjun Jiang and
Chenyang Wang and
Xianming Liu and
Jiayi Ma Deep Learning-based Face
Super-resolution: a Survey . . . . . . . 13:1--13:??
Wenbo Ge and
Pooia Lalbakhsh and
Leigh Isai and
Artem Lenskiy and
Hanna Suominen Neural Network-Based Financial
Volatility Forecasting: a Systematic
Review . . . . . . . . . . . . . . . . . 14:1--14:??
Deqiang Li and
Qianmu Li and
Yanfang (Fanny) Ye and
Shouhuai Xu Arms Race in Adversarial Malware
Detection: a Survey . . . . . . . . . . 15:1--15:??
Roberto Amadini A Survey on String Constraint Solving 16:1--16:??
Christopher Brant and
Prakash Shrestha and
Benjamin Mixon-Baca and
Kejun Chen and
Said Varlioglu and
Nelly Elsayed and
Yier Jin and
Jedidiah Crandall and
Daniela Oliveira Challenges and Opportunities for
Practical and Effective Dynamic
Information Flow Tracking . . . . . . . 17:1--17:??
Alison Fernandez Blanco and
Alexandre Bergel and
Juan Pablo Sandoval Alcocer Software Visualizations to Analyze
Memory Consumption: a Literature Review 18:1--18:??
Saed Alrabaee and
Mourad Debbabi and
Lingyu Wang A Survey of Binary Code Fingerprinting
Approaches: Taxonomy, Methodologies, and
Features . . . . . . . . . . . . . . . . 19:1--19:??
Yupeng Hu and
Wenxin Kuang and
Zheng Qin and
Kenli Li and
Jiliang Zhang and
Yansong Gao and
Wenjia Li and
Keqin Li Artificial Intelligence Security:
Threats and Countermeasures . . . . . . 20:1--20:??
Alessio Rugo and
Claudio A. Ardagna and
Nabil El Ioini A Security Review in the UAVNet Era:
Threats, Countermeasures, and Gap
Analysis . . . . . . . . . . . . . . . . 21:1--21:??
Huacheng Li and
Chunhe Xia and
Tianbo Wang and
Sheng Wen and
Chao Chen and
Yang Xiang Capturing Dynamics of Information
Diffusion in SNS: a Survey of
Methodology and Techniques . . . . . . . 22:1--22:??
Thanh Tuan Nguyen and
Thanh Phuong Nguyen A Comprehensive Taxonomy of Dynamic
Texture Representation . . . . . . . . . 23:1--23:??
Federico Ciccozzi and
Lorenzo Addazi and
Sara Abbaspour Asadollah and
Björn Lisper and
Abu Naser Masud and
Saad Mubeen A Comprehensive Exploration of Languages
for Parallel Computing . . . . . . . . . 24:1--24:??
Zhao-Rong Lai and
Haisheng Yang A Survey on Gaps between Mean-Variance
Approach and Exponential Growth Rate
Approach for Portfolio Optimization . . 25:1--25:??
Ananya B. Sai and
Akash Kumar Mohankumar and
Mitesh M. Khapra A Survey of Evaluation Metrics Used for
NLG Systems . . . . . . . . . . . . . . 26:1--26:??
Manzoor Ahmed Khan and
Hesham El Sayed and
Sumbal Malik and
Talha Zia and
Jalal Khan and
Najla Alkaabi and
Henry Ignatious Level-5 Autonomous Driving-Are We There
Yet? A Review of Research Literature . . 27:1--27:??
Oluwamayowa Ade Adeleke and
Nicholas Bastin and
Deniz Gurkan Network Traffic Generation: a Survey and
Methodology . . . . . . . . . . . . . . 28:1--28:??
Breno Costa and
Joao Bachiega and
Leonardo Rebouças de Carvalho and
Aleteia P. F. Araujo Orchestration in Fog Computing: a
Comprehensive Survey . . . . . . . . . . 29:1--29:??
Nuha Aldausari and
Arcot Sowmya and
Nadine Marcus and
Gelareh Mohammadi Video Generative Adversarial Networks: a
Review . . . . . . . . . . . . . . . . . 30:1--30:??
Libing Deng and
Guoqi Xie and
Hong Liu and
Yunbo Han and
Renfa Li and
Keqin Li A Survey of Real-Time Ethernet Modeling
and Design Methodologies: From AVB to
TSN . . . . . . . . . . . . . . . . . . 31:1--31:??
Omar Hasan and
Lionel Brunie and
Elisa Bertino Privacy-Preserving Reputation Systems
Based on Blockchain and Other
Cryptographic Building Blocks: a Survey 32:1--32:??
Tabinda Sarwar and
Sattar Seifollahi and
Jeffrey Chan and
Xiuzhen Zhang and
Vural Aksakalli and
Irene Hudson and
Karin Verspoor and
Lawrence Cavedon The Secondary Use of Electronic Health
Records for Data Mining: Data
Characteristics and Challenges . . . . . 33:1--33:??
Claudio Filipi Gonçalves dos Santos and
Diego de Souza Oliveira and
Leandro A. Passos and
Rafael Gonçalves Pires and
Daniel Felipe Silva Santos and
Lucas Pascotti Valem and
Thierry P. Moreira and
Marcos Cleison S. Santana and
Mateus Roder and
Jo Paulo Papa and
Danilo Colombo Gait Recognition Based on Deep Learning:
a Survey . . . . . . . . . . . . . . . . 34:1--34:??
Qiao Jin and
Zheng Yuan and
Guangzhi Xiong and
Qianlan Yu and
Huaiyuan Ying and
Chuanqi Tan and
Mosha Chen and
Songfang Huang and
Xiaozhong Liu and
Sheng Yu Biomedical Question Answering: a Survey
of Approaches and Challenges . . . . . . 35:1--35:??
Yiqun Xie and
Shashi Shekhar and
Yan Li Statistically-Robust Clustering
Techniques for Mapping Spatial Hotspots:
a Survey . . . . . . . . . . . . . . . . 36:1--36:??
J. Alemany and
E. Del Val and
A. García-Fornes A Review of Privacy Decision-making
Mechanisms in Online Social Networks . . 37:1--37:??
Jingya Zhou and
Ling Liu and
Wenqi Wei and
Jianxi Fan Network Representation Learning: From
Preprocessing, Feature Extraction to
Node Embedding . . . . . . . . . . . . . 38:1--38:??
Davinder Kaur and
Suleyman Uslu and
Kaley J. Rittichier and
Arjan Durresi Trustworthy Artificial Intelligence: a
Review . . . . . . . . . . . . . . . . . 39:1--39:??
Conor Fahy and
Shengxiang Yang and
Mario Gongora Scarcity of Labels in Non-Stationary
Data Streams: a Survey . . . . . . . . . 40:1--40:??
José Marcelo Fernandes and
Jorge Sá Silva and
André Rodrigues and
Fernando Boavida A Survey of Approaches to Unobtrusive
Sensing of Humans . . . . . . . . . . . 41:1--41:??
David Rolnick and
Priya L. Donti and
Lynn H. Kaack and
Kelly Kochanski and
Alexandre Lacoste and
Kris Sankaran and
Andrew Slavin Ross and
Nikola Milojevic-Dupont and
Natasha Jaques and
Anna Waldman-Brown and
Alexandra Sasha Luccioni and
Tegan Maharaj and
Evan D. Sherwin and
S. Karthik Mukkavilli and
Konrad P. Kording and
Carla P. Gomes and
Andrew Y. Ng and
Demis Hassabis and
John C. Platt and
Felix Creutzig and
Jennifer Chayes and
Yoshua Bengio Tackling Climate Change with Machine
Learning . . . . . . . . . . . . . . . . 42:1--42:??
Shallu Sharma and
Pravat Kumar Mandal A Comprehensive Report on Machine
Learning-based Early Detection of
Alzheimer's Disease using Multi-modal
Neuroimaging Data . . . . . . . . . . . 43:1--43:??
Ankur O. Bang and
Udai Pratap Rao and
Pallavi Kaliyar and
Mauro Conti Assessment of Routing Attacks and
Mitigation Techniques with RPL Control
Messages: a Survey . . . . . . . . . . . 44:1--44:??
Sanjay Kumar Anand and
Suresh Kumar Experimental Comparisons of Clustering
Approaches for Data Representation . . . 45:1--45:??
Tasniem Nasser Alyahya and
Mohamed El Bachir Menai and
Hassan Mathkour On the Structure of the Boolean
Satisfiability Problem: a Survey . . . . 46:1--46:??
Marcos Roberto e Souza and
Helena de Almeida Maia and
Helio Pedrini Survey on Digital Video Stabilization:
Concepts, Methods, and Challenges . . . 47:1--47:??
Tukaram Muske and
Alexander Serebrenik Survey of Approaches for Postprocessing
of Static Analysis Alarms . . . . . . . 48:1--48:??
Danula Hettiachchi and
Vassilis Kostakos and
Jorge Goncalves A Survey on Task Assignment in
Crowdsourcing . . . . . . . . . . . . . 49:1--49:??
Raj Mohan Singh and
Lalit Kumar Awasthi and
Geeta Sikka Towards Metaheuristic Scheduling
Techniques in Cloud and Fog: an
Extensive Taxonomic Review . . . . . . . 50:1--50:??
Dana Pessach and
Erez Shmueli A Review on Fairness in Machine Learning 51:1--51:??
Chenning Li and
Zhichao Cao LoRa Networking Techniques for
Large-scale and Long-term IoT: a
Down-to-top Survey . . . . . . . . . . . 52:1--52:??
Alexander Plopski and
Teresa Hirzle and
Nahal Norouzi and
Long Qian and
Gerd Bruder and
Tobias Langlotz The Eye in Extended Reality: a Survey on
Gaze Interaction and Eye Tracking in
Head-worn Extended Reality . . . . . . . 53:1--53:??
Nan Wu and
Yuan Xie A Survey of Machine Learning for
Computer Architecture and Systems . . . 54:1--54:??
Thomas Reisinger and
Isabel Wagner and
Eerke Albert Boiten Security and Privacy in Unified
Communication . . . . . . . . . . . . . 55:1--55:??
Ruiqi Li and
Xiang Zhao and
Marie-Francine Moens A Brief Overview of Universal Sentence
Representation Methods: a Linguistic
View . . . . . . . . . . . . . . . . . . 56:1--56:??
Huan Li and
Hua Lu and
Christian S. Jensen and
Bo Tang and
Muhammad Aamir Cheema Spatial Data Quality in the Internet of
Things: Management, Exploitation, and
Prospects . . . . . . . . . . . . . . . 57:1--57:??
Dina G. Mahmoud and
Vincent Lenders and
Mirjana Stojilovi\'c Electrical-Level Attacks on CPUs, FPGAs,
and GPUs: Survey and Implications in the
Heterogeneous Era . . . . . . . . . . . 58:1--58:??
Jacopo Soldani and
Antonio Brogi Anomaly Detection and Failure Root Cause
Analysis in (Micro) Service-Based Cloud
Applications: a Survey . . . . . . . . . 59:1--59:??
Dinh C. Nguyen and
Quoc-Viet Pham and
Pubudu N. Pathirana and
Ming Ding and
Aruna Seneviratne and
Zihuai Lin and
Octavia Dobre and
Won-Joo Hwang Federated Learning for Smart Healthcare:
a Survey . . . . . . . . . . . . . . . . 60:1--60:??
Anna Berenberg and
Brad Calder Deployment Archetypes for Cloud
Applications . . . . . . . . . . . . . . 61:1--61:??
Voica Gavrilut and
Aleksander Pruski and
Michael Stübert Berger Constructive or Optimized: an Overview
of Strategies to Design Networks for
Time-Critical Applications . . . . . . . 62:1--62:??
Susanne Barth and
Dan Ionita and
Pieter Hartel Understanding Online Privacy --- a
Systematic Review of Privacy
Visualizations and Privacy by Design
Guidelines . . . . . . . . . . . . . . . 63:1--63:??
Longbing Cao AI in Finance: Challenges, Techniques,
and Opportunities . . . . . . . . . . . 64:1--64:??
Gianni Brauwers and
Flavius Frasincar A Survey on Aspect-Based Sentiment
Classification . . . . . . . . . . . . . 65:1--65:??
Jared Willard and
Xiaowei Jia and
Shaoming Xu and
Michael Steinbach and
Vipin Kumar Integrating Scientific Knowledge with
Machine Learning for Engineering and
Environmental Systems . . . . . . . . . 66:1--66:??
Daniel S. Santos and
Brauner R. N. Oliveira and
Rick Kazman and
Elisa Y. Nakagawa Evaluation of Systems-of-Systems
Software Architectures: State of the Art
and Future Perspectives . . . . . . . . 67:1--67:??
Thiago L. T. da Silveira and
Paulo G. L. Pinto and
Jeffri Murrugarra-Llerena and
Cláudio R. Jung $3$D Scene Geometry Estimation from
360${}^\circ $ Imagery: a Survey . . . . 68:1--68:??
Alessio Ferrari and
Maurice H. Ter Beek Formal Methods in Railways: a Systematic
Mapping Study . . . . . . . . . . . . . 69:1--69:??
Youyang Qu and
Md Palash Uddin and
Chenquan Gan and
Yong Xiang and
Longxiang Gao and
John Yearwood Blockchain-enabled Federated Learning: a
Survey . . . . . . . . . . . . . . . . . 70:1--70:??
Marios Evangelos Kanakis and
Ramin Khalili and
Lin Wang Machine Learning for Computer Systems
and Networking: a Survey . . . . . . . . 71:1--71:??
Javier Troya and
Sergio Segura and
Lola Burgueño and
Manuel Wimmer Model Transformation Testing and
Debugging: a Survey . . . . . . . . . . 72:1--72:??
Arif Husen and
Muhammad Hasanain Chaudary and
Farooq Ahmad A Survey on Requirements of Future
Intelligent Networks: Solutions and
Future Research Directions . . . . . . . 73:1--73:??
Yingan Cui and
Xue Li and
Junhuai Li and
Huaijun Wang and
Xiaogang Chen A Survey of Sampling Method for Social
Media Embeddedness Relationship . . . . 74:1--74:??
Heitor Murilo Gomes and
Maciej Grzenda and
Rodrigo Mello and
Jesse Read and
Minh Huong Le Nguyen and
Albert Bifet A Survey on Semi-supervised Learning for
Delayed Partially Labelled Data Streams 75:1--75:??
Shouyong Jiang and
Juan Zou and
Shengxiang Yang and
Xin Yao Evolutionary Dynamic Multi-objective
Optimisation: a Survey . . . . . . . . . 76:1--76:??
Rabindra Lamsal and
Aaron Harwood and
Maria Rodriguez Read Socially Enhanced Situation Awareness
from Microblogs Using Artificial
Intelligence: a Survey . . . . . . . . . 77:1--77:??
Krishna Teja Chitty-Venkata and
Arun K. Somani Neural Architecture Search Survey: a
Hardware Perspective . . . . . . . . . . 78:1--78:??
Xiang Li and
Yazhou Zhang and
Prayag Tiwari and
Dawei Song and
Bin Hu and
Meihong Yang and
Zhigang Zhao and
Neeraj Kumar and
Pekka Marttinen EEG Based Emotion Recognition: a
Tutorial and Review . . . . . . . . . . 79:1--79:??
Wu Liu and
Qian Bao and
Yu Sun and
Tao Mei Recent Advances of Monocular $2$D and
$3$D Human Pose Estimation: a Deep
Learning Perspective . . . . . . . . . . 80:1--80:??
Zhaoxin Fan and
Yazhi Zhu and
Yulin He and
Qi Sun and
Hongyan Liu and
Jun He Deep Learning on Monocular Object Pose
Detection and Tracking: a Comprehensive
Overview . . . . . . . . . . . . . . . . 81:1--81:??
Matthew J. Vowels and
Necati Cihan Camgoz and
Richard Bowden D'ya Like DAGs? A Survey on Structure
Learning and Causal Discovery . . . . . 82:1--82:??
Giorgos Armeniakos and
Georgios Zervakis and
Dimitrios Soudris and
Jörg Henkel Hardware Approximate Techniques for Deep
Neural Network Accelerators: a Survey 83:1--83:??
Chen Yan and
Xiaoyu Ji and
Kai Wang and
Qinhong Jiang and
Zizhi Jin and
Wenyuan Xu A Survey on Voice Assistant Security:
Attacks and Countermeasures . . . . . . 84:1--84:??
Elena Almaraz Luengo Gamma Pseudo Random Number Generators 85:1--85:33
Anubhab Baksi and
Shivam Bhasin and
Jakub Breier and
Dirmanto Jap and
Dhiman Saha A Survey on Fault Attacks on Symmetric
Key Cryptosystems . . . . . . . . . . . 86:1--86:??
Kalia Orphanou and
Jahna Otterbacher and
Styliani Kleanthous and
Khuyagbaatar Batsuren and
Fausto Giunchiglia and
Veronika Bogina and
Avital Shulner Tal and
Alan Hartman and
Tsvi Kuflik Mitigating Bias in Algorithmic Systems
--- a Fish-eye View . . . . . . . . . . 87:1--87:??
Jiang Xiao and
Huichuwu Li and
Minrui Wu and
Hai Jin and
M. Jamal Deen and
Jiannong Cao A Survey on Wireless Device-free Human
Sensing: Application Scenarios, Current
Solutions, and Open Issues . . . . . . . 88:1--88:??
Yuan He and
Xiuzhen Guo and
Xiaolong Zheng and
Zihao Yu and
Jia Zhang and
Haotian Jiang and
Xin Na and
Jiacheng Zhang Cross-Technology Communication for the
Internet of Things: a Survey . . . . . . 89:1--89:??
Yoshitomo Matsubara and
Marco Levorato and
Francesco Restuccia Split Computing and Early Exiting for
Deep Learning Applications: Survey and
Research Challenges . . . . . . . . . . 90:1--90:??
Quim Motger and
Xavier Franch and
Jordi Marco Software-Based Dialogue Systems: Survey,
Taxonomy, and Challenges . . . . . . . . 91:1--91:??
George A. Vouros Explainable Deep Reinforcement Learning:
State of the Art and Challenges . . . . 92:1--92:??
Bushra Alhijawi and
Arafat Awajan and
Salam Fraihat Survey on the Objectives of Recommender
Systems: Measures, Solutions, Evaluation
Methodology, and New Perspectives . . . 93:1--93:??
Amina Kammoun and
Rim Slama and
Hedi Tabia and
Tarek Ouni and
Mohmed Abid Generative Adversarial Networks for Face
Generation: a Survey . . . . . . . . . . 94:1--94:??
Amir-Hossein Karimi and
Gilles Barthe and
Bernhard Schölkopf and
Isabel Valera A Survey of Algorithmic Recourse:
Contrastive Explanations and
Consequential Recommendations . . . . . 95:1--95:??
Manal Alamir and
Manal Alghamdi The Role of Generative Adversarial
Network in Medical Image Analysis: an
In-depth Survey . . . . . . . . . . . . 96:1--96:??
Shiwen Wu and
Fei Sun and
Wentao Zhang and
Xu Xie and
Bin Cui Graph Neural Networks in Recommender
Systems: a Survey . . . . . . . . . . . 97:1--97:??
Fabio Valerio Massoli and
Lucia Vadicamo and
Giuseppe Amato and
Fabrizio Falchi A Leap among Quantum Computing and
Quantum Neural Networks: a Survey . . . 98:1--98:??
Pedro Cruz and
Nadjib Achir and
Aline Carneiro Viana On the Edge of the Deployment: a Survey
on Multi-access Edge Computing . . . . . 99:1--99:??
Triet H. M. Le and
Huaming Chen and
M. Ali Babar A Survey on Data-driven Software
Vulnerability Assessment and
Prioritization . . . . . . . . . . . . . 100:1--100:??
Darren Yates and
Md Zahidul Islam Data Mining on Smartphones: an
Introduction and Survey . . . . . . . . 101:1--101:??
Congbo Ma and
Wei Emma Zhang and
Mingyu Guo and
Hu Wang and
Quan Z. Sheng Multi-document Summarization via Deep
Learning Techniques: a Survey . . . . . 102:1--102:??
Julia El Zini and
Mariette Awad On the Explainability of Natural
Language Processing Deep Models . . . . 103:1--103:??
Hansoo Lee and
Joonyoung Park and
Uichin Lee A Systematic Survey on Android API Usage
for Data-driven Analytics with
Smartphones . . . . . . . . . . . . . . 104:1--104:??
Zhiyan Chen and
Jinxin Liu and
Yu Shen and
Murat Simsek and
Burak Kantarci and
Hussein T. Mouftah and
Petar Djukic Machine Learning-Enabled IoT Security:
Open Issues and Challenges Under
Advanced Persistent Threats . . . . . . 105:1--105:??
Emanuele Del Sozzo and
Davide Conficconi and
Alberto Zeni and
Mirko Salaris and
Donatella Sciuto and
Marco D. Santambrogio Pushing the Level of Abstraction of
Digital System Design: a Survey on How
to Program FPGAs . . . . . . . . . . . . 106:1--106:??
Hooman Alavizadeh and
Julian Jang-Jaccard and
Simon Yusuf Enoch and
Harith Al-Sahaf and
Ian Welch and
Seyit A. Camtepe and
Dan Dongseong Kim A Survey on Cyber Situation-awareness
Systems: Framework, Techniques, and
Insights . . . . . . . . . . . . . . . . 107:1--107:??
Trivikram Muralidharan and
Aviad Cohen and
Noa Gerson and
Nir Nissim File Packing from the Malware
Perspective: Techniques, Analysis
Approaches, and Directions for
Enhancements . . . . . . . . . . . . . . 108:1--108:??
Yi Tay and
Mostafa Dehghani and
Dara Bahri and
Donald Metzler Efficient Transformers: a Survey . . . . 109:1--109:??
Mahdi Fahmideh and
John Grundy and
Aakash Ahmad and
Jun Shen and
Jun Yan and
Davoud Mougouei and
Peng Wang and
Aditya Ghose and
Anuradha Gunawardana and
Uwe Aickelin and
Babak Abedin Engineering Blockchain-based Software
Systems: Foundations, Survey, and Future
Directions . . . . . . . . . . . . . . . 110:1--110:??
Binglei Guo and
Jiong Yu and
Dexian Yang and
Hongyong Leng and
Bin Liao Energy-Efficient Database Systems: a
Systematic Survey . . . . . . . . . . . 111:1--111:??
Shanto Roy and
Nazia Sharmin and
Jaime C. Acosta and
Christopher Kiekintveld and
Aron Laszka Survey and Taxonomy of Adversarial
Reconnaissance Techniques . . . . . . . 112:1--112:??
Dan Xia and
Chun Jiang and
Jiafu Wan and
Jiong Jin and
Victor C. M. Leung and
Miguel Martínez-García Heterogeneous Network Access and Fusion
in Smart Factory: a Survey . . . . . . . 113:1--113:??
Andrei Paleyes and
Raoul-Gabriel Urma and
Neil D. Lawrence Challenges in Deploying Machine
Learning: a Survey of Case Studies . . . 114:1--114:??
Guilherme Gonçalves and
Hugo Coelho and
Pedro Monteiro and
Miguel Melo and
Maximino Bessa Systematic Review of Comparative Studies
of the Impact of Realism in Immersive
Virtual Experiences . . . . . . . . . . 115:1--115:??
Alexander Schäfer and
Gerd Reis and
Didier Stricker A Survey on Synchronous Augmented,
Virtual, and Mixed Reality Remote
Collaboration Systems . . . . . . . . . 116:1--116:??
Meike Zehlike and
Ke Yang and
Julia Stoyanovich Fairness in Ranking, Part II:
Learning-to-Rank and Recommender Systems 117:1--117:??
Meike Zehlike and
Ke Yang and
Julia Stoyanovich Fairness in Ranking, Part I: Score-Based
Ranking . . . . . . . . . . . . . . . . 118:1--118:??
Hakan Erdogmus Bayesian Hypothesis Testing Illustrated:
an Introduction for Software Engineering
Researchers . . . . . . . . . . . . . . 119:1--119:??
Luke K. Topham and
Wasiq Khan and
Dhiya Al-Jumeily and
Abir Hussain Human Body Pose Estimation for Gait
Identification: a Comprehensive Survey
of Datasets and Models . . . . . . . . . 120:1--120:??
Konstantinos Benidis and
Syama Sundar Rangapuram and
Valentin Flunkert and
Yuyang Wang and
Danielle Maddix and
Caner Turkmen and
Jan Gasthaus and
Michael Bohlke-Schneider and
David Salinas and
Lorenzo Stella and
François-Xavier Aubet and
Laurent Callot and
Tim Januschowski Deep Learning for Time Series
Forecasting: Tutorial and Literature
Survey . . . . . . . . . . . . . . . . . 121:1--121:??
Jongkil Jay Jeong and
Yevhen Zolotavkin and
Robin Doss Examining the Current Status and
Emerging Trends in Continuous
Authentication Technologies through
Citation Network Analysis . . . . . . . 122:1--122:??
Simon Parkinson and
Saad Khan A Survey on Empirical Security Analysis
of Access-control Systems: a Real-world
Perspective . . . . . . . . . . . . . . 123:1--123:??
Samuel Jero and
Nathan Burow and
Bryan Ward and
Richard Skowyra and
Roger Khazan and
Howard Shrobe and
Hamed Okhravi TAG: Tagged Architecture Guide . . . . . 124:1--124:??
Rodrigo Branco and
Ben Lee Cache-related Hardware Capabilities and
Their Impact on Information Security . . 125:1--125:??
Temitayo Olugbade and
Marta Bie\'nkiewicz and
Giulia Barbareschi and
Vincenzo D'amato and
Luca Oneto and
Antonio Camurri and
Catherine Holloway and
Mårten Björkman and
Peter Keller and
Martin Clayton and
Amanda C. De C. Williams and
Nicolas Gold and
Cristina Becchio and
Beno\^\it Bardy and
Nadia Bianchi-Berthouze Human Movement Datasets: an
Interdisciplinary Scoping Review . . . . 126:1--126:??
Johan Arcile and
Étienne André Timed Automata as a Formalism for
Expressing Security: a Survey on Theory
and Practice . . . . . . . . . . . . . . 127:1--127:??
Lu Chen and
Yunjun Gao and
Xuan Song and
Zheng Li and
Yifan Zhu and
Xiaoye Miao and
Christian S. Jensen Indexing Metric Spaces for Exact
Similarity Search . . . . . . . . . . . 128:1--128:??
Kimiya Keyvan and
Jimmy Xiangji Huang How to Approach Ambiguous Queries in
Conversational Search: a Survey of
Techniques, Approaches, Tools, and
Challenges . . . . . . . . . . . . . . . 129:1--129:??
Denis Kleyko and
Dmitri A. Rachkovskij and
Evgeny Osipov and
Abbas Rahimi A Survey on Hyperdimensional Computing
aka Vector Symbolic Architectures, Part
I: Models and Data Transformations . . . 130:1--130:??
Lucas H. Sallaberry and
Romero Tori and
Fátima L. S. Nunes Automatic Performance Assessment in
Three-dimensional Interactive Haptic
Medical Simulators: a Systematic Review 131:1--131:??
Siva Uday Sampreeth Chebolu and
Paolo Rosso and
Sudipta Kar and
Thamar Solorio Survey on Aspect Category Detection . . 132:1--132:??
Deepak Adhikari and
Wei Jiang and
Jinyu Zhan and
Zhiyuan He and
Danda B. Rawat and
Uwe Aickelin and
Hadi A. Khorshidi A Comprehensive Survey on Imputation of
Missing Data in Internet of Things . . . 133:1--133:??
Zhibo Wang and
Jingjing Ma and
Xue Wang and
Jiahui Hu and
Zhan Qin and
Kui Ren Threats to Training: a Survey of
Poisoning Attacks and Defenses on
Machine Learning Systems . . . . . . . . 134:1--134:??
Michael Zipperle and
Florian Gottwalt and
Elizabeth Chang and
Tharam Dillon Provenance-based Intrusion Detection
Systems: a Survey . . . . . . . . . . . 135:1--135:??
Rong Han and
Zheng Yan and
Xueqin Liang and
Laurence T. Yang How Can Incentive Mechanisms and
Blockchain Benefit with Each Other? A
Survey . . . . . . . . . . . . . . . . . 136:1--136:??
Joobeom Yun and
Fayozbek Rustamov and
Juhwan Kim and
Youngjoo Shin Fuzzing of Embedded Systems: a Survey 137:1--137:??
Carmen Carrión Kubernetes Scheduling: Taxonomy, Ongoing
Issues and Challenges . . . . . . . . . 138:1--138:??
Ahmed Benmoussa and
Chaker Abdelaziz Kerrache and
Nasreddine Lagraa and
Spyridon Mastorakis and
Abderrahmane Lakas and
Abdou El Karim Tahari Interest Flooding Attacks in Named Data
Networking: Survey of Existing
Solutions, Open Issues, Requirements,
and Future Directions . . . . . . . . . 139:1--139:??
Andreas L. Opdahl and
Tareq Al-Moslmi and
Duc-Tien Dang-Nguyen and
Marc Gallofré Ocaña and
Bjòrnar Tessem and
Csaba Veres Semantic Knowledge Graphs for the News:
a Review . . . . . . . . . . . . . . . . 140:1--140:??
Yudong Tao and
Chuang Yang and
Tianyi Wang and
Erik Coltey and
Yanxiu Jin and
Yinghao Liu and
Renhe Jiang and
Zipei Fan and
Xuan Song and
Ryosuke Shibasaki and
Shu-Ching Chen and
Mei-Ling Shyu and
Steven Luis A Survey on Data-driven COVID-19 and
Future Pandemic Management . . . . . . . 141:1--141:??
Hoda Naghibijouybari and
Esmaeil Mohammadian Koruyeh and
Nael Abu-Ghazaleh Microarchitectural Attacks in
Heterogeneous Systems: a Survey . . . . 142:1--142:??
Zhanna Sarsenbayeva and
Niels Van Berkel and
Eduardo Velloso and
Jorge Goncalves and
Vassilis Kostakos Methodological Standards in
Accessibility Research on Motor
Impairments: a Survey . . . . . . . . . 143:1--143:??
Samuel Idowu and
Daniel Strüber and
Thorsten Berger Asset Management in Machine Learning:
State-of-research and State-of-practice 144:1--144:??
M. Mehdi Afsar and
Trafford Crump and
Behrouz Far Reinforcement Learning based Recommender
Systems: a Survey . . . . . . . . . . . 145:1--145:??
Markus Bayer and
Marc-André Kaufhold and
Christian Reuter A Survey on Data Augmentation for Text
Classification . . . . . . . . . . . . . 146:1--146:??
Jon Perez-Cerrolaza and
Jaume Abella and
Leonidas Kosmidis and
Alejandro J. Calderon and
Francisco Cazorla and
Jose Luis Flores GPU Devices for Safety-Critical Systems:
a Survey . . . . . . . . . . . . . . . . 147:1--147:??
Tung Minh Tran and
Tu N. Vu and
Nguyen D. Vo and
Tam V. Nguyen and
Khang Nguyen Anomaly Analysis in Images and Videos: a
Comprehensive Review . . . . . . . . . . 148:1--148:??
Li Liu and
Fanzhang Li A Survey on Dynamic Fuzzy Machine
Learning . . . . . . . . . . . . . . . . 149:1--149:??
William C. Sleeman and
Rishabh Kapoor and
Preetam Ghosh Multimodal Classification: Current
Landscape, Taxonomy and Future
Directions . . . . . . . . . . . . . . . 150:1--150:??
Zeineb Rejiba and
Javad Chamanara Custom Scheduling in Kubernetes: a
Survey on Common Problems and Solution
Approaches . . . . . . . . . . . . . . . 151:1--151:??
Mohammad Goudarzi and
Marimuthu Palaniswami and
Rajkumar Buyya Scheduling IoT Applications in Edge and
Fog Computing Environments: a Taxonomy
and Future Directions . . . . . . . . . 152:1--152:??
Yue Liu and
Chakkrit Tantithamthavorn and
Li Li and
Yepang Liu Deep Learning for Android Malware
Defenses: a Systematic Literature Review 153:1--153:??
Huan Yee Koh and
Jiaxin Ju and
Ming Liu and
Shirui Pan An Empirical Survey on Long Document
Summarization: Datasets, Models, and
Metrics . . . . . . . . . . . . . . . . 154:1--154:??
Andreas Madsen and
Siva Reddy and
Sarath Chandar Post-hoc Interpretability for Neural
NLP: a Survey . . . . . . . . . . . . . 155:1--155:??
Henry Weld and
Xiaoqi Huang and
Siqu Long and
Josiah Poon and
Soyeon Caren Han A Survey of Joint Intent Detection and
Slot Filling Models in Natural Language
Understanding . . . . . . . . . . . . . 156:1--156:??
Sina Mohseni and
Haotao Wang and
Chaowei Xiao and
Zhiding Yu and
Zhangyang Wang and
Jay Yadawa Taxonomy of Machine Learning Safety: a
Survey and Primer . . . . . . . . . . . 157:1--157:??
Nishan Gunawardena and
Jeewani Anupama Ginige and
Bahman Javadi Eye-tracking Technologies in Mobile
Devices Using Edge Computing: a
Systematic Review . . . . . . . . . . . 158:1--158:??
Tariq Abdullah and
Ahmed Ahmet Deep Learning in Sentiment Analysis:
Recent Architectures . . . . . . . . . . 159:1--159:??
Alberto Blanco-Justicia and
David Sánchez and
Josep Domingo-Ferrer and
Krishnamurty Muralidhar A Critical Review on the Use (and
Misuse) of Differential Privacy in
Machine Learning . . . . . . . . . . . . 160:1--160:??
Chi Liu and
Tianqing Zhu and
Jun Zhang and
Wanlei Zhou Privacy Intelligence: a Survey on Image
Privacy in Online Social Networks . . . 161:1--161:??
Minzhao Lyu and
Hassan Habibi Gharakheili and
Vijay Sivaraman A Survey on DNS Encryption: Current
Development, Malware Misuse, and
Inference Techniques . . . . . . . . . . 162:1--162:??
Shuai Zhou and
Chi Liu and
Dayong Ye and
Tianqing Zhu and
Wanlei Zhou and
Philip S. Yu Adversarial Attacks and Defenses in Deep
Learning: From a Perspective of
Cybersecurity . . . . . . . . . . . . . 163:1--163:??
Manuel A. Serrano and
José A. Cruz-Lemus and
Ricardo Perez-Castillo and
Mario Piattini Quantum Software Components and
Platforms: Overview and Quality
Assessment . . . . . . . . . . . . . . . 164:1--164:??
Divya Velayudhan and
Taimur Hassan and
Ernesto Damiani and
Naoufel Werghi Recent Advances in Baggage Threat
Detection: a Comprehensive and
Systematic Survey . . . . . . . . . . . 165:1--165:??
Zhiyi Tian and
Lei Cui and
Jie Liang and
Shui Yu A Comprehensive Survey on Poisoning
Attacks and Countermeasures in Machine
Learning . . . . . . . . . . . . . . . . 166:1--166:??
Michael P. Heinl and
Simon Gölz and
Christoph Bösch Remote Electronic Voting in Uncontrolled
Environments: a Classifying Survey . . . 167:1--167:??
Sarah Roscoe and
Minal Khatri and
Adam Voshall and
Surinder Batra and
Sukhwinder Kaur and
Jitender Deogun Formal Concept Analysis Applications in
Bioinformatics . . . . . . . . . . . . . 168:1--168:??
Nilesh Chakraborty and
Jianqiang Li and
Victor C. M. Leung and
Samrat Mondal and
Yi Pan and
Chengwen Luo and
Mithun Mukherjee Honeyword-based Authentication
Techniques for Protecting Passwords: a
Survey . . . . . . . . . . . . . . . . . 169:1--169:??
Eva Zangerle and
Christine Bauer Evaluating Recommender Systems: Survey
and Framework . . . . . . . . . . . . . 170:1--170:??
André Lu\'ìs Barroso Almeida and
Joubert de Castro Lima and
Marco Antonio M. Carvalho Systematic Literature Review on Parallel
Trajectory-based Metaheuristics . . . . 171:1--171:??
Tianbao Yang and
Yiming Ying AUC Maximization in the Era of Big Data
and AI: a Survey . . . . . . . . . . . . 172:1--172:??
Chenhe Dong and
Yinghui Li and
Haifan Gong and
Miaoxin Chen and
Junxin Li and
Ying Shen and
Min Yang A Survey of Natural Language Generation 173:1--173:??
Linghe Kong and
Jinlin Tan and
Junqin Huang and
Guihai Chen and
Shuaitian Wang and
Xi Jin and
Peng Zeng and
Muhammad Khan and
Sajal K. Das Edge-computing-driven Internet of
Things: a Survey . . . . . . . . . . . . 174:1--174:??
Denis Kleyko and
Dmitri Rachkovskij and
Evgeny Osipov and
Abbas Rahimi A Survey on Hyperdimensional Computing
aka Vector Symbolic Architectures, Part
II: Applications, Cognitive Models, and
Challenges . . . . . . . . . . . . . . . 175:1--175:??
Daniel McDuff Camera Measurement of Physiological
Vital Signs . . . . . . . . . . . . . . 176:1--176:??
Bo Li and
Peng Qi and
Bo Liu and
Shuai Di and
Jingen Liu and
Jiquan Pei and
Jinfeng Yi and
Bowen Zhou Trustworthy AI: From Principles to
Practices . . . . . . . . . . . . . . . 177:1--177:??
Luca Benedetto and
Paolo Cremonesi and
Andrew Caines and
Paula Buttery and
Andrea Cappelli and
Andrea Giussani and
Roberto Turrin A Survey on Recent Approaches to
Question Difficulty Estimation from Text 178:1--178:??
Kai North and
Marcos Zampieri and
Matthew Shardlow Lexical Complexity Prediction: an
Overview . . . . . . . . . . . . . . . . 179:1--179:??
Nandita Pattnaik and
Shujun Li and
Jason R. C. Nurse A Survey of User Perspectives on
Security and Privacy in a Home
Networking Environment . . . . . . . . . 180:1--180:??
Eun Hee Park and
Veda C. Storey Emotion Ontology Studies: a Framework
for Expressing Feelings Digitally and
its Application to Sentiment Analysis 181:1--181:??
Lidia Fotia and
Flávia Delicato and
Giancarlo Fortino Trust in Edge-based Internet of Things
Architectures: State of the Art and
Research Challenges . . . . . . . . . . 182:1--182:??
Ron Bitton and
Nadav Maman and
Inderjeet Singh and
Satoru Momiyama and
Yuval Elovici and
Asaf Shabtai Evaluating the Cybersecurity Risk of
Real-world, Machine Learning Production
Systems . . . . . . . . . . . . . . . . 183:1--183:??
Haochen Hua and
Yutong Li and
Tonghe Wang and
Nanqing Dong and
Wei Li and
Junwei Cao Edge Computing with Artificial
Intelligence: a Machine Learning
Perspective . . . . . . . . . . . . . . 184:1--184:??
Takahito Yoshizawa and
Dave Singelée and
Jan Tobias Muehlberg and
Stephane Delbruel and
Amir Taherkordi and
Danny Hughes and
Bart Preneel A Survey of Security and Privacy Issues
in V2X Communication Systems . . . . . . 185:1--185:??
Athanasios Liatifis and
Panagiotis Sarigiannidis and
Vasileios Argyriou and
Thomas Lagkas Advancing SDN from OpenFlow to P4: a
Survey . . . . . . . . . . . . . . . . . 186:1--186:??
Janaka Senanayake and
Harsha Kalutarage and
Mhd Omar Al-Kadri and
Andrei Petrovski and
Luca Piras Android Source Code Vulnerability
Detection: a Systematic Literature
Review . . . . . . . . . . . . . . . . . 187:1--187:??
Meng Liu and
Liqiang Nie and
Yunxiao Wang and
Meng Wang and
Yong Rui A Survey on Video Moment Localization 188:1--188:??
Jacky Cao and
Kit-Yung Lam and
Lik-Hang Lee and
Xiaoli Liu and
Pan Hui and
Xiang Su Mobile Augmented Reality: User
Interfaces, Frameworks, and Intelligence 189:1--189:??
Junsik Sim and
Beomjoong Kim and
Kiseok Jeon and
Moonho Joo and
Jihun Lim and
Junghee Lee and
Kim-Kwang Raymond Choo Technical Requirements and Approaches in
Personal Data Control . . . . . . . . . 190:1--190:??
Wael Issa and
Nour Moustafa and
Benjamin Turnbull and
Nasrin Sohrabi and
Zahir Tari Blockchain-Based Federated Learning for
Securing Internet of Things: a
Comprehensive Survey . . . . . . . . . . 191:1--191:??
Hussain Ahmad and
Isuru Dharmadasa and
Faheem Ullah and
Muhammad Ali Babar A Review on C3I Systems' Security:
Vulnerabilities, Attacks, and
Countermeasures . . . . . . . . . . . . 192:1--192:??
Junhai Luo and
Zhiyan Wang and
Ming Xia and
Linyong Wu and
Yuxin Tian and
Yu Chen Path Planning for UAV Communication
Networks: Related Technologies,
Solutions, and Opportunities . . . . . . 193:1--193:??
Rudresh Dwivedi and
Devam Dave and
Het Naik and
Smiti Singhal and
Rana Omer and
Pankesh Patel and
Bin Qian and
Zhenyu Wen and
Tejal Shah and
Graham Morgan and
Rajiv Ranjan Explainable AI (XAI): Core Ideas,
Techniques, and Solutions . . . . . . . 194:1--194:??
Pengfei Liu and
Weizhe Yuan and
Jinlan Fu and
Zhengbao Jiang and
Hiroaki Hayashi and
Graham Neubig Pre-train, Prompt, and Predict: a
Systematic Survey of Prompting Methods
in Natural Language Processing . . . . . 195:1--195:??
Ping Wang and
Haichang Gao and
Xiaoyan Guo and
Chenxuan Xiao and
Fuqi Qi and
Zheng Yan An Experimental Investigation of
Text-based CAPTCHA Attacks and Their
Robustness . . . . . . . . . . . . . . . 196:1--196:??
Anna Rogers and
Matt Gardner and
Isabelle Augenstein QA Dataset Explosion: a Taxonomy of NLP
Resources for Question Answering and
Reading Comprehension . . . . . . . . . 197:1--197:??
Giacomo Chiarot and
Claudio Silvestri Time Series Compression Survey . . . . . 198:1--198:??
Eoin Brophy and
Zhengwei Wang and
Qi She and
Tomás Ward Generative Adversarial Networks in Time
Series: a Systematic Literature Review 199:1--199:??
Fath U Min Ullah and
Mohammad S. Obaidat and
Amin Ullah and
Khan Muhammad and
Mohammad Hijji and
Sung Wook Baik A Comprehensive Review on Vision-Based
Violence Detection in Surveillance
Videos . . . . . . . . . . . . . . . . . 200:1--200:??
Yunhua Zhao and
Kostadin Damevski and
Hui Chen A Systematic Survey of Just-in-Time
Software Defect Prediction . . . . . . . 201:1--201:??
Antonio Quiña-Mera and
Pablo Fernandez and
José Mar\'ìa Garc\'ìa and
Antonio Ruiz-Cortés GraphQL: a Systematic Mapping Study . . 202:1--202:??
Nils Rethmeier and
Isabelle Augenstein A Primer on Contrastive Pretraining in
Language Processing: Methods, Lessons
Learned, and Perspectives . . . . . . . 203:1--203:??
Iyyakutti Iyappan Ganapathi and
Syed Sadaf Ali and
Surya Prakash and
Ngoc-Son Vu and
Naoufel Werghi A Survey of $3$D Ear Recognition
Techniques . . . . . . . . . . . . . . . 204:1--204:??
Jitendra Parmar and
Satyendra Chouhan and
Vaskar Raychoudhury and
Santosh Rathore Open-world Machine Learning:
Applications, Challenges, and
Opportunities . . . . . . . . . . . . . 205:1--205:??
Rami Ibrahim and
M. Omair Shafiq Explainable Convolutional Neural
Networks: a Taxonomy, Review, and Future
Directions . . . . . . . . . . . . . . . 206:1--206:??
Ling Sun and
Yuan Rao and
Lianwei Wu and
Xiangbo Zhang and
Yuqian Lan and
Ambreen Nazir Fighting False Information from
Propagation Process: a Survey . . . . . 207:1--207:??
Amirmohammad Pasdar and
Young Choon Lee and
Zhongli Dong Connect API with Blockchain: a Survey on
Blockchain Oracle Implementation . . . . 208:1--208:??
Fabio Catania and
Micol Spitale and
Franca Garzotto Conversational Agents in Therapeutic
Interventions for Neurodevelopmental
Disorders: a Survey . . . . . . . . . . 209:1--209:??
Laure Gonnord and
Ludovic Henrio and
Lionel Morel and
Gabriel Radanne A Survey on Parallelism and Determinism 210:1--210:??
Fatai Sado and
Chu Kiong Loo and
Wei Shiung Liew and
Matthias Kerzel and
Stefan Wermter Explainable Goal-driven Agents and
Robots --- a Comprehensive Review . . . 211:1--211:??
Jou-An Chen and
Wei Niu and
Bin Ren and
Yanzhi Wang and
Xipeng Shen Survey: Exploiting Data Redundancy for
Optimization of Deep Learning . . . . . 212:1--212:??
Luke Antonyshyn and
Jefferson Silveira and
Sidney Givigi and
Joshua Marshall Multiple Mobile Robot Task and Motion
Planning: a Survey . . . . . . . . . . . 213:1--213:??
Tainã Ribeiro de Oliveira and
Brenda Biancardi Rodrigues and
Matheus Moura da Silva and
Rafael Antonio N. Spinassé and
Gabriel Giesen Ludke and
Mateus Ruy Soares Gaudio and
Guilherme Iglesias Rocha Gomes and
Luan Guio Cotini and
Daniel da Silva Vargens and
Marcelo Queiroz Schimidt and
Rodrigo Varejão Andreão and
Mário Mestria Virtual Reality Solutions Employing
Artificial Intelligence Methods: a
Systematic Literature Review . . . . . . 214:1--214:??
Muhammad Nouman Nafees and
Neetesh Saxena and
Alvaro Cardenas and
Santiago Grijalva and
Pete Burnap Smart Grid Cyber-Physical Situational
Awareness of Complex Operational
Technology Attacks: a Review . . . . . . 215:1--215:??
Kostas Papagiannopoulos and
Ognjen Glamo\vcanin and
Melissa Azouaoui and
Dorian Ros and
Francesco Regazzoni and
Mirjana Stojilovi\'c The Side-channel Metrics Cheat Sheet . . 216:1--216:??
Elyssa Boulila and
Marc Dacier WPAD: Waiting Patiently for an Announced
Disaster . . . . . . . . . . . . . . . . 217:1--217:??
Gongsheng Yuan and
Jiaheng Lu and
Zhengtong Yan and
Sai Wu A Survey on Mapping Semi-Structured Data
and Graph Data to Relational Data . . . 218:1--218:??
Dimitrios Georgoulias and
Jens Myrup Pedersen and
Morten Falch and
Emmanouil Vasilomanolakis Botnet Business Models, Takedown
Attempts, and the Darkweb Market: a
Survey . . . . . . . . . . . . . . . . . 219:1--219:??
Luca Di Grazia and
Michael Pradel Code Search: a Survey of Techniques for
Finding Code . . . . . . . . . . . . . . 220:1--220:??
Roberto Viola and
Ángel Mart\'ìn and
Mikel Zorrilla and
Jon Montalbán and
Pablo Angueira and
Gabriel-Miro Muntean A Survey on Virtual Network Functions
for Media Streaming: Solutions and
Future Challenges . . . . . . . . . . . 221:1--221:??
José Mar\'ìa Jorquera Valero and
Pedro Miguel Sánchez Sánchez and
Manuel Gil Pérez and
Alberto Huertas Celdrán and
Gregorio Martinez Perez Cutting-Edge Assets for Trust in 5G and
Beyond: Requirements, State of the Art,
Trends, and Challenges . . . . . . . . . 222:1--222:??
Priyankar Choudhary and
Neeraj Goel and
Mukesh Saini A Survey on Seismic Sensor based Target
Detection, Localization, Identification,
and Activity Recognition . . . . . . . . 223:1--223:??
Ghodai Abdelrahman and
Qing Wang and
Bernardo Nunes Knowledge Tracing: a Survey . . . . . . 224:1--224:??
Jonas Dann and
Daniel Ritter and
Holger Fröning Non-relational Databases on FPGAs:
Survey, Design Decisions, Challenges . . 225:1--225:??
Yang Li and
Michael Purcell and
Thierry Rakotoarivelo and
David Smith and
Thilina Ranbaduge and
Kee Siong Ng Private Graph Data Release: a Survey . . 226:1--226:??
Stjepan Picek and
Guilherme Perin and
Luca Mariot and
Lichao Wu and
Lejla Batina SoK: Deep Learning-based Physical
Side-channel Analysis . . . . . . . . . 227:1--227:??
Michael Seifert and
Stephan Kuehnel and
Stefan Sackmann Hybrid Clouds Arising from Software as a
Service Adoption: Challenges, Solutions,
and Future Research Directions . . . . . 228:1--228:??
Surangika Ranathunga and
En-Shiun Annie Lee and
Marjana Prifti Skenduli and
Ravi Shekhar and
Mehreen Alam and
Rishemjit Kaur Neural Machine Translation for
Low-resource Languages: a Survey . . . . 229:1--229:??
Bo Huang and
Mengchu Zhou and
Xiaoyu Sean Lu and
Abdullah Abusorrah Scheduling of Resource Allocation
Systems with Timed Petri Nets: a Survey 230:1--230:??
Chen Chen and
Gang Zhou and
Youfang Lin Cross-Domain WiFi Sensing with Channel
State Information: a Survey . . . . . . 231:1--231:??
Ziqiang Li and
Muhammad Usman and
Rentuo Tao and
Pengfei Xia and
Chaoyue Wang and
Huanhuan Chen and
Bin Li A Systematic Survey of Regularization
and Normalization in GANs . . . . . . . 232:1--232:??
Rahul Mishra and
Hari Gupta Transforming Large-Size to Lightweight
Deep Neural Networks for IoT
Applications . . . . . . . . . . . . . . 233:1--233:??
Michael Jones and
Soufiene Djahel and
Kristopher Welsh Path-Planning for Unmanned Aerial
Vehicles with Environment Complexity
Considerations: a Survey . . . . . . . . 234:1--234:??
Li-Hsiang Shen and
Kai-Ten Feng and
Lajos Hanzo Five Facets of 6G: Research Challenges
and Opportunities . . . . . . . . . . . 235:1--235:??
Christian Legaard and
Thomas Schranz and
Gerald Schweiger and
Ján Drgo\vna and
Basak Falay and
Cláudio Gomes and
Alexandros Iosifidis and
Mahdi Abkar and
Peter Larsen Constructing Neural Network Based Models
for Simulating Dynamical Systems . . . . 236:1--236:??
Sampath Rajapaksha and
Harsha Kalutarage and
M. Omar Al-Kadri and
Andrei Petrovski and
Garikayi Madzudzo and
Madeline Cheah AI-Based Intrusion Detection Systems for
In-Vehicle Networks: a Survey . . . . . 237:1--237:??
Jiahua Xu and
Krzysztof Paruch and
Simon Cousaert and
Yebo Feng SoK: Decentralized Exchanges (DEX) with
Automated Market Maker (AMM) Protocols 238:1--238:??
Pieter Hijma and
Stijn Heldens and
Alessio Sclocco and
Ben van Werkhoven and
Henri E. Bal Optimization Techniques for GPU
Programming . . . . . . . . . . . . . . 239:1--239:??
Juncen Zhu and
Jiannong Cao and
Divya Saxena and
Shan Jiang and
Houda Ferradi Blockchain-empowered Federated Learning:
Challenges, Solutions, and Future
Directions . . . . . . . . . . . . . . . 240:1--240:??
Md Rayhanur Rahman and
Rezvan Mahdavi Hezaveh and
Laurie Williams What Are the Attackers Doing Now?
Automating Cyberthreat Intelligence
Extraction from Text on Pace with the
Changing Threat Landscape: a Survey . . 241:1--241:??
Rathinaraja Jeyaraj and
Anandkumar Balasubramaniam and
Ajay Kumara M. A. and
Nadra Guizani and
Anand Paul Resource Management in Cloud and
Cloud-influenced Technologies for
Internet of Things Applications . . . . 242:1--242:??
Nitin Rathi and
Indranil Chakraborty and
Adarsh Kosta and
Abhronil Sengupta and
Aayush Ankit and
Priyadarshini Panda and
Kaushik Roy Exploring Neuromorphic Computing Based
on Spiking Neural Networks: Algorithms
to Hardware . . . . . . . . . . . . . . 243:1--243:??
Jianhua Gao and
Weixing Ji and
Fangli Chang and
Shiyu Han and
Bingxin Wei and
Zeming Liu and
Yizhuo Wang A Systematic Survey of General Sparse
Matrix--Matrix Multiplication . . . . . 244:1--244:??
Yun Zhang and
Linwei Zhu and
Gangyi Jiang and
Sam Kwong and
C.-C. Jay Kuo A Survey on Perceptually Optimized Video
Coding . . . . . . . . . . . . . . . . . 245:1--245:??
Jayashree Dey and
Ratna Dutta Progress in Multivariate Cryptography:
Systematic Review, Challenges, and
Research Directions . . . . . . . . . . 246:1--246:??
Arash Heidari and
Nima Jafari Navimipour and
Mehmet Unal and
Guodao Zhang Machine Learning Applications in
Internet-of-Drones: Systematic Review,
Recent Deployments, and Open Issues . . 247:1--247:??
Ziwei Ji and
Nayeon Lee and
Rita Frieske and
Tiezheng Yu and
Dan Su and
Yan Xu and
Etsuko Ishii and
Ye Jin Bang and
Andrea Madotto and
Pascale Fung Survey of Hallucination in Natural
Language Generation . . . . . . . . . . 248:1--248:??
Antonio López Mart\'ìnez and
Manuel Gil Pérez and
Antonio Ruiz-Mart\'ìnez A Comprehensive Review of the
State-of-the-Art on Security and Privacy
Issues in Healthcare . . . . . . . . . . 249:1--249:??
Caesar Wu and
Rui Zhang and
Ramamohanarao Kotagiri and
Pascal Bouvry Strategic Decisions: Survey, Taxonomy,
and Future Directions from Artificial
Intelligence Perspective . . . . . . . . 250:1--250:??
Maxime Buser and
Rafael Dowsley and
Muhammed Esgin and
Clémentine Gritti and
Shabnam Kasra Kermanshahi and
Veronika Kuchta and
Jason Legrow and
Joseph Liu and
Raphaël Phan and
Amin Sakzad and
Ron Steinfeld and
Jiangshan Yu A Survey on Exotic Signatures for
Post-quantum Blockchain: Challenges and
Research Directions . . . . . . . . . . 251:1--251:??
Hans Jakob Damsgaard and
Aleksandr Ometov and
Jari Nurmi Approximation Opportunities in Edge
Computing Hardware: a Systematic
Literature Review . . . . . . . . . . . 252:1--252:??
Ümit Çatalyürek and
Karen Devine and
Marcelo Faraj and
Lars Gottesbüren and
Tobias Heuer and
Henning Meyerhenke and
Peter Sanders and
Sebastian Schlag and
Christian Schulz and
Daniel Seemaier and
Dorothea Wagner More Recent Advances in (Hyper)Graph
Partitioning . . . . . . . . . . . . . . 253:1--253:??
Weiwei Lin and
Chennian Xiong and
Wentai Wu and
Fang Shi and
Keqin Li and
Minxian Xu Performance Interference of Virtual
Machines: a Survey . . . . . . . . . . . 254:1--254:??
Kate Smith-Miles and
Mario Andrés Muñoz Instance Space Analysis for Algorithm
Testing: Methodology and Software Tools 255:1--255:??
Zoe Kotti and
Rafaila Galanopoulou and
Diomidis Spinellis Machine Learning for Software
Engineering: a Tertiary Study . . . . . 256:1--256:??
Tong Sha and
Wei Zhang and
Tong Shen and
Zhoujun Li and
Tao Mei Deep Person Generation: a Survey from
the Perspective of Face, Pose, and Cloth
Synthesis . . . . . . . . . . . . . . . 257:1--257:??
Wei Xiang and
Bang Wang A Survey of Implicit Discourse Relation
Recognition . . . . . . . . . . . . . . 258:1--258:??
Gaurav Menghani Efficient Deep Learning: a Survey on
Making Deep Learning Models Smaller,
Faster, and Better . . . . . . . . . . . 259:1--259:??
Robert Hertel and
Rachid Benlamri Deep Learning Techniques for COVID-19
Diagnosis and Prognosis Based on
Radiological Imaging . . . . . . . . . . 260:1--260:??
Qin Wang and
Jiangshan Yu and
Shiping Chen and
Yang Xiang SoK: DAG-based Blockchain Systems . . . 261:1--261:??
Behrouz Zolfaghari and
Leila Mirsadeghi and
Khodakhast Bibak and
Kaveh Kavousi Cancer Prognosis and Diagnosis Methods
Based on Ensemble Learning . . . . . . . 262:1--262:??
Xiaojie Wang and
Jiameng Li and
Zhaolong Ning and
Qingyang Song and
Lei Guo and
Song Guo and
Mohammad S. Obaidat Wireless Powered Mobile Edge Computing
Networks: a Survey . . . . . . . . . . . 263:1--263:??
Tanmay Garg and
Sarah Masud and
Tharun Suresh and
Tanmoy Chakraborty Handling Bias in Toxic Speech Detection:
a Survey . . . . . . . . . . . . . . . . 264:1--264:??
Washington Cunha and
Felipe Viegas and
Celso França and
Thierson Rosa and
Leonardo Rocha and
Marcos André Gonçalves A Comparative Survey of Instance
Selection Methods applied to Non-Neural
and Transformer-Based Text
Classification . . . . . . . . . . . . . 265:1--265:??
Mingyu Liu and
Li Pan and
Shijun Liu Cost Optimization for Cloud Storage from
User Perspectives: Recent Advances,
Taxonomy, and Survey . . . . . . . . . . 266:1--266:??
Jovani Dalzochio and
Rafael Kunst and
Jorge Luis Victória Barbosa and
Pedro Clarindo da Silva Neto and
Edison Pignaton and
Carla Schwengber ten Caten and
Alex de Lima Teodoro da Penha Predictive Maintenance in the Military
Domain: a Systematic Review of the
Literature . . . . . . . . . . . . . . . 267:1--267:??
Salma P. González-Sabbagh and
Antonio Robles-Kelly A Survey on Underwater Computer Vision 268:1--268:??
Xavier de Carné de Carnavalet and
Paul C. van Oorschot A Survey and Analysis of TLS
Interception Mechanisms and Motivations:
Exploring how end-to-end TLS is made
``end-to-me'' for web traffic . . . . . 269:1--269:??
Ringki Das and
Thoudam Doren Singh Multimodal Sentiment Analysis: a Survey
of Methods, Trends, and Challenges . . . 270:1--270:??
Yisheng Song and
Ting Wang and
Puyu Cai and
Subrota K. Mondal and
Jyoti Prakash Sahoo A Comprehensive Survey of Few-shot
Learning: Evolution, Applications,
Challenges, and Opportunities . . . . . 271:1--271:??
Harshala Gammulle and
David Ahmedt-Aristizabal and
Simon Denman and
Lachlan Tychsen-Smith and
Lars Petersson and
Clinton Fookes Continuous Human Action Recognition for
Human-machine Interaction: a Review . . 272:1--272:??
Haider Abbas and
Naina Emmanuel and
Muhammad Faisal Amjad and
Tahreem Yaqoob and
Mohammed Atiquzzaman and
Zafar Iqbal and
Narmeen Shafqat and
Waleed Bin Shahid and
Ali Tanveer and
Umer Ashfaq Security Assessment and Evaluation of
VPNs: a Comprehensive Survey . . . . . . 273:1--273:??
Renan Greca and
Breno Miranda and
Antonia Bertolino State of Practical Applicability of
Regression Testing Research: a Live
Systematic Literature Review . . . . . . 274:1--274:??
Roberto Casadei Macroprogramming: Concepts, State of the
Art, and Opportunities of Macroscopic
Behaviour Modelling . . . . . . . . . . 275:1--275:??
JunKyu Lee and
Lev Mukhanov and
Amir Sabbagh Molahosseini and
Umar Minhas and
Yang Hua and
Jesus Martinez del Rincon and
Kiril Dichev and
Cheol-Ho Hong and
Hans Vandierendonck Resource-Efficient Convolutional
Networks: a Survey on Model-,
Arithmetic-, and Implementation-Level
Techniques . . . . . . . . . . . . . . . 276:1--276:??
Étienne André and
Shuang Liu and
Yang Liu and
Christine Choppy and
Jun Sun and
Jin Song Dong Formalizing UML State Machines for
Automated Verification --- a Survey . . 277:1--277:??
Jie Xu and
Cong Wang and
Xiaohua Jia A Survey of Blockchain Consensus
Protocols . . . . . . . . . . . . . . . 278:1--278:??
Jie Gui and
Xiaofeng Cong and
Yuan Cao and
Wenqi Ren and
Jun Zhang and
Jing Zhang and
Jiuxin Cao and
Dacheng Tao A Comprehensive Survey and Taxonomy on
Single Image Dehazing Based on Deep
Learning . . . . . . . . . . . . . . . . 279:1--279:??
Tiago Veiga and
Jennifer Renoux From Reactive to Active Sensing: a
Survey on Information Gathering in
Decision-theoretic Planning . . . . . . 280:1--280:??
Tian Wang and
Yuzhu Liang and
Xuewei Shen and
Xi Zheng and
Adnan Mahmood and
Quan Z. Sheng Edge Computing and Sensor-Cloud:
Overview, Solutions, and Directions . . 281:1--281:??
Visal Rajapakse and
Ishan Karunanayake and
Nadeem Ahmed Intelligence at the Extreme Edge: a
Survey on Reformable TinyML . . . . . . 282:1--282:??
Thomas Kosch and
Jakob Karolus and
Johannes Zagermann and
Harald Reiterer and
Albrecht Schmidt and
Pawe\l W. Wo\'zniak A Survey on Measuring Cognitive Workload
in Human-Computer Interaction . . . . . 283:1--283:??
Ma\lgorzata B. Starzy\'nska-Grze\'s and
Robin Roussel and
Sam Jacoby and
Ali Asadipour Computer Vision-based Analysis of
Buildings and Built Environments: a
Systematic Review of Current Approaches 284:1--284:??
Chang Liu and
Han Yu AI-Empowered Persuasive Video
Generation: a Survey . . . . . . . . . . 285:1--285:??
Md Rezwan Hasan and
Richard Guest and
Farzin Deravi Presentation-level Privacy Protection
Techniques for Automated Face
Recognition --- a Survey . . . . . . . . 286:1--286:??
Xilu Wang and
Yaochu Jin and
Sebastian Schmitt and
Markus Olhofer Recent Advances in Bayesian Optimization 287:1--287:??
Madeline C. Schiappa and
Yogesh S. Rawat and
Mubarak Shah Self-Supervised Learning for Videos: a
Survey . . . . . . . . . . . . . . . . . 288:1--288:??
Huihui Guo and
Fan Wu and
Yunchuan Qin and
Ruihui Li and
Keqin Li and
Kenli Li Recent Trends in Task and Motion
Planning for Robotics: a Survey . . . . 289:1--289:??
Gang Wang and
Qin Wang and
Shiping Chen Exploring Blockchains Interoperability:
a Systematic Survey . . . . . . . . . . 290:1--290:??
Xiaojie Zhang and
Saptarshi Debroy Resource Management in Mobile Edge
Computing: a Comprehensive Survey . . . 291:1--291:??
Yogesh Sharma and
Deval Bhamare and
Nishanth Sastry and
Bahman Javadi and
Rajkumar Buyya SLA Management in Intent-Driven Service
Management Systems: a Taxonomy and
Future Directions . . . . . . . . . . . 292:1--292:??
Brian Felipe Keith Norambuena and
Tanushree Mitra and
Chris North A Survey on Event-Based News Narrative
Extraction . . . . . . . . . . . . . . . 300:1--300:??
Zhiwei Zhong and
Xianming Liu and
Junjun Jiang and
Debin Zhao and
Xiangyang Ji Guided Depth Map Super-Resolution: a
Survey . . . . . . . . . . . . . . . . . 301:1--301:??
Vijay Kumar and
Kolin Paul Device Fingerprinting for Cyber-Physical
Systems: a Survey . . . . . . . . . . . 302:1--302:??
Mu-Huan Chung and
Yuhong Yang and
Lu Wang and
Greg Cento and
Khilan Jerath and
Abhay Raman and
David Lie and
Mark H. Chignell Implementing Data Exfiltration Defense
in Situ: a Survey of Countermeasures and
Human Involvement . . . . . . . . . . . 303:1--303:??
Quentin Fournier and
Gaétan Marceau Caron and
Daniel Aloise A Practical Survey on Faster and Lighter
Transformers . . . . . . . . . . . . . . 304:1--304:??
Karl Olson and
Jack Wampler and
Eric Keller Doomed to Repeat with IPv6?
Characterization of NAT-centric Security
in SOHO Routers . . . . . . . . . . . . 305:1--305:??
Federico Reghenzani and
Zhishan Guo and
William Fornaciari Software Fault Tolerance in Real-Time
Systems: Identifying the Future Research
Questions . . . . . . . . . . . . . . . 306:1--306:??
Jiepin Ding and
Mingsong Chen and
Ting Wang and
Junlong Zhou and
Xin Fu and
Keqin Li A Survey of AI-enabled Dynamic
Manufacturing Scheduling: From Directed
Heuristics to Autonomous Learning . . . 307:1--307:??
Cornelius Ihle and
Dennis Trautwein and
Moritz Schubotz and
Norman Meuschke and
Bela Gipp Incentive Mechanisms in Peer-to-Peer
Networks --- a Systematic Literature
Review . . . . . . . . . . . . . . . . . 308:1--308:??
Tânia Carvalho and
Nuno Moniz and
Pedro Faria and
Lu\'ìs Antunes Survey on Privacy-Preserving Techniques
for Microdata Publication . . . . . . . 309:1--309:??
Tommaso Fulcini and
Riccardo Coppola and
Luca Ardito and
Marco Torchiano A Review on Tools, Mechanics, Benefits,
and Challenges of Gamified Software
Testing . . . . . . . . . . . . . . . . 310:1--310:??
Arun Kumar Kalakanti and
Shrisha Rao Computational Challenges and Approaches
for Electric Vehicles . . . . . . . . . 311:1--311:??
Nikiforos Pittaras and
George Giannakopoulos and
Panagiotis Stamatopoulos and
Vangelis Karkaletsis Content-based and Knowledge-enriched
Representations for Classification
Across Modalities: a Survey . . . . . . 312:1--312:??
Anna Breit and
Laura Waltersdorfer and
Fajar J. Ekaputra and
Marta Sabou and
Andreas Ekelhart and
Andreea Iana and
Heiko Paulheim and
Jan Portisch and
Artem Revenko and
Annette Ten Teije and
Frank Van Harmelen Combining Machine Learning and Semantic
Web: a Systematic Mapping Study . . . . 313:1--313:??
Abdulaziz Al-Meer and
Saif Al-Kuwari Physical Unclonable Functions (PUF) for
IoT Devices . . . . . . . . . . . . . . 314:1--314:??
Shalini Saini and
Nitesh Saxena A Survey of Threats to Research
Literature-dependent Medical AI
Solutions . . . . . . . . . . . . . . . 315:1--315:??
Badis Hammi and
Sherali Zeadally and
Jamel Nebhen Security Threats, Countermeasures, and
Challenges of Digital Supply Chains . . 316:1--316:??
Veda C. Storey and
Roman Lukyanenko and
Arturo Castellanos Conceptual Modeling: Topics, Themes, and
Technology Trends . . . . . . . . . . . 317:1--317:??
Sahraoui Dhelim and
Liming Chen and
Sajal K. Das and
Huansheng Ning and
Chris Nugent and
Gerard Leavey and
Dirk Pesch and
Eleanor Bantry-White and
Devin Burns Detecting Mental Distresses Using Social
Behavior Analysis in the Context of
COVID-19: a Survey . . . . . . . . . . . 318:1--318:??
Jarod Govers and
Philip Feldman and
Aaron Dant and
Panos Patros Down the Rabbit Hole: Detecting Online
Extremism, Radicalisation, and
Politicised Hate Speech . . . . . . . . 319:1--319:??
Leysan Nurgalieva and
Alisa Frik and
Gavin Doherty A Narrative Review of Factors Affecting
the Implementation of Privacy and
Security Practices in Software
Development . . . . . . . . . . . . . . 320:1--320:??
Samodha Pallewatta and
Vassilis Kostakos and
Rajkumar Buyya Placement of Microservices-based IoT
Applications in Fog Computing: a
Taxonomy and Future Directions . . . . . 321:1--321:??
Newton C. Will and
Carlos A. Maziero Intel Software Guard Extensions
Applications: a Survey . . . . . . . . . 322:1--322:??
Bofeng Pan and
Natalia Stakhanova and
Suprio Ray Data Provenance in Security and Privacy 323:1--323:??
Daryna Oliynyk and
Rudolf Mayer and
Andreas Rauber I Know What You Trained Last Summer: a
Survey on Stealing Machine Learning
Models and Defences . . . . . . . . . . 324:1--324:??
Davide Zoni and
Andrea Galimberti and
William Fornaciari A Survey on Run-time Power Monitors at
the Edge . . . . . . . . . . . . . . . . 325:1--325:??
Nikolay Ivanov and
Chenning Li and
Qiben Yan and
Zhiyuan Sun and
Zhichao Cao and
Xiapu Luo Security Threat Mitigation for Smart
Contracts: a Comprehensive Survey . . . 326:1--326:??
Arda Goknil and
Phu Nguyen and
Sagar Sen and
Dimitra Politaki and
Harris Niavis and
Karl John Pedersen and
Abdillah Suyuthi and
Abhilash Anand and
Amina Ziegenbein A Systematic Review of Data Quality in
CPS and IoT for Industry 4.0 . . . . . . 327:1--327:??
Sicong Han and
Chenhao Lin and
Chao Shen and
Qian Wang and
Xiaohong Guan Interpreting Adversarial Examples in
Deep Learning: a Review . . . . . . . . 328:1--328:??
Xiao Zhang and
Griffin Klevering and
Xinyu Lei and
Yiwen Hu and
Li Xiao and
Guan-Hua Tu The Security in Optical Wireless
Communication: a Survey . . . . . . . . 329:1--329:??
Janice Klaiber and
Clemens Van Dinther Deep Learning for Variable Renewable
Energy: a Systematic Review . . . . . . 1:1--1:??
Héléne Coullon and
Ludovic Henrio and
Frédéric Loulergue and
Simon Robillard Component-based Distributed Software
Reconfiguration: a Verification-oriented
Survey . . . . . . . . . . . . . . . . . 2:1--2:??
Mohamed Ahzam Amanullah and
Seng W. Loke and
Mohan Baruwal Chhetri and
Robin Doss A Taxonomy and Analysis of Misbehaviour
Detection in Cooperative Intelligent
Transport Systems: a Systematic Review 3:1--3:??
Sabine Houy and
Philipp Schmid and
Alexandre Bartel Security Aspects of Cryptocurrency
Wallets --- a Systematic Literature
Review . . . . . . . . . . . . . . . . . 4:1--4:??
Prasenjeet Roy and
Suman Kundu Review on Query-focused Multi-document
Summarization (QMDS) with Comparative
Analysis . . . . . . . . . . . . . . . . 5:1--5:??
Jana Vatter and
Ruben Mayer and
Hans-Arno Jacobsen The Evolution of Distributed Systems for
Graph Neural Networks and Their Origin
in Graph Processing and Deep Learning: a
Survey . . . . . . . . . . . . . . . . . 6:1--6:??
Shulei Ji and
Xinyu Yang and
Jing Luo A Survey on Deep Learning for Symbolic
Music Generation: Representations,
Algorithms, Evaluations, and Challenges 7:1--7:??
Mario Brcic and
Roman V. Yampolskiy Impossibility Results in AI: a Survey 8:1--8:??
Heng Xu and
Tianqing Zhu and
Lefeng Zhang and
Wanlei Zhou and
Philip S. Yu Machine Unlearning: a Survey . . . . . . 9:1--9:??
Samaneh Zolfaghari and
Sumaiya Suravee and
Daniele Riboni and
Kristina Yordanova Sensor-Based Locomotion Data Mining for
Supporting the Diagnosis of
Neurodegenerative Disorders: a Survey 10:1--10:??
Ce Zheng and
Wenhan Wu and
Chen Chen and
Taojiannan Yang and
Sijie Zhu and
Ju Shen and
Nasser Kehtarnavaz and
Mubarak Shah Deep Learning-based Human Pose
Estimation: a Survey . . . . . . . . . . 11:1--11:??
Bayzid Ashik Hossain and
Md. Saddam Hossain Mukta and
Md Adnanul Islam and
Akib Zaman and
Rolf Schwitter Natural Language-Based Conceptual
Modelling Frameworks: State of the Art
and Future Opportunities . . . . . . . . 12:1--12:??
Zhaolong Ning and
Hao Hu and
Xiaojie Wang and
Lei Guo and
Song Guo and
Guoyin Wang and
Xinbo Gao Mobile Edge Computing and Machine
Learning in the Internet of Unmanned
Aerial Vehicles: a Survey . . . . . . . 13:1--13:??
Chi-Wei Lien and
Sudip Vhaduri Challenges and Opportunities of
Biometric User Authentication in the Age
of IoT: a Survey . . . . . . . . . . . . 14:1--14:??
Yaochen Liu and
Qiuchi Li and
Benyou Wang and
Yazhou Zhang and
Dawei Song A Survey of Quantum-cognitively Inspired
Sentiment Analysis Models . . . . . . . 15:1--15:??
Alessandro Margara and
Gianpaolo Cugola and
Nicol\`o Felicioni and
Stefano Cilloni A Model and Survey of Distributed
Data-Intensive Systems . . . . . . . . . 16:1--16:??
Zeinab Zabihi and
Amir Masoud Eftekhari Moghadam and
Mohammad Hossein Rezvani Reinforcement Learning Methods for
Computation Offloading: a Systematic
Review . . . . . . . . . . . . . . . . . 17:1--17:??
Ricardo Parizotto and
Bruno Loureiro Coelho and
Diego Cardoso Nunes and
Israat Haque and
Alberto Schaeffer-Filho Offloading Machine Learning to
Programmable Data Planes: a Systematic
Survey . . . . . . . . . . . . . . . . . 18:1--18:??
Zhe Fu and
Xi Niu and
Mary Lou Maher Deep Learning Models for Serendipity
Recommendations: a Survey and New
Perspectives . . . . . . . . . . . . . . 19:1--19:??
Rui Xu and
Sheng Ma and
Yang Guo and
Dongsheng Li A Survey of Design and Optimization for
Systolic Array-based DNN Accelerators 20:1--20:??
Guoqing Xiao and
Chuanghui Yin and
Tao Zhou and
Xueqi Li and
Yuedan Chen and
Kenli Li A Survey of Accelerating Parallel Sparse
Linear Algebra . . . . . . . . . . . . . 21:1--21:??
Diego Donoso and
Jose M. Saavedra Survey on Sketch-to-photo Translation 22:1--22:??
Zhishu Shen and
Jiong Jin and
Cheng Tan and
Atsushi Tagami and
Shangguang Wang and
Qing Li and
Qiushi Zheng and
Jingling Yuan A Survey of Next-generation Computing
Technologies in Space-air-ground
Integrated Networks . . . . . . . . . . 23:1--23:??
Alessia Antelmi and
Gennaro Cordasco and
Mirko Polato and
Vittorio Scarano and
Carmine Spagnuolo and
Dingqi Yang A Survey on Hypergraph Representation
Learning . . . . . . . . . . . . . . . . 24:1--24:??
Kisub Kim and
Sankalp Ghatpande and
Dongsun Kim and
Xin Zhou and
Kui Liu and
Tegawendé F. Bissyandé and
Jacques Klein and
Yves Le Traon Big Code Search: a Bibliography . . . . 25:1--25:??
Afzal Badshah and
Anwar Ghani and
Ali Daud and
Ateeqa Jalal and
Muhammad Bilal and
Jon Crowcroft Towards Smart Education through Internet
of Things: a Survey . . . . . . . . . . 26:1--26:??
Maud Ehrmann and
Ahmed Hamdi and
Elvys Linhares Pontes and
Matteo Romanello and
Antoine Doucet Named Entity Recognition and
Classification in Historical Documents:
a Survey . . . . . . . . . . . . . . . . 27:1--27:??
Marco Brohet and
Francesco Regazzoni A Survey on Thwarting Memory Corruption
in RISC-V . . . . . . . . . . . . . . . 28:1--28:??
Alireza Alaei and
Vinh Bui and
David Doermann and
Umapada Pal Document Image Quality Assessment: a
Survey . . . . . . . . . . . . . . . . . 29:1--29:??
Bonan Min and
Hayley Ross and
Elior Sulem and
Amir Pouran Ben Veyseh and
Thien Huu Nguyen and
Oscar Sainz and
Eneko Agirre and
Ilana Heintz and
Dan Roth Recent Advances in Natural Language
Processing via Large Pre-trained
Language Models: a Survey . . . . . . . 30:1--30:??
Maciej Besta and
Robert Gerstenberger and
Emanuel Peter and
Marc Fischer and
Micha\l Podstawski and
Claude Barthels and
Gustavo Alonso and
Torsten Hoefler Demystifying Graph Databases: Analysis
and Taxonomy of Data Organization,
System Designs, and Graph Queries . . . 31:1--31:??
Jan Pennekamp and
Roman Matzutt and
Christopher Klinkmüller and
Lennart Bader and
Martin Serror and
Eric Wagner and
Sidra Malik and
Maria Spiß and
Jessica Rahn and
Tan Gürpinar and
Eduard Vlad and
Sander J. J. Leemans and
Salil S. Kanhere and
Volker Stich and
Klaus Wehrle An Interdisciplinary Survey on
Information Flows in Supply Chains . . . 32:1--32:??
Takuya Fujihashi and
Toshiaki Koike-Akino and
Takashi Watanabe Soft Delivery: Survey on a New Paradigm
for Wireless and Mobile Multimedia
Streaming . . . . . . . . . . . . . . . 33:1--33:??
Yaxiong Lei and
Shijing He and
Mohamed Khamis and
Juan Ye An End-to-End Review of Gaze Estimation
and its Interactive Applications on
Handheld Mobile Devices . . . . . . . . 34:1--34:??
Oceane Destras and
Sébastien Le Beux and
Felipe Gohring De Magalhães and
Gabriela Nicolescu Survey on Activation Functions for
Optical Neural Networks . . . . . . . . 35:1--35:??
Fatemeh Deldar and
Mahdi Abadi Deep Learning for Zero-day Malware
Detection and Classification: a Survey 36:1--36:??
Sahar Mehrpour and
Thomas D. Latoza A Survey of Tool Support for Working
with Design Decisions in Code . . . . . 37:1--37:??
Satyaki Roy and
Nirnay Ghosh and
Nitish Uplavikar and
Preetam Ghosh Towards a Unified Pandemic Management
Architecture: Survey, Challenges, and
Future Directions . . . . . . . . . . . 38:1--38:??
Huiqiang Chen and
Tianqing Zhu and
Tao Zhang and
Wanlei Zhou and
Philip S. Yu Privacy and Fairness in Federated
Learning: On the Perspective of Tradeoff 39:1--39:??
Abdelouahab Amira and
Abdelouahid Derhab and
Elmouatez Billah Karbab and
Omar Nouali A Survey of Malware Analysis Using
Community Detection Algorithms . . . . . 40:1--40:??
Nan Li and
Lianbo Ma and
Guo Yu and
Bing Xue and
Mengjie Zhang and
Yaochu Jin Survey on Evolutionary Deep Learning:
Principles, Algorithms, Applications,
and Open Issues . . . . . . . . . . . . 41:1--41:??
Tara Ghasempouri and
Jaan Raik and
Cezar Reinbrecht and
Said Hamdioui and
Mottaqiallah Taouil Survey on Architectural Attacks: a
Unified Classification and Attack Model 42:1--42:??
Carlos Barrios and
Mohan Kumar Service Caching and Computation Reuse
Strategies at the Edge: a Survey . . . . 43:1--43:??
Rongxin Xu and
Qiujun Lan and
Shiva Raj Pokhrel and
Gang Li A Knowledge Graph-Based Survey on
Distributed Ledger Technology for IoT
Verticals . . . . . . . . . . . . . . . 44:1--44:??
Youssef Yamout and
Tashaffi Samin Yeasar and
Shahrear Iqbal and
Mohammad Zulkernine Beyond Smart Homes: an In-Depth Analysis
of Smart Aging Care System Security . . 45:1--45:??
Jean Luca Bez and
Suren Byna and
Shadi Ibrahim I/O Access Patterns in HPC Applications:
a $ 360$-Degree Survey . . . . . . . . . 46:1--46:??
Stefan Buchner and
Dirk Riehle The Business Impact of Inner Source and
How to Quantify It . . . . . . . . . . . 47:1--47:??
Maryam Amini and
Razvan Stanica and
Catherine Rosenberg Where Are the (Cellular) Data? . . . . . 48:1--48:??
Essam Debie and
Kathryn Kasmarik and
Matt Garratt Swarm Robotics: a Survey from a
Multi-Tasking Perspective . . . . . . . 49:1--49:??
Danfeng Sun and
Junjie Hu and
Huifeng Wu and
Jia Wu and
Jian Yang and
Quan Z. Sheng and
Schahram Dustdar A Comprehensive Survey on Collaborative
Data-access Enablers in the IIoT . . . . 50:1--50:??
Asma Ameur and
Sana Hamdi and
Sadok Ben Yahia Sentiment Analysis for Hotel Reviews: a
Systematic Literature Review . . . . . . 51:1--51:??
Benjamin Smith and
Anahita Khojandi and
Rama Vasudevan Bias in Reinforcement Learning: a Review
in Healthcare Applications . . . . . . . 52:1--52:??
Ryan Schuerkamp and
Philippe J. Giabbanelli Extensions of Fuzzy Cognitive Maps: a
Systematic Review . . . . . . . . . . . 53:1--53:??
Yulan Guo and
Hanyun Wang and
Longguang Wang and
Yinjie Lei and
Li Liu and
Mohammed Bennamoun $3$D Face Recognition: Two Decades of
Progress and Prospects . . . . . . . . . 54:1--54:??
Benyou Wang and
Qianqian Xie and
Jiahuan Pei and
Zhihong Chen and
Prayag Tiwari and
Zhao Li and
Jie Fu Pre-trained Language Models in
Biomedical Domain: a Systematic Survey 55:1--55:??
Tianzhang He and
Rajkumar Buyya A Taxonomy of Live Migration Management
in Cloud Computing . . . . . . . . . . . 56:1--56:??
Daniele Bringhenti and
Guido Marchetto and
Riccardo Sisto and
Fulvio Valenza Automation for Network Security
Configuration: State of the Art and
Research Trends . . . . . . . . . . . . 57:1--57:??
Domenico Amalfitano and
Stefano Faralli and
Jean Carlo Rossa Hauck and
Santiago Matalonga and
Damiano Distante Artificial Intelligence Applied to
Software Testing: a Tertiary Study . . . 58:1--58:??
Rui Queiroz and
Tiago Cruz and
Jérôme Mendes and
Pedro Sousa and
Paulo Simões Container-based Virtualization for
Real-time Industrial Systems --- a
Systematic Review . . . . . . . . . . . 59:1--59:??
Guoying Qiu and
Guoming Tang and
Chuandong Li and
Lailong Luo and
Deke Guo and
Yulong Shen Differentiated Location Privacy
Protection in Mobile Communication
Services: a Survey from the Semantic
Perception Perspective . . . . . . . . . 60:1--60:??
Kheng Leong Tan and
Chi-Hung Chi and
Kwok-Yan Lam Survey on Digital Sovereignty and
Identity: From Digitization to
Digitalization . . . . . . . . . . . . . 61:1--61:??
Taraneh Ghandi and
Hamidreza Pourreza and
Hamidreza Mahyar Deep Learning Approaches on Image
Captioning: a Review . . . . . . . . . . 62:1--62:??
Haiqin Wu and
Boris Düdder and
Liangmin Wang and
Zhenfu Cao and
Jun Zhou and
Xia Feng Survey on Secure Keyword Search over
Outsourced Data: From Cloud to
Blockchain-assisted Architecture . . . . 63:1--63:??
Hanqing Zhang and
Haolin Song and
Shaoyu Li and
Ming Zhou and
Dawei Song A Survey of Controllable Text Generation
Using Transformer-based Pre-trained
Language Models . . . . . . . . . . . . 64:1--64:??
Oscar Castro and
Pierrick Bruneau and
Jean-Sébastien Sottet and
Dario Torregrossa Landscape of High-Performance Python to
Develop Data Science and Machine
Learning Applications . . . . . . . . . 65:1--65:??
Dulani Meedeniya and
Isuru Ariyarathne and
Meelan Bandara and
Roshinie Jayasundara and
Charith Perera A Survey on Deep Learning Based Forest
Environment Sound Classification at the
Edge . . . . . . . . . . . . . . . . . . 66:1--66:??
Qi Jia and
Yizhu Liu and
Siyu Ren and
Kenny Q. Zhu Taxonomy of Abstractive Dialogue
Summarization: Scenarios, Approaches,
and Future Directions . . . . . . . . . 67:1--67:??
Asma Hamissi and
Amine Dhraief A Survey on the Unmanned Aircraft System
Traffic Management . . . . . . . . . . . 68:1--68:??
Adán José-Garc\'ìa and
Julie Jacques and
Vincent Sobanski and
Clarisse Dhaenens Metaheuristic Biclustering Algorithms:
From State-of-the-art to Future
Opportunities . . . . . . . . . . . . . 69:1--69:??
Felix Gemeinhardt and
Antonio Garmendia and
Manuel Wimmer and
Benjamin Weder and
Frank Leymann Quantum Combinatorial Optimization in
the NISQ Era: a Systematic Mapping Study 70:1--70:??
Sanoop Mallissery and
Yu-Sung Wu Demystify the Fuzzing Methods: a
Comprehensive Survey . . . . . . . . . . 71:1--71:??
Arnav Arora and
Preslav Nakov and
Momchil Hardalov and
Sheikh Muhammad Sarwar and
Vibha Nayak and
Yoan Dinkov and
Dimitrina Zlatkova and
Kyle Dent and
Ameya Bhatawdekar and
Guillaume Bouchard and
Isabelle Augenstein Detecting Harmful Content on Online
Platforms: What Platforms Need vs. Where
Research Efforts Go . . . . . . . . . . 72:1--72:??
Peter Christen and
David J. Hand and
Nishadi Kirielle A Review of the $F$-Measure: Its
History, Properties, Criticism, and
Alternatives . . . . . . . . . . . . . . 73:1--73:??
Luís Fiolhais and
Leonel Sousa Transient-Execution Attacks: a Computer
Architect Perspective . . . . . . . . . 74:1--74:??
Vincenzo Scotti and
Licia Sbattella and
Roberto Tedesco A Primer on Seq2Seq Models for
Generative Chatbots . . . . . . . . . . 75:1--75:??
Ayse Ünsal and
Melek Önen Information-Theoretic Approaches to
Differential Privacy . . . . . . . . . . 76:1--76:??
Simone Maurizio La Cava and
Giulia Orr\`u and
Martin Drahansky and
Gian Luca Marcialis and
Fabio Roli $3$D Face Reconstruction: The Road to
Forensics . . . . . . . . . . . . . . . 77:1--77:??
Xiaoyu Xia and
Sheik Mohammad Mostakim Fattah and
Muhammad Ali Babar A Survey on UAV-Enabled Edge Computing:
Resource Management Perspective . . . . 78:1--78:??
Mang Ye and
Xiuwen Fang and
Bo Du and
Pong C. Yuen and
Dacheng Tao Heterogeneous Federated Learning:
State-of-the-art and Research Challenges 79:1--79:??
Guoyang Xie and
Yawen Huang and
Jinbao Wang and
Jiayi Lyu and
Feng Zheng and
Yefeng Zheng and
Yaochu Jin Cross-modality Neuroimage Synthesis: a
Survey . . . . . . . . . . . . . . . . . 80:1--80:??
Ernest Davis Benchmarks for Automated Commonsense
Reasoning: a Survey . . . . . . . . . . 81:1--81:??
Marcel André Hoffmann and
Rainer Lasch Tackling Industrial Downtimes with
Artificial Intelligence in Data-Driven
Maintenance . . . . . . . . . . . . . . 82:1--82:??
Jonas Auda and
Uwe Gruenefeld and
Sarah Faltaous and
Sven Mayer and
Stefan Schneegass A Scoping Survey on Cross-reality
Systems . . . . . . . . . . . . . . . . 83:1--83:??
Josu Diaz-de-Arcaya and
Ana I. Torre-Bastida and
Gorka Zárate and
Raúl Miñón and
Aitor Almeida A Joint Study of the Challenges,
Opportunities, and Roadmap of MLOps and
AIOps: a Systematic Survey . . . . . . . 84:1--84:??
Cristiano Patrício and
João C. Neves and
Luís F. Teixeira Explainable Deep Learning Methods in
Medical Image Classification: a Survey 85:1--85:??
Damien Wohwe Sambo and
Anna Förster Wireless Underground Sensor Networks: a
Comprehensive Survey and Tutorial . . . 86:1--86:??
Yashar Deldjoo and
Fatemeh Nazary and
Arnau Ramisa and
Julian McAuley and
Giovanni Pellegrini and
Alejandro Bellogin and
Tommaso Di Noia A Review of Modern Fashion Recommender
Systems . . . . . . . . . . . . . . . . 87:1--87:??
Muhammad Okky Ibrohim and
Cristina Bosco and
Valerio Basile Sentiment Analysis for the Natural
Environment: a Systematic Review . . . . 88:1--88:??
Meng Qin and
Dit-Yan Yeung Temporal Link Prediction: a Unified
Framework, Taxonomy, and Review . . . . 89:1--89:??
Weihao Xia and
Jing-Hao Xue A Survey on Deep Generative $3$D-aware
Image Synthesis . . . . . . . . . . . . 90:1--90:??
Chenhan Zhang and
Shui Yu and
Zhiyi Tian and
James J. Q. Yu Generative Adversarial Networks: a
Survey on Attack and Defense Perspective 91:1--91:??
Li Hu and
Anli Yan and
Hongyang Yan and
Jin Li and
Teng Huang and
Yingying Zhang and
Changyu Dong and
Chunsheng Yang Defenses to Membership Inference
Attacks: a Survey . . . . . . . . . . . 92:1--92:??
Alexandra Kapp and
Julia Hansmeyer and
Helena Mihaljevi\'c Generative Models for Synthetic Urban
Mobility Data: a Systematic Literature
Review . . . . . . . . . . . . . . . . . 93:1--93:??
Lingfeng Zhong and
Jia Wu and
Qian Li and
Hao Peng and
Xindong Wu A Comprehensive Survey on Automatic
Knowledge Graph Construction . . . . . . 94:1--94:??
Pedro Miguel Moás and
Carla Teixeira Lopes Automatic Quality Assessment of
Wikipedia Articles --- a Systematic
Literature Review . . . . . . . . . . . 95:1--95:??
Edan Habler and
Ron Bitton and
Asaf Shabtai Assessing Aircraft Security: a
Comprehensive Survey and Methodology for
Evaluation . . . . . . . . . . . . . . . 96:1--96:??
S. Mojtaba Marvasti-Zadeh and
Devin Goodsman and
Nilanjan Ray and
Nadir Erbilgin Early Detection of Bark Beetle Attack
Using Remote Sensing and Machine
Learning: a Review . . . . . . . . . . . 97:1--97:??
Julio C. S. Dos Anjos and
Kassiano J. Matteussi and
Fernanda C. Orlandi and
Jorge L. V. Barbosa and
Jorge Sá Silva and
Luiz F. Bittencourt and
Cláudio F. R. Geyer A Survey on Collaborative Learning for
Intelligent Autonomous Systems . . . . . 98:1--98:??
Huang Huawei and
Zhang Qinnan and
Li Taotao and
Yang Qinglin and
Yin Zhaokang and
Wu Junhao and
Zehui Xiong and
Zhu Jianming and
Jiajing Wu and
Zibin Zheng Economic Systems in the Metaverse:
Basics, State of the Art, and Challenges 99:1--99:??
Ronnie De Souza Santos and
Paul Ralph and
Arham Arshad and
Klaas-Jan Stol Distributed Scrum: a Case Meta-analysis 100:1--100:??
Maria Rigaki and
Sebastian Garcia A Survey of Privacy Attacks in Machine
Learning . . . . . . . . . . . . . . . . 101:1--101:??
Norman W. Paton and
Jiaoyan Chen and
Zhenyu Wu Dataset Discovery and Exploration: a
Survey . . . . . . . . . . . . . . . . . 102:1--102:??
Zhipeng Su and
Yixiong Zhang and
Jianghong Shi and
Xiao-Ping Zhang A Survey of Single Image Rain Removal
Based on Deep Learning . . . . . . . . . 103:1--103:??
Akond Rahman and
Dibyendu Brinto Bose and
Farhat Lamia Barsha and
Rahul Pandita Defect Categorization in Compilers: a
Multi-vocal Literature Review . . . . . 104:1--104:??
Ling Yang and
Zhilong Zhang and
Yang Song and
Shenda Hong and
Runsheng Xu and
Yue Zhao and
Wentao Zhang and
Bin Cui and
Ming-Hsuan Yang Diffusion Models: a Comprehensive Survey
of Methods and Applications . . . . . . 105:1--105:??
Marvin Wyrich and
Justus Bogner and
Stefan Wagner 40 Years of Designing Code Comprehension
Experiments: a Systematic Mapping Study 106:1--106:??
Thomas Heinis and
Roman Sokolovskii and
Jamie J. Alnasir Survey of Information Encoding
Techniques for DNA . . . . . . . . . . . 107:1--107:??
Amin Hosseiny Marani and
Eric P. S. Baumer A Review of Stability in Topic Modeling:
Metrics for Assessing and Techniques for
Improving Stability . . . . . . . . . . 108:1--108:??
Cigdem Beyan and
Alessandro Vinciarelli and
Alessio Del Bue Co-Located Human-Human Interaction
Analysis Using Nonverbal Cues: a Survey 109:1--109:??
Artur Becker and
Carla M. Dal Sasso Freitas Evaluation of XR Applications: a
Tertiary Review . . . . . . . . . . . . 110:1--110:??
Wen Fei and
Hiroyuki Ohno and
Srinivas Sampalli A Systematic Review of IoT Security:
Research Potential, Challenges, and
Future Directions . . . . . . . . . . . 111:1--111:??
Xuke Hu and
Zhiyong Zhou and
Hao Li and
Yingjie Hu and
Fuqiang Gu and
Jens Kersten and
Hongchao Fan and
Friederike Klan Location Reference Recognition from
Texts: a Survey and Comparison . . . . . 112:1--112:??
Qihan Huang and
Haofei Zhang and
Mengqi Xue and
Jie Song and
Mingli Song A Survey of Deep Learning for Low-shot
Object Detection . . . . . . . . . . . . 113:1--113:??
Ville Paananen and
Mohammad Sina Kiarostami and
Lee Lik-Hang and
Tristan Braud and
Simo Hosio From Digital Media to Empathic Spaces: a
Systematic Review of Empathy Research in
Extended Reality Environments . . . . . 114:1--114:??
Azra Seyyedi and
Mahdi Bohlouli and
Seyedehsan Nedaaee Oskoee Machine Learning and Physics: a Survey
of Integrated Models . . . . . . . . . . 115:1--115:??
Johann Li and
Guangming Zhu and
Cong Hua and
Mingtao Feng and
Basheer Bennamoun and
Ping Li and
Xiaoyuan Lu and
Juan Song and
Peiyi Shen and
Xu Xu and
Lin Mei and
Liang Zhang and
Syed Afaq Ali Shah and
Mohammed Bennamoun A Systematic Collection of Medical Image
Datasets for Deep Learning . . . . . . . 116:1--116:??
Zoltán Ádám Mann and
Christian Weinert and
Daphnee Chabal and
Joppe W. Bos Towards Practical Secure Neural Network
Inference: The Journey So Far and the
Road Ahead . . . . . . . . . . . . . . . 117:1--117:??
Jiayun Luo and
Boyang Li and
Cyril Leung A Survey of Computer Vision Technologies
in Urban and Controlled-environment
Agriculture . . . . . . . . . . . . . . 118:1--118:??
Feng Li and
Jianfeng Ma and
Yinbin Miao and
Ximeng Liu and
Jianting Ning and
Robert H. Deng A Survey on Searchable Symmetric
Encryption . . . . . . . . . . . . . . . 119:1--119:??
Vaibhav Jain and
Devendra Kumar Sharma and
Hari Mohan Gaur and
Ashutosh Kumar Singh and
Xiaoqing Wen Comprehensive and Comparative Analysis
of QCA-based Circuit Designs for
Next-generation Computation . . . . . . 120:1--120:??
Yujuan Ding and
Zhihui Lai and
P. Y. Mok and
Tat-Seng Chua Computational Technologies for Fashion
Recommendation: a Survey . . . . . . . . 121:1--121:??
Bing Huang and
Dipankar Chaki and
Athman Bouguettaya and
Kwok-Yan Lam A Survey on Conflict Detection in
IoT-based Smart Homes . . . . . . . . . 122:1--122:??
Dawei Zhou and
Jingrui He Rare Category Analysis for Complex Data:
a Review . . . . . . . . . . . . . . . . 123:1--123:??
Adnan Khalid and
Zohaib Mushtaq and
Saad Arif and
Kamran Zeb and
Muhammad Attique Khan and
Sambit Bakshi Control Schemes for Quadrotor UAV:
Taxonomy and Survey . . . . . . . . . . 124:1--124:??
Thomas Hickling and
Abdelhafid Zenati and
Nabil Aouf and
Phillippa Spencer Explainability in Deep Reinforcement
Learning: a Review into Current Methods
and Applications . . . . . . . . . . . . 125:1--125:??
Zhiqian Chen and
Fanglan Chen and
Lei Zhang and
Taoran Ji and
Kaiqun Fu and
Liang Zhao and
Feng Chen and
Lingfei Wu and
Charu Aggarwal and
Chang-Tien Lu Bridging the Gap between Spatial and
Spectral Domains: a Unified Framework
for Graph Neural Networks . . . . . . . 126:1--126:??
Debo Cheng and
Jiuyong Li and
Lin Liu and
Jixue Liu and
Thuc Duy Le Data-Driven Causal Effect Estimation
Based on Graphical Causal Modelling: a
Survey . . . . . . . . . . . . . . . . . 127:1--127:??
Santiago Villarreal-Narvaez and
Arthur Sluÿters and
Jean Vanderdonckt and
Radu-Daniel Vatavu Brave New GES World: a Systematic
Literature Review of Gestures and
Referents in Gesture Elicitation Studies 128:1--128:??
Fangjian Liao and
Xingxing Zou and
Waikeung Wong Appearance and Pose-guided Human
Generation: a Survey . . . . . . . . . . 129:1--129:??
Shiwei Li and
Huifeng Guo and
Xing Tang and
Ruiming Tang and
Lu Hou and
Ruixuan Li and
Rui Zhang Embedding Compression in Recommender
Systems: a Survey . . . . . . . . . . . 130:1--130:??
Victor R. Kebande and
Ali Ismail Awad Industrial Internet of Things Ecosystems
Security and Digital Forensics:
Achievements, Open Challenges, and
Future Directions . . . . . . . . . . . 131:1--131:??
Aruna Jayasena and
Prabhat Mishra Directed Test Generation for Hardware
Validation: a Survey . . . . . . . . . . 132:1--132:??
Melike Gecer and
Benoit Garbinato Federated Learning for Mobility
Applications . . . . . . . . . . . . . . 133:1--133:??
Gengrui Zhang and
Fei Pan and
Yunhao Mao and
Sofia Tijanic and
Michael Dang'ana and
Shashank Motepalli and
Shiquan Zhang and
Hans-Arno Jacobsen Reaching Consensus in the Byzantine
Empire: a Comprehensive Review of BFT
Consensus Algorithms . . . . . . . . . . 134:1--134:??
Marco De Vincenzi and
Gianpiero Costantino and
Ilaria Matteucci and
Florian Fenzl and
Christian Plappert and
Roland Rieke and
Daniel Zelle A Systematic Review on Security Attacks
and Countermeasures in Automotive
Ethernet . . . . . . . . . . . . . . . . 135:1--135:??
Andrew Wei-Loong Wong and
Say Leng Goh and
Mohammad Kamrul Hasan and
Salmah Fattah Multi-Hop and Mesh for LoRa Networks:
Recent Advancements, Issues, and
Recommended Applications . . . . . . . . 136:1--136:??
Yanbin Liu and
Girish Dwivedi and
Farid Boussaid and
Mohammed Bennamoun $3$D Brain and Heart Volume Generative
Models: a Survey . . . . . . . . . . . . 137:1--137:??
Yanjie Li and
Bin Xie and
Songtao Guo and
Yuanyuan Yang and
Bin Xiao A Survey of Robustness and Safety of
$2$D and $3$D Deep Learning Models
against Adversarial Attacks . . . . . . 138:1--138:??
Changlin Yang and
Kwan-Wu Chin and
Jiguang Wang and
Xiaodong Wang and
Ying Liu and
Zibin Zheng Scaling Blockchains with Error
Correction Codes: a Survey on Coded
Blockchains . . . . . . . . . . . . . . 139:1--139:??
Sk Maidul Islam and
Subhankar Joardar and
Arif Ahmed Sekh A Survey on Fashion Image Retrieval . . 140:1--140:??
Mohammad Hasan Ahmadilivani and
Mahdi Taheri and
Jaan Raik and
Masoud Daneshtalab and
Maksim Jenihhin A Systematic Literature Review on
Hardware Reliability Assessment Methods
for Deep Neural Networks . . . . . . . . 141:1--141:??
Ghareeb Falazi and
Uwe Breitenbücher and
Frank Leymann and
Stefan Schulte Cross-Chain Smart Contract Invocations:
a Systematic Multi-Vocal Literature
Review . . . . . . . . . . . . . . . . . 142:1--142:??
João Eduardo Costa Gomes and
Ricardo Rodrigues Ehlert and
Rodrigo Murillo Boesche and
Vinicius Santosde Lima and
Jorgito Matiuzzi Stocchero and
Dante A. C. Barone and
JulianoAraujo Wickboldt and
Edison Pignaton de Freitas and
Julio C. S. dos Anjos and
Ricardo Queiroz de Araujo Fernandes Surveying Emerging Network Approaches
for Military Command and Control Systems 143:1--143:??
Sabina Szymoniak Key Distribution and Authentication
Protocols in Wireless Sensor Networks: a
Survey . . . . . . . . . . . . . . . . . 144:1--144:??
Pascal Maniriho and
Abdun Naser Mahmood and
Mohammad Jabed Morshed Chowdhury A Survey of Recent Advances in Deep
Learning Models for Detecting Malware in
Desktop and Mobile Platforms . . . . . . 145:1--145:??
Zhisheng Ye and
Wei Gao and
Qinghao Hu and
Peng Sun and
Xiaolin Wang and
Yingwei Luo and
Tianwei Zhang and
Yonggang Wen Deep Learning Workload Scheduling in GPU
Datacenters: a Survey . . . . . . . . . 146:1--146:??
Ghadeer O. Ghosheh and
Jin Li and
Tingting Zhu A Survey of Generative Adversarial
Networks for Synthesizing Structured
Electronic Health Records . . . . . . . 147:1--147:??
Matthew G. Gaber and
Mohiuddin Ahmed and
Helge Janicke Malware Detection with Artificial
Intelligence: a Systematic Literature
Review . . . . . . . . . . . . . . . . . 148:1--148:??
Matilde Pato and
Márcia Barros and
Francisco M. Couto Survey on Recommender Systems for
Biomedical Items in Life and Health
Sciences . . . . . . . . . . . . . . . . 149:1--149:??
Simon Razniewski and
Hiba Arnaout and
Shrestha Ghosh and
Fabian Suchanek Completeness, Recall, and Negation in
Open-world Knowledge Bases: a Survey . . 150:1--150:??
Huaming Chen and
M. Ali Babar Security for Machine Learning-based
Software Systems: a Survey of Threats,
Practices, and Challenges . . . . . . . 151:1--151:??
Kanghua Mo and
Peigen Ye and
Xiaojun Ren and
Shaowei Wang and
Wenjun Li and
Jin Li Security and Privacy Issues in Deep
Reinforcement Learning: Threats and
Countermeasures . . . . . . . . . . . . 152:1--152:??
Jianping Yao and
Son N. Tran and
Saurabh Garg and
Samantha Sawyer Deep Learning for Plant Identification
and Disease Classification from Leaf
Images: Multi-prediction Approaches . . 153:1--153:??
Simon Khan and
Charles Devlen and
Michael Manno and
Daqing Hou Mouse Dynamics Behavioral Biometrics: a
Survey . . . . . . . . . . . . . . . . . 154:1--154:??
Jack Hughes and
Sergio Pastrana and
Alice Hutchings and
Sadia Afroz and
Sagar Samtani and
Weifeng Li and
Ericsson Santana Marin The Art of Cybercrime Community Research 155:1--155:??
Budhitama Subagdja and
D. Shanthoshigaa and
Zhaoxia Wang and
Ah-Hwee Tan Machine Learning for Refining Knowledge
Graphs: a Survey . . . . . . . . . . . . 156:1--156:??
Maryam Zahid and
Alessio Bucaioni and
Francesco Flammini Model-based Trustworthiness Evaluation
of Autonomous Cyber-Physical Production
Systems: a Systematic Mapping Study . . 157:1--157:??
Mingliang Dou and
Jijun Tang and
Prayag Tiwari and
Yijie Ding and
Fei Guo Drug-Drug Interaction Relation
Extraction Based on Deep Learning: a
Review . . . . . . . . . . . . . . . . . 158:1--158:??
Jiahang Cao and
Jinyuan Fang and
Zaiqiao Meng and
Shangsong Liang Knowledge Graph Embedding: a Survey from
the Perspective of Representation Spaces 159:1--159:??
Marius Becherer and
Omar Khadeer Hussain and
Yu Zhang and
Frank den Hartog and
Elizabeth Chang On Trust Recommendations in the Social
Internet of Things --- A Survey . . . . 160:1--160:??
Giovanni Ciatto and
Federico Sabbatini and
Andrea Agiollo and
Matteo Magnini and
Andrea Omicini Symbolic Knowledge Extraction and
Injection with Sub-symbolic Predictors:
a Systematic Literature Review . . . . . 161:1--161:??
Roberta Calegari and
Fosca Giannotti and
Francesca Pratesi and
Michela Milano Introduction to Special Issue on
Trustworthy Artificial Intelligence . . 162:1--162:??
Peiyun Zhang and
Song Ding and
Qinglin Zhao Exploiting Blockchain to Make AI
Trustworthy: a Software Development
Lifecycle View . . . . . . . . . . . . . 163:1--163:??
Nicholas Conlon and
Nisar R. Ahmed and
Daniel Szafir A Survey of Algorithmic Methods for
Competency Self-Assessments in
Human-Autonomy Teaming . . . . . . . . . 164:1--164:??
Xiaodan Xing and
Huanjun Wu and
Lichao Wang and
Iain Stenson and
May Yong and
Javier Del Ser and
Simon Walsh and
Guang Yang Non-imaging Medical Data Synthesis for
Trustworthy AI: a Comprehensive Survey 165:1--165:??
Simon Caton and
Christian Haas Fairness in Machine Learning: a Survey 166:1--166:??
Ana C. Lorena and
Pedro Y. A. Paiva and
Ricardo B. C. Prudêncio Trusting My Predictions: On the Value of
Instance-Level Analysis . . . . . . . . 167:1--167:??
Stephanie Milani and
Nicholay Topin and
Manuela Veloso and
Fei Fang Explainable Reinforcement Learning: a
Survey and Comparative Review . . . . . 168:1--168:??
Rachid Guerraoui and
Nirupam Gupta and
Rafael Pinot Byzantine Machine Learning: a Primer . . 169:1--169:??
Adnan Qayyum and
Muhammad Atif Butt and
Hassan Ali and
Muhammad Usman and
Osama Halabi and
Ala Al-Fuqaha and
Qammer H. Abbasi and
Muhammad Ali Imran and
Junaid Qadir Secure and Trustworthy Artificial
Intelligence-extended Reality (AI-XR)
for Metaverses . . . . . . . . . . . . . 170:1--170:??
Mario Alfonso Prado-Romero and
Bardh Prenkaj and
Giovanni Stilo and
Fosca Giannotti A Survey on Graph Counterfactual
Explanations: Definitions, Methods,
Evaluation, and Research Challenges . . 171:1--171:??
Zhijing Wan and
Zhixiang Wang and
Cheukting Chung and
Zheng Wang A Survey of Dataset Refinement for
Problems in Computer Vision Datasets . . 172:1--172:??
Qinghua Lu and
Liming Zhu and
Xiwei Xu and
Jon Whittle and
Didar Zowghi and
Aurelie Jacquet Responsible AI Pattern Catalogue: a
Collection of Best Practices for AI
Governance and Engineering . . . . . . . 173:1--173:??
Peiyu Xiong and
Michael Tegegn and
Jaskeerat Singh Sarin and
Shubhraneel Pal and
Julia Rubin It Is All about Data: a Survey on the
Effects of Data on Adversarial
Robustness . . . . . . . . . . . . . . . 174:1--174:??
Tarek Chaalan and
Shaoning Pang and
Joarder Kamruzzaman and
Iqbal Gondal and
Xuyun Zhang The Path to Defence: a Roadmap to
Characterising Data Poisoning Attacks on
Victim Models . . . . . . . . . . . . . 175:1--175:??
Jon Perez-Cerrolaza and
Jaume Abella and
Markus Borg and
Carlo Donzella and
Jesús Cerquides and
Francisco J. Cazorla and
Cristofer Englund and
Markus Tauber and
George Nikolakopoulos and
Jose Luis Flores Artificial Intelligence for
Safety-Critical Systems in Industrial
and Transportation Domains: a Survey . . 176:1--176:??
Chuanjun Zhao and
Meiling Wu and
Xinyi Yang and
Wenyue Zhang and
Shaoxia Zhang and
Suge Wang and
Deyu Li A Systematic Review of Cross-Lingual
Sentiment Analysis: Tasks, Strategies,
and Prospects . . . . . . . . . . . . . 177:1--177:??
Jiliang Zhang and
Congcong Chen and
Jinhua Cui and
Keqin Li Timing Side-channel Attacks and
Countermeasures in CPU
Microarchitectures . . . . . . . . . . . 178:1--178:??
Jun Wook Heo and
Gowri Sankar Ramachandran and
Ali Dorri and
Raja Jurdak Blockchain Data Storage Optimisations: a
Comprehensive Survey . . . . . . . . . . 179:1--179:??
Cheng Zhang and
Bo Ou and
Fei Peng and
Yao Zhao and
Keqin Li A Survey on Reversible Data Hiding for
Uncompressed Images . . . . . . . . . . 180:1--180:??
Arian Bakhtiarnia and
Qi Zhang and
Alexandros Iosifidis Efficient High-Resolution Deep Learning:
a Survey . . . . . . . . . . . . . . . . 181:1--181:??
Andrey Rodrigues and
Maria Lúcia Villela and
Eduardo Feitosa A Systematic Mapping Study on Social
Network Privacy: Threats and Solutions 182:1--182:??
Kavous Salehzadeh Niksirat and
Lev Velykoivanenko and
Noé Zufferey and
Mauro Cherubini and
Kévin Huguenin and
Mathias Humbert Wearable Activity Trackers: a Survey on
Utility, Privacy, and Security . . . . . 183:1--183:??
Leila Methnani and
Manolis Chiou and
Virginia Dignum and
Andreas Theodorou Who's in Charge Here? A Survey on
Trustworthy AI in Variable Autonomy
Robotic Systems . . . . . . . . . . . . 184:1--184:??
Jiajia Wang and
Jimmy Xiangji Huang and
Xinhui Tu and
Junmei Wang and
Angela Jennifer Huang and
Md Tahmid Rahman Laskar and
Amran Bhuiyan Utilizing BERT for Information
Retrieval: Survey, Applications,
Resources, and Challenges . . . . . . . 185:1--185:??
Ali Shahidinejad and
Jemal Abawajy An All-Inclusive Taxonomy and Critical
Review of Blockchain-Assisted
Authentication and Session Key
Generation Protocols for IoT . . . . . . 186:1--186:??
Lihua Zhou and
Guowang Du and
Kevin Lü and
Lizheng Wang and
Jingwei Du A Survey and an Empirical Evaluation of
Multi-View Clustering Approaches . . . . 187:1--187:??
Yuyang Gao and
Siyi Gu and
Junji Jiang and
Sungsoo Ray Hong and
Dazhou Yu and
Liang Zhao Going Beyond XAI: a Systematic Survey
for Explanation-Guided Learning . . . . 188:1--188:??
Yang Liu and
Dingkang Yang and
Yan Wang and
Jing Liu and
Jun Liu and
Azzedine Boukerche and
Peng Sun and
Liang Song Generalized Video Anomaly Event
Detection: Systematic Taxonomy and
Comparison of Deep Models . . . . . . . 189:1--189:??
Luyao Yang and
Osama Amin and
Basem Shihada Intelligent Wearable Systems:
Opportunities and Challenges in Health
and Sports . . . . . . . . . . . . . . . 190:1--190:??
Yingxia Shao and
Hongzheng Li and
Xizhi Gu and
Hongbo Yin and
Yawen Li and
Xupeng Miao and
Wentao Zhang and
Bin Cui and
Lei Chen Distributed Graph Neural Network
Training: a Survey . . . . . . . . . . . 191:1--191:??
Shashank Sheshar Singh and
Samya Muhuri and
Shivansh Mishra and
Divya Srivastava and
Harish Kumar Shakya and
Neeraj Kumar Social Network Analysis: a Survey on
Process, Tools, and Application . . . . 192:1--192:??
Ruchika Malhotra and
Anjali Bansal and
Marouane Kessentini A Systematic Literature Review on
Maintenance of Software Containers . . . 193:1--193:??
Marco Kurzweg and
Yannick Weiss and
Marc O. Ernst and
Albrecht Schmidt and
Katrin Wolf Survey on Haptic Feedback through
Sensory Illusions in Interactive Systems 194:1--194:??
K. J. Jyothish and
Subhankar Mishra A Survey on Robotic Prosthetics:
Neuroprosthetics, Soft Actuators, and
Control Strategies . . . . . . . . . . . 195:1--195:??
Saleh Mohamed Alhidaifi and
Muhammad Rizwan Asghar and
Imran Shafique Ansari A Survey on Cyber Resilience: Key
Strategies, Research Challenges, and
Future Directions . . . . . . . . . . . 196:1--196:??
Karen Carrasco and
Lenin Tomalá and
Eileen Ramírez Meza and
Doris Meza Bolaños and
Washington Ramírez Montalvan Computational Techniques in PET/CT Image
Processing for Breast Cancer: a
Systematic Mapping Review . . . . . . . 197:1--197:??
Navin Keizer and
Onur Ascigil and
Michal Król and
Dirk Kutscher and
George Pavlou A Survey on Content Retrieval on the
Decentralised Web . . . . . . . . . . . 198:1--198:??
Ying Zhao and
Jia Tina Du and
Jinjun Chen Scenario-based Adaptations of
Differential Privacy: a Technical Survey 199:1--199:??
Isabela Borlido Barcelos and
Felipe De Castro Belém and
Leonardo De Melo João and
Zenilton K. G. Do Patrocínio and
Alexandre Xavier Falcão and
Silvio Jamil Ferzoli Guimarães A Comprehensive Review and New Taxonomy
on Superpixel Segmentation . . . . . . . 200:1--200:??
Weiwei Jiang and
Jorge Goncalves and
Vassilis Kostakos Mobile Near-infrared Sensing --- a
Systematic Review on Devices, Data,
Modeling, and Applications . . . . . . . 201:1--201:??
Mariana Segovia-Ferreira and
Jose Rubio-Hernan and
Ana Cavalli and
Joaquin Garcia-Alfaro A Survey on Cyber-Resilience Approaches
for Cyber-Physical Systems . . . . . . . 202:1--202:??
Bing Zhang and
Xuyang Zhao and
Jiangtian Nie and
Jianhang Tang and
Yuling Chen and
Yang Zhang and
Dusit Niyato Epidemic Model-based Network Influential
Node Ranking Methods: a Ranking
Rationality Perspective . . . . . . . . 203:1--203:??
Raza Nowrozy and
Khandakar Ahmed and
A. S. M. Kayes and
Hua Wang and
Timothy R. McIntosh Privacy Preservation of Electronic
Health Records in the Modern Era: a
Systematic Survey . . . . . . . . . . . 204:1--204:??
Sarah Elder and
Md Rayhanur Rahman and
Gage Fringer and
Kunal Kapoor and
Laurie Williams A Survey on Software Vulnerability
Exploitability Assessment . . . . . . . 205:1--205:??
Andre Rodrigues Oliveira and
Klairton Lima Brito and
Alexsandro Oliveira Alexandrino and
Gabriel Siqueira and
Ulisses Dias and
Zanoni Dias Rearrangement Distance Problems: an
updated survey . . . . . . . . . . . . . 206:1--206:??
Shubhra Jain and
Rahul Kumar Verma A Taxonomy and Survey on Grid-Based
Routing Protocols Designed for Wireless
Sensor Networks . . . . . . . . . . . . 207:1--207:??
Tommaso Lanciano and
Atsushi Miyauchi and
Adriano Fazzone and
Francesco Bonchi A Survey on the Densest Subgraph Problem
and its Variants . . . . . . . . . . . . 208:1--208:??
Maroua Masmoudi and
Sana Ben Abdallah Ben Lamine and
Mohamed Hedi Karray and
Bernard Archimede and
Hajer Baazaoui Zghal Semantic Data Integration and Querying:
a Survey and Challenges . . . . . . . . 209:1--209:??
Ahmed Amine Chafik and
Jaafar Gaber and
Souad Tayane and
Mohamed Ennaji and
Julien Bourgeois and
Tarek El Ghazawi From Conventional to Programmable Matter
Systems: a Review of Design, Materials,
and Technologies . . . . . . . . . . . . 210:1--210:??
Pengyuan Lu and
Lin Zhang and
Mengyu Liu and
Kaustubh Sridhar and
Oleg Sokolsky and
Fanxin Kong and
Insup Lee Recovery from Adversarial Attacks in
Cyber-physical Systems: Shallow, Deep,
and Exploratory Works . . . . . . . . . 211:1--211:??
Jason Gray and
Daniele Sgandurra and
Lorenzo Cavallaro and
Jorge Blasco Alis Identifying Authorship in Malicious
Binaries: Features, Challenges & Datasets 212:1--212:??
Akrati Saxena and
George Fletcher and
Mykola Pechenizkiy FairSNA: Algorithmic Fairness in Social
Network Analysis . . . . . . . . . . . . 213:1--213:??
Anna Angelogianni and
Ilias Politis and
Christos Xenakis How many FIDO protocols are needed?
Analysing the technology, security and
compliance . . . . . . . . . . . . . . . 214:1--214:??
Yazan Otoum and
Navya Gottimukkala and
Neeraj Kumar and
Amiya Nayak Machine Learning in Metaverse Security:
Current Solutions and Future Challenges 215:1--215:??
Fei Zhao and
Chengcui Zhang and
Baocheng Geng Deep Multimodal Data Fusion . . . . . . 216:1--216:??
Navid Mohammadi Foumani and
Lynn Miller and
Chang Wei Tan and
Geoffrey I. Webb and
Germain Forestier and
Mahsa Salehi Deep Learning for Time Series
Classification and Extrinsic Regression:
a Current Survey . . . . . . . . . . . . 217:1--217:??
Monowar Hasan and
Ashish Kashinath and
Chien-Ying Chen and
Sibin Mohan SoK: Security in Real-Time Systems . . . 218:1--218:??
Jasmina Gajcin and
Ivana Dusparic Redefining Counterfactual Explanations
for Reinforcement Learning: Overview,
Challenges and Opportunities . . . . . . 219:1--219:??
Kelvin Du and
Frank Xing and
Rui Mao and
Erik Cambria Financial Sentiment Analysis: Techniques
and Applications . . . . . . . . . . . . 220:1--220:??
Na Li and
Rui Zhou and
Bharath Krishna and
Ashirbad Pradhan and
Hyowon Lee and
Jiayuan He and
Ning Jiang Non-invasive Techniques for Muscle
Fatigue Monitoring: a Comprehensive
Survey . . . . . . . . . . . . . . . . . 221:1--221:??
Cristian Daniele and
Seyed Behnam Andarzian and
Erik Poll Fuzzers for Stateful Systems: Survey and
Research Directions . . . . . . . . . . 222:1--222:??
Kien Nguyen and
Hugo Proença and
Fernando Alonso-Fernandez Deep Learning for Iris Recognition: a
Survey . . . . . . . . . . . . . . . . . 223:1--223:??
Anita Khadka and
Saurav Sthapit and
Gregory Epiphaniou and
Carsten Maple Resilient Machine Learning: Advancement,
Barriers, and Opportunities in the
Nuclear Industry . . . . . . . . . . . . 224:1--224:??
Shuai Huo and
Dong Liu and
Haotian Zhang and
Li Li and
Siwei Ma and
Feng Wu and
Wen Gao Towards Hybrid-Optimization Video Coding 225:1--225:??
Najah Abed Abu Ali and
Mubashir Rehman and
Shahid Mumtaz and
Muhammad Bilal Khan and
Mohammad Hayajneh and
Farman Ullah and
Raza Ali Shah Contactless Diseases Diagnoses Using
Wireless Communication Sensing: Methods
and Challenges Survey . . . . . . . . . 226:1--226:??
Upendra Singh and
Kumar Abhishek and
Hiteshwar Kumar Azad A Survey of Cutting-edge Multimodal
Sentiment Analysis . . . . . . . . . . . 227:1--227:??
Shiyu Wang and
Yuanqi Du and
Xiaojie Guo and
Bo Pan and
Zhaohui Qin and
Liang Zhao Controllable Data Generation by Deep
Learning: a Review . . . . . . . . . . . 228:1--228:??
Felix Truger and
Johanna Barzen and
Marvin Bechtold and
Martin Beisel and
Frank Leymann and
Alexander Mandl and
Vladimir Yussupov Warm-Starting and Quantum Computing: a
Systematic Mapping Study . . . . . . . . 229:1--229:??
Junyi Li and
Tianyi Tang and
Wayne Xin Zhao and
Jian-Yun Nie and
Ji-Rong Wen Pre-Trained Language Models for Text
Generation: a Survey . . . . . . . . . . 230:1--230:??
Ricardo Amaro and
Rúben Pereira and
Miguel Mira da Silva DevOps Metrics and KPIs: a Multivocal
Literature Review . . . . . . . . . . . 231:1--231:??
Siwen Luo and
Hamish Ivison and
Soyeon Caren Han and
Josiah Poon Local Interpretations for Explainable
Natural Language Processing: a Survey 232:1--232:??
Saima Sultana and
Muhammad Mansoor Alam and
Mazliham Mohd Su'ud and
Jawahir Che Mustapha and
Mukesh Prasad A Deep Dive into Robot Vision --- an
Integrative Systematic Literature Review
Methodologies and Research Endeavor
Practices . . . . . . . . . . . . . . . 233:1--233:??
Laércio Pioli and
Douglas D. J. de Macedo and
Daniel G. Costa and
Mario A. R. Dantas Intelligent Edge-powered Data Reduction:
a Systematic Literature Review . . . . . 234:1--234:??
Weiqi Li Optimizing with Attractor: a Tutorial 235:1--235:??
Gyuwon Jung and
Sangjun Park and
Eun-Yeol Ma and
Heeyoung Kim and
Uichin Lee Tutorial on Matching-based Causal
Analysis of Human Behaviors Using
Smartphone Sensor Data . . . . . . . . . 236:1--236:??
A'aeshah Alhakamy Extended Reality (XR) Toward Building
Immersive Solutions: The Key to
Unlocking Industry 4.0 . . . . . . . . . 237:1--237:??
Pau-Chen Cheng and
Wojciech Ozga and
Enriquillo Valdez and
Salman Ahmed and
Zhongshu Gu and
Hani Jamjoom and
Hubertus Franke and
James Bottomley Intel TDX Demystified: a Top-Down
Approach . . . . . . . . . . . . . . . . 238:1--238:??
Giovanni Maria Biancofiore and
Yashar Deldjoo and
Tommaso Di Noia and
Eugenio Di Sciascio and
Fedelucio Narducci Interactive Question Answering Systems:
Literature Review . . . . . . . . . . . 239:1--239:??
Lingyun Wang and
Hanlin Zhou and
Yinwei Bao and
Xiaoran Yan and
Guojiang Shen and
Xiangjie Kong Horizontal Federated Recommender System:
a Survey . . . . . . . . . . . . . . . . 240:1--240:??
Priyanshu Priya and
Mauajama Firdaus and
Asif Ekbal Computational Politeness in Natural
Language Processing: a Survey . . . . . 241:1--241:??
Minghui Xu and
Yihao Guo and
Chunchi Liu and
Qin Hu and
Dongxiao Yu and
Zehui Xiong and
Niyato, Dusit (Tao) and
Xiuzhen Cheng Exploring Blockchain Technology through
a Modular Lens: a Survey . . . . . . . . 242:1--242:??
Jean-Gabriel Gaudreault and
Paula Branco A Systematic Literature Review of
Novelty Detection in Data Streams:
Challenges and Opportunities . . . . . . 243:1--243:??
Huiyuan Lai and
Malvina Nissim A Survey on Automatic Generation of
Figurative Language: From Rule-based
Systems to Large Language Models . . . . 244:1--244:??
Xiaojie Wang and
Qi Guo and
Zhaolong Ning and
Lei Guo and
Guoyin Wang and
Xinbo Gao and
Yan Zhang Integration of Sensing, Communication,
and Computing for Metaverse: a Survey 245:1--245:??
Alvaro Novo and
Francisco Lobon and
Hector Garcia de Marina and
Samuel Romero and
Francisco Barranco Neuromorphic Perception and Navigation
for Mobile Robots: a Review . . . . . . 246:1--246:??
Meng Shen and
Zhehui Tan and
Dusit Niyato and
Yuzhi Liu and
Jiawen Kang and
Zehui Xiong and
Liehuang Zhu and
Wei Wang and
Shen, Xuemin (Sherman) Artificial Intelligence for Web 3.0: a
Comprehensive Survey . . . . . . . . . . 247:1--247:??
Max Sponner and
Bernd Waschneck and
Akash Kumar Adapting Neural Networks at Runtime:
Current Trends in At-Runtime
Optimizations for Deep Learning . . . . 248:1--248:??
Juncheng Li and
Zehua Pei and
Wenjie Li and
Guangwei Gao and
Longguang Wang and
Yingqian Wang and
Tieyong Zeng A Systematic Survey of Deep
Learning-Based Single-Image
Super-Resolution . . . . . . . . . . . . 249:1--249:??
Hilda Hadan and
Lydia Choong and
Leah Zhang-Kennedy and
Lennart E. Nacke Deceived by Immersion: a Systematic
Analysis of Deceptive Design in Extended
Reality . . . . . . . . . . . . . . . . 250:1--250:??
Muhammad Adil and
Houbing Song and
Mian Ahmad Jan and
Muhammad Khurram Khan and
Xiangjian He and
Ahmed Farouk and
Zhanpeng Jin UAV-Assisted IoT Applications, QoS
Requirements and Challenges with Future
Research Directions . . . . . . . . . . 251:1--251:??
Yoosof Mashayekhi and
Nan Li and
Bo Kang and
Jefrey Lijffijt and
Tijl De Bie A Challenge-based Survey of
E-recruitment Recommendation Systems . . 252:1--252:??
Paul Kiyambu Mvula and
Paula Branco and
Guy-Vincent Jourdan and
Herna Lydia Viktor A Survey on the Applications of
Semi-supervised Learning to
Cyber-security . . . . . . . . . . . . . 253:1--253:??
Rita Suzana Pitangueira Maciel and
Pedro Henrique Dias Valle and
Kécia Souza Santos and
Elisa Yumi Nakagawa Systems Interoperability Types: a
Tertiary Study . . . . . . . . . . . . . 254:1--254:??
Gita Sarafraz and
Armin Behnamnia and
Mehran Hosseinzadeh and
Ali Balapour and
Amin Meghrazi and
Hamid R. Rabiee Domain Adaptation and Generalization of
Functional Medical Data: a Systematic
Survey of Brain Data . . . . . . . . . . 255:1--255:??
Paulo Souza and
Tiago Ferreto and
Rodrigo Calheiros Maintenance Operations on Cloud, Edge,
and IoT Environments: Taxonomy, Survey,
and Research Challenges . . . . . . . . 256:1--256:??
James Halvorsen and
Clemente Izurieta and
Haipeng Cai and
Assefaw Gebremedhin Applying Generative Machine Learning to
Intrusion Detection: a Systematic
Mapping Study and Review . . . . . . . . 257:1--257:??
Yanna Jiang and
Baihe Ma and
Xu Wang and
Guangsheng Yu and
Ping Yu and
Zhe Wang and
Wei Ni and
Ren Ping Liu Blockchained Federated Learning for
Internet of Things: a Comprehensive
Survey . . . . . . . . . . . . . . . . . 258:1--258:??
Vasileios Tsoukas and
Anargyros Gkogkidis and
Eleni Boumpa and
Athanasios Kakarountas A Review on the emerging technology of
TinyML . . . . . . . . . . . . . . . . . 259:1--259:??
Mishri AlMarshoud and
Mehmet Sabir Kiraz and
Ali H. Al-Bayatti Security, Privacy, and Decentralized
Trust Management in VANETs: a Review of
Current Research and Future Directions 260:1--260:??
Jiani Huang and
Haihua Chen and
Fengchang Yu and
Wei Lu From Detection to Application: Recent
Advances in Understanding Scientific
Tables and Figures . . . . . . . . . . . 261:1--261:??
Jiajun Wu and
Fan Dong and
Henry Leung and
Zhuangdi Zhu and
Jiayu Zhou and
Steve Drew Topology-aware Federated Learning in
Edge Computing: a Comprehensive Survey 262:1--262:??
Mostafa Haghir Chehreghani A Review on the Impact of Data
Representation on Model Explainability 263:1--263:??
Paul Pu Liang and
Amir Zadeh and
Louis-Philippe Morency Foundations & Trends in Multimodal
Machine Learning: Principles,
Challenges, and Open Questions . . . . . 264:1--264:??
Kartik Sharma and
Yeon-Chang Lee and
Sivagami Nambi and
Aditya Salian and
Shlok Shah and
Sang-Wook Kim and
Srijan Kumar A Survey of Graph Neural Networks for
Social Recommender Systems . . . . . . . 265:1--265:??
Chamara Sandeepa and
Bartlomiej Siniarski and
Nicolas Kourtellis and
Shen Wang and
Madhusanka Liyanage A Survey on Privacy of Personal and
Non-Personal Data in B5G/6G Networks . . 266:1--266:??
Hou-I Liu and
Marco Galindo and
Hongxia Xie and
Lai-Kuan Wong and
Hong-Han Shuai and
Yung-Hui Li and
Wen-Huang Cheng Lightweight Deep Learning for
Resource-Constrained Environments: a
Survey . . . . . . . . . . . . . . . . . 267:1--267:??
Shangsong Liang and
Zhou Pan and
wei liu and
Jian Yin and
Maarten de Rijke A Survey on Variational Autoencoders in
Recommender Systems . . . . . . . . . . 268:1--268:??
Jirat Pasuksmit and
Patanamon Thongtanunam and
Shanika Karunasekera A Systematic Literature Review on
Reasons and Approaches for Accurate
Effort Estimations in Agile . . . . . . 269:1--269:??
Alexandre Heuillet and
Ahmad Nasser and
Hichem Arioui and
Hedi Tabia Efficient Automation of Neural Network
Design: a Survey on Differentiable
Neural Architecture Search . . . . . . . 270:1--270:??
Anthony Paproki and
Olivier Salvado and
Clinton Fookes Synthetic Data for Deep Learning in
Computer Vision & Medical Imaging: a
Means to Reduce Data Bias . . . . . . . 271:1--271:??
Carlos Núñez-Molina and
Pablo Mesejo and
Juan Fernández-Olivares A Review of Symbolic, Subsymbolic and
Hybrid Methods for Sequential Decision
Making . . . . . . . . . . . . . . . . . 272:1--272:??
Wanying Liang and
Pasquale De Meo and
Yong Tang and
Jia Zhu A Survey of Multi-modal Knowledge
Graphs: Technologies and Trends . . . . 273:1--273:??
Karolina Selwon and
Julian Szyma\'nski A Review of Explainable Fashion
Compatibility Modeling Methods . . . . . 274:1--274:??
Shashikiran Venkatesha and
Ranjani Parthasarathi Survey on Redundancy Based-Fault
tolerance methods for Processors and
Hardware accelerators --- Trends in
Quantum Computing, Heterogeneous Systems
and Reliability . . . . . . . . . . . . 275:1--275:??
Jordan Tewell and
Nimesha Ranasinghe A Review of Olfactory Display Designs
for Virtual Reality Environments . . . . 276:1--276:??
Maryam Mozaffari and
Anton Dignös and
Johann Gamper and
Uta Störl Self-tuning Database Systems: a
Systematic Literature Review of
Automatic Database Schema Design and
Tuning . . . . . . . . . . . . . . . . . 277:1--277:??
Tristan Bilot and
Nour El Madhoun and
Khaldoun Al Agha and
Anis Zouaoui A Survey on Malware Detection with Graph
Representation Learning . . . . . . . . 278:1--278:??
Zhen Jia and
Zhang Zhang and
Liang Wang and
Tieniu Tan Human Image Generation: a Comprehensive
Survey . . . . . . . . . . . . . . . . . 279:1--279:??
Ankur Gupta and
Sahil Sawhney and
Kashyap Kompella The First Principles: Setting the
Context for a Safe and Secure Metaverse 280:1--280:??
Fan Mo and
Zahra Tarkhani and
Hamed Haddadi Machine Learning with Confidential
Computing: a Systematization of
Knowledge . . . . . . . . . . . . . . . 281:1--281:??
Francesco Periti and
Stefano Montanelli Lexical Semantic Change through Large
Language Models: a Survey . . . . . . . 282:1--282:??
Giorgio Franceschelli and
Mirco Musolesi Creativity and Machine Learning: a
Survey . . . . . . . . . . . . . . . . . 283:1--283:??
Nilotpal Biswas and
Anamitra Mukherjee and
Samit Bhattacharya ``Are you feeling sick?'' --- a
systematic literature review of
cybersickness in virtual reality . . . . 284:1--284:??
Luís Manuel Meruje Ferreira and
Fabio Coelho and
José Pereira Databases in Edge and Fog Environments:
a Survey . . . . . . . . . . . . . . . . 285:1--285:??
Behrouz Zolfaghari and
Mostafa Abbasmollaei and
Fahimeh Hajizadeh and
Naoto Yanai and
Khodakhast Bibak Secure UAV (Drone) and the Great Promise
of AI . . . . . . . . . . . . . . . . . 286:1--286:??
Adyasha Dash and
Kathleen Agres AI-Based Affective Music Generation
Systems: a Review of Methods and
Challenges . . . . . . . . . . . . . . . 287:1--287:??
Yiming Wang and
Bin Zhang and
Lamei Di Research Progress of EEG-Based Emotion
Recognition: a Survey . . . . . . . . . 288:1--288:??
Jessica Woodgate and
Nirav Ajmeri Macro Ethics Principles for Responsible
AI Systems: Taxonomy and Directions . . 289:1--289:??
Debendra Das Sharma and
Robert Blankenship and
Daniel Berger An Introduction to the Compute Express
Link (CXL) Interconnect . . . . . . . . 290:1--290:??
Fabio De Sousa Ribeiro and
Kevin Duarte and
Miles Everett and
Georgios Leontidis and
Mubarak Shah Object-centric Learning with Capsule
Networks: a Survey . . . . . . . . . . . 291:1--291:??
Katrin Hartwig and
Frederic Doell and
Christian Reuter The Landscape of User-centered
Misinformation Interventions --- a
Systematic Literature Review . . . . . . 292:1--292:??
Xiaoyan Zhao and
Yang Deng and
Min Yang and
Lingzhi Wang and
Rui Zhang and
Hong Cheng and
Wai Lam and
Ying Shen and
Ruifeng Xu A Comprehensive Survey on Relation
Extraction: Recent Advances and New
Frontiers . . . . . . . . . . . . . . . 293:1--293:??
Hassan Gharoun and
Fereshteh Momenifar and
Fang Chen and
Amir Gandomi Meta-learning Approaches for Few-Shot
Learning: a Survey of Recent Advances 294:1--294:??
Shijie Chen and
Yu Zhang and
Qiang Yang Multi-Task Learning in Natural Language
Processing: an Overview . . . . . . . . 295:1--295:??
Jiaxu Leng and
Yongming Ye and
Mengjingcheng Mo and
Chenqiang Gao and
Ji Gan and
Bin Xiao and
Xinbo Gao Recent Advances for Aerial Object
Detection: a Survey . . . . . . . . . . 296:1--296:??
Bruce X. B. Yu and
Jianlong Chang and
Haixin Wang and
Lingbo Liu and
Shijie Wang and
Zhiyu Wang and
Junfan Lin and
Lingxi Xie and
Haojie Li and
Zhouchen Lin and
Qi Tian and
Chang Wen Chen Visual Tuning . . . . . . . . . . . . . 297:1--297:??
Wei Liang and
Yaqin Liu and
Ce Yang and
Songyou Xie and
Kuanching Li and
Willy Susilo On Identity, Transaction, and Smart
Contract Privacy on Permissioned and
Permissionless Blockchain: a
Comprehensive Survey . . . . . . . . . . 298:1--298:??
Zain Ul Abideen and
Sumathi Gokulanathan and
Muayad J. Aljafar and
Samuel Pagliarini An Overview of FPGA-inspired Obfuscation
Techniques . . . . . . . . . . . . . . . 299:1--299:??
Jacob Krüger and
Yi Li and
Kirill Lossev and
Chenguang Zhu and
Marsha Chechik and
Thorsten Berger and
Julia Rubin A Meta-Study of Software-Change
Intentions . . . . . . . . . . . . . . . 300:1--300:??
Katie Seaborn and
Jaqueline Urakami and
Peter Pennefather and
Norihisa Miyake Qualitative Approaches to Voice UX . . . 301:1--301:??
Agnaldo de Souza Batista and
Aldri Luiz Dos Santos A Survey on Resilience in Information
Sharing on Networks: Taxonomy and
Applied Techniques . . . . . . . . . . . 302:1--302:??
Raphael Elikplim Nkrow and
Bruno Silva and
Dutliff Boshoff and
Gerhard Hancke and
Mikael Gidlund and
Adnan Abu-Mahfouz NLOS Identification and Mitigation for
Time-based Indoor Localization Systems:
Survey and Future Research Directions 303:1--303:??
Fei Yu and
Hongbo Zhang and
Prayag Tiwari and
Benyou Wang Natural Language Reasoning, A Survey . . 304:1--304:??
Mahmoud Salaheldin Kasem and
Abdelrahman Abdallah and
Alexander Berendeyev and
Ebrahem Elkady and
Mohamed Mahmoud and
Mahmoud Abdalla and
Mohamed Hamada and
Sebastiano Vascon and
Daniyar Nurseitov and
Islam Taj-Eddin Deep Learning for Table Detection and
Structure Recognition: a Survey . . . . 305:1--305:??
Shaoxiong Ji and
Xiaobo Li and
Wei Sun and
Hang Dong and
Ara Taalas and
Yijia Zhang and
Honghan Wu and
Esa Pitkänen and
Pekka Marttinen A Unified Review of Deep Learning for
Automated Medical Coding . . . . . . . . 306:1--306:??
Huandong Wang and
Huan Yan and
Can Rong and
Yuan Yuan and
Fenyu Jiang and
Zhenyu Han and
Hongjie Sui and
Depeng Jin and
Yong Li Multi-scale Simulation of Complex
Systems: a Perspective of Integrating
Knowledge and Data . . . . . . . . . . . 307:1--307:??
Nirupama Ravi and
C. Mani Krishna and
Israel Koren Mix-Zones as an Effective Privacy
Enhancing Technique in Mobile and
Vehicular Ad-hoc Networks . . . . . . . 308:1--308:??
Yao Wan and
Zhangqian Bi and
Yang He and
Jianguo Zhang and
Hongyu Zhang and
Yulei Sui and
Guandong Xu and
Hai Jin and
Philip Yu Deep Learning for Code Intelligence:
Survey, Benchmark and Toolkit . . . . . 309:1--309:??
Pietro Melzi and
Christian Rathgeb and
Ruben Tolosana and
Ruben Vera-Rodriguez and
Christoph Busch An Overview of Privacy-Enhancing
Technologies in Biometric Recognition 310:1--310:??
Lianying Zhao and
He Shuang and
Shengjie Xu and
Wei Huang and
Rongzhen Cui and
Pushkar Bettadpur and
David Lie A Survey of Hardware Improvements to
Secure Program Execution . . . . . . . . 311:1--311:??
Sahil Verma and
Varich Boonsanong and
Minh Hoang and
Keegan Hines and
John Dickerson and
Chirag Shah Counterfactual Explanations and
Algorithmic Recourses for Machine
Learning: a Review . . . . . . . . . . . 312:1--312:??
Miguel G. Silva and
Sara C. Madeira and
Rui Henriques A Comprehensive Survey on
Biclustering-based Collaborative
Filtering . . . . . . . . . . . . . . . 313:1--313:??
Mohd Saqib and
Samaneh Mahdavifar and
Benjamin C. M. Fung and
Philippe Charland A Comprehensive Analysis of Explainable
AI for Malware Hunting . . . . . . . . . 314:1--314:??
Uchitha Rajapaksha and
Ferdous Sohel and
Hamid Laga and
Dean Diepeveen and
Mohammed Bennamoun Deep Learning-based Depth Estimation
Methods from Monocular Image and Videos:
a Comprehensive Survey . . . . . . . . . 315:1--315:??
Junxue Zhang and
Xiaodian Cheng and
Liu Yang and
Jinbin Hu and
Ximeng Liu and
Kai Chen SoK: Fully Homomorphic Encryption
Accelerators . . . . . . . . . . . . . . 316:1--316:??
Yuecong Xu and
Haozhi Cao and
Lihua Xie and
Xiao-li Li and
Zhenghua Chen and
Jianfei Yang Video Unsupervised Domain Adaptation
with Deep Learning: a Comprehensive
Survey . . . . . . . . . . . . . . . . . 317:1--317:??
Hannes Mandler and
Bernhard Weigand A review and benchmark of feature
importance methods for neural networks 318:1--318:??
Jingxue Chen and
Hang Yan and
Zhiyuan Liu and
Min Zhang and
Hu Xiong and
Shui Yu When Federated Learning Meets
Privacy-Preserving Computation . . . . . 319:1--319:??
Hakimeh Mazaheri and
Salman Goli and
Ali Nourollah A survey of $3$D Space Path-Planning
Methods and Algorithms . . . . . . . . . 1:1--1:??
Ziyao Liu and
Yu Jiang and
Jiyuan Shen and
Minyi Peng and
Kwok-Yan Lam and
Xingliang Yuan and
Xiaoning Liu A Survey on Federated Unlearning:
Challenges, Methods, and Future
Directions . . . . . . . . . . . . . . . 2:1--2:??
Thanh Toan Nguyen and
Nguyen Quoc Viet hung and
Thanh Tam Nguyen and
Thanh Trung Huynh and
Thanh Thi Nguyen and
Matthias Weidlich and
Hongzhi Yin Manipulating Recommender Systems: a
Survey of Poisoning Attacks and
Countermeasures . . . . . . . . . . . . 3:1--3:??
Can Rong and
Jingtao Ding and
Yong Li An Interdisciplinary Survey on
Origin-destination Flows Modeling:
Theory and Techniques . . . . . . . . . 4:1--4:??
Imran Ashraf and
Yousaf Bin Zikria and
Sahil Garg and
Soojung Hur and
Yongwan Park and
Mohsen Guizani Enabling Technologies and Techniques for
Floor Identification . . . . . . . . . . 5:1--5:??
Chamath Amarasinghe and
Nimesha Ranasinghe Digital Food Sensing and Ingredient
Analysis Techniques to Facilitate
Human-Food Interface Designs . . . . . . 6:1--6:??
Ansam Khraisat and
Ammar Alazab and
Sarabjot Singh and
Tony Jan and
Alfredo Jr. Gomez Survey on Federated Learning for
Intrusion Detection System: Concept,
Architectures, Aggregation Strategies,
Challenges, and Future Directions . . . 7:1--7:??
Yao Zhao and
Youyang Qu and
Yong Xiang and
Md Palash Uddin and
Dezhong Peng and
Longxiang Gao A Comprehensive Survey on Edge Data
Integrity Verification: Fundamentals and
Future Trends . . . . . . . . . . . . . 8:1--8:??
Gayathri T. and
Mamatha HR How to Improve Video Analytics with
Action Recognition: a Survey . . . . . . 9:1--9:??
Longbing Cao and
Qing Liu COVID-19 Modeling: a Review . . . . . . 10:1--10:??
Abel Goedegebuure and
Indika Kumara and
Stefan Driessen and
Willem-Jan Van Den Heuvel and
Geert Monsieur and
Damian Andrew Tamburri and
Dario Di Nucci Data Mesh: a Systematic Gray Literature
Review . . . . . . . . . . . . . . . . . 11:1--11:??
Bader Al-Sada and
Alireza Sadighian and
Gabriele Oligeri MITRE ATT&CK: State of the Art and Way
Forward . . . . . . . . . . . . . . . . 12:1--12:??
Abdul Razzaq and
Jim Buckley and
Qin Lai and
Tingting Yu and
Goetz Botterweck A Systematic Literature Review on the
Influence of Enhanced Developer
Experience on Developers' Productivity:
Factors, Practices, and Recommendations 13:1--13:??
Kathryn Kasmarik and
Mahtab Khani and
Shadi Abpeikar and
Michael Barlow and
Olivia Carter and
Muireann Irish Competence Awareness for Humans and
Machines: a Survey and Future Research
Directions from Psychology . . . . . . . 14:1--14:??
Zahra Zamanzadeh Darban and
Geoffrey I. Webb and
Shirui Pan and
Charu Aggarwal and
Mahsa Salehi Deep Learning for Time Series Anomaly
Detection: a Survey . . . . . . . . . . 15:1--15:??
Farhana Sharief and
Humaira Ijaz and
Mohammad Shojafar and
Muhammad Asif Naeem Multi-Class Imbalanced Data Handling
with Concept Drift in Fog Computing: a
Taxonomy, Review, and Future Directions 16:1--16:??
Chayan Banerjee and
Kien Nguyen and
Clinton Fookes and
Karniadakis George Physics-Informed Computer Vision: a
Review and Perspectives . . . . . . . . 17:1--17:??
Timothy McIntosh and
Teo Susnjak and
Tong Liu and
Dan Xu and
Paul Watters and
Dongwei Liu and
Yaqi Hao and
Alex Ng and
Malka Halgamuge Ransomware Reloaded: Re-examining Its
Trend, Research and Mitigation in the
Era of Data Exfiltration . . . . . . . . 18:1--18:??
Branislav Pecher and
Ivan Srba and
Maria Bielikova A Survey on Stability of Learning with
Limited Labelled Data and its
Sensitivity to the Effects of Randomness 19:1--19:??
Bakary Badjie and
José Cecílio and
Antonio Casimiro Adversarial Attacks and Countermeasures
on Image Classification-based Deep
Learning Models in Autonomous Driving
Systems: a Systematic Review . . . . . . 20:1--20:??
Ahmed Fahmin and
Muhammad Aamir Cheema and
Mohammed Eunus Ali and
Adel Nadjaran Toosi and
Hua Lu and
Huan Li and
David Taniar and
Hesham A. Rakha and
Bojie Shen Eco-Friendly Route Planning Algorithms:
Taxonomies, Literature Review and Future
Directions . . . . . . . . . . . . . . . 21:1--21:??
Daniela Pais and
Susana Brás and
Raquel Sebastião A Review on the Use of Physiological
Signals for Assessing Postoperative Pain 22:1--22:??
Ruyan Lin and
Yulong Fu and
Wei Yi and
Jincheng Yang and
Jin Cao and
Zhiqiang Dong and
Fei Xie and
Hui Li Vulnerabilities and Security Patches
Detection in OSS: a Survey . . . . . . . 23:1--23:??
Leandro Lanzieri and
Gianluca Martino and
Goerschwin Fey and
Holger Schlarb and
Thomas C. Schmidt and
Matthias Wählisch A Review of Techniques for Ageing
Detection and Monitoring on Embedded
Systems . . . . . . . . . . . . . . . . 24:1--24:??
Matineh Pooshideh and
Amin Beheshti and
Yuankai Qi and
Helia Farhood and
Mike Simpson and
Nick Gatland and
Mehdi Soltany Presentation Attack Detection: a
Systematic Literature Review . . . . . . 25:1--25:??
Qidong Liu and
Jiaxi Hu and
Yutian Xiao and
Xiangyu Zhao and
Jingtong Gao and
Wanyu Wang and
Qing Li and
Jiliang Tang Multimodal Recommender Systems: a Survey 26:1--26:??
Lingkai Meng and
Yu Shao and
Long Yuan and
Longbin Lai and
Peng Cheng and
Xue Li and
Wenyuan Yu and
Wenjie Zhang and
Xuemin Lin and
Jingren Zhou A Survey of Distributed Graph Algorithms
on Massive Graphs . . . . . . . . . . . 27:1--27:??
Zhenyu Yang and
Ge Zhang and
Jia Wu and
Jian Yang and
Quan Z. Sheng and
Shan Xue and
Chuan Zhou and
Charu Aggarwal and
Hao Peng and
Wenbin Hu and
Edwin Hancock and
Pietro Li\`o State of the Art and Potentialities of
Graph-level Learning . . . . . . . . . . 28:1--28:??
Anqi Wang and
Jiahua Dong and
Lik-Hang Lee and
Jiachuan Shen and
Pan Hui A Survey on Deep Learning for Design and
Generation of Virtual Architecture . . . 29:1--29:??
Tianyu Zhang and
Gang Wang and
Chuanyu Xue and
Jiachen Wang and
Mark Nixon and
Song Han Time-Sensitive Networking (TSN) for
Industrial Automation: Current Advances
and Future Directions . . . . . . . . . 30:1--30:??
Sravan S. S. and
Susmita Mandal and
PJA Alphonse and
P. L. Ramesh A Partial Offline Payment System for
Connecting the Unconnected Using
Internet of Things: a Survey . . . . . . 31:1--31:??
Zhiyuan Wei and
Jing Sun and
Zijian Zhang and
Xianhao Zhang and
Xiaoxuan Yang and
Liehuang Zhu Survey on Quality Assurance of Smart
Contracts . . . . . . . . . . . . . . . 32:1--32:??
Meike Helena Kombrink and
Zeno Jean Marius Hubert Geradts and
Marcel Worring Image Steganography Approaches and Their
Detection Strategies: a Survey . . . . . 33:1--33:??
Manali Patel and
Krupa Jariwala and
Chiranjoy Chattopadhyay A Systematic Review on Graph Neural
Network-based Methods for Stock Market
Forecasting . . . . . . . . . . . . . . 34:1--34:??
Xiaohan Zhang and
Cen Zhang and
Xinghua Li and
Zhengjie Du and
Bing Mao and
Yuekang Li and
Yaowen Zheng and
Yeting Li and
Li Pan and
Yang Liu and
Robert Deng A Survey of Protocol Fuzzing . . . . . . 35:1--35:??
Kai Huang and
Zhengzi Xu and
Su Yang and
Hongyu Sun and
Xuejun Li and
Zheng Yan and
Yuqing Zhang Evolving Paradigms in Automated Program
Repair: Taxonomy, Challenges, and
Opportunities . . . . . . . . . . . . . 36:1--36:??
Chengtai Cao and
Fan Zhou and
Yurou Dai and
Jianping Wang and
Kunpeng Zhang A Survey of Mix-based Data Augmentation:
Taxonomy, Methods, Applications, and
Explainability . . . . . . . . . . . . . 37:1--37:??
Rahul Kumar and
Manish Bhanu and
João Mendes-Moreira and
Joydeep Chandra Spatio-Temporal Predictive Modeling
Techniques for Different Domains: a
Survey . . . . . . . . . . . . . . . . . 38:1--38:??
Xiuting Ge and
Chunrong Fang and
Xuanye Li and
Weisong Sun and
Daoyuan Wu and
Juan Zhai and
Shang-Wei Lin and
Zhihong Zhao and
Yang Liu and
Zhenyu Chen Machine Learning for Actionable Warning
Identification: a Comprehensive Survey 39:1--39:??
Zihao Li and
Chao Yang and
Yakun Chen and
Xianzhi Wang and
Hongxu Chen and
Guandong Xu and
Lina Yao and
Michael Sheng Graph and Sequential Neural Networks in
Session-based Recommendation: a Survey 40:1--40:??
Zhen Xing and
Qijun Feng and
Haoran Chen and
Qi Dai and
Han Hu and
Hang Xu and
Zuxuan Wu and
Yu-Gang Jiang A Survey on Video Diffusion Models . . . 41:1--41:??
Fatemeh Jalalvand and
Mohan Baruwal Chhetri and
Surya Nepal and
Cecile Paris Alert Prioritisation in Security
Operations Centres: a Systematic Survey
on Criteria and Methods . . . . . . . . 42:1--42:??
Francisco Silva and
Hélder P. Oliveira and
Tania Pereira Causal representation learning through
higher-level information extraction . . 43:1--43:??
Álvaro Sobrinho and
Matheus Vilarim and
Amanda Barbosa and
Edmar Candeia Gurjão and
Danilo F. S. Santos and
Dalton Valadares and
Leandro Dias da Silva Challenges and Opportunities in Mobile
Network Security for Vertical
Applications: a Survey . . . . . . . . . 44:1--44:??
Yousra Javed and
Ayesha Sajid A Systematic Review of Privacy Policy
Literature . . . . . . . . . . . . . . . 45:1--45:??
Huiming Chen and
Huandong Wang and
Qingyue Long and
Depeng Jin and
Yong Li Advancements in Federated Learning:
Models, Methods, and Privacy . . . . . . 46:1--46:??
Aiwei Liu and
Leyi Pan and
Yijian Lu and
Jingjing Li and
Xuming Hu and
Xi Zhang and
Lijie Wen and
Irwin King and
Hui Xiong and
Philip Yu A Survey of Text Watermarking in the Era
of Large Language Models . . . . . . . . 47:1--47:??
Elena Battaglia and
Federico Peiretti and
Ruggero Gaetano Pensa Co-clustering: a Survey of the Main
Methods, Recent Trends, and Open
Problems . . . . . . . . . . . . . . . . 48:1--48:??
Tao Chen and
Liang Lv and
Di Wang and
Jing Zhang and
Yue Yang and
Zeyang Zhao and
Chen Wang and
Xiaowei Guo and
Hao Chen and
Qingye Wang and
Yufei Xu and
Qiming Zhang and
Bo Du and
Liangpei Zhang and
Dacheng Tao Empowering Agrifood System with
Artificial Intelligence: a Survey of the
Progress, Challenges and Opportunities 49:1--49:??
Adrien Bennetot and
Ivan Donadello and
Ayoub El Qadi El Haouari and
Mauro Dragoni and
Thomas Frossard and
Benedikt Wagner and
Anna Sarranti and
Silvia Tulli and
Maria Trocan and
Raja Chatila and
Andreas Holzinger and
Artur Davila Garcez and
Natalia Díaz-Rodríguez A Practical Tutorial on Explainable AI
Techniques . . . . . . . . . . . . . . . 50:1--50:??
Paulo Sérgio Almeida Approaches to Conflict-free Replicated
Data Types . . . . . . . . . . . . . . . 51:1--51:??
Bohan Liu and
Gongyuan Li and
He Zhang and
Yuzhe Jin and
Zikuan Wang and
Dong Shao The Gap Between Trustworthy AI Research
and Trustworthy Software Research: a
Tertiary Study . . . . . . . . . . . . . 52:1--52:??
Azhar Alsufyani and
Omer Rana and
Charith Perera Knowledge-based Cyber Physical Security
at Smart Home: a Review . . . . . . . . 53:1--53:??
Pranab Das and
Dilwar Hussain Mazumder A Comprehensive Survey of Studies on
Predicting Anatomical Therapeutic
Chemical Classes of Drugs . . . . . . . 54:1--54:??
Nima Shiri Harzevili and
Alvine Boaye Belle and
Junjie Wang and
Song Wang and
Jiang, Zhen Ming (Jack) and
Nachiappan Nagappan A Systematic Literature Review on
Automated Software Vulnerability
Detection Using Machine Learning . . . . 55:1--55:??
Mariano Albaladejo-González and
José A. Ruipérez-Valiente and
Félix Gmez Mármol Artificial Intelligence to Support the
Training and Assessment of
Professionals: a Systematic Literature
Review . . . . . . . . . . . . . . . . . 56:1--56:??
Li Shen and
Yan Sun and
Zhiyuan Yu and
Liang Ding and
Xinmei Tian and
Dacheng Tao On Efficient Training of Large-Scale
Deep Learning Models . . . . . . . . . . 57:1--57:??
Tianyi Wang and
Xin Liao and
Kam Pui Chow and
Xiaodong Lin and
Yinglong Wang Deepfake Detection: a Comprehensive
Survey from the Reliability Perspective 58:1--58:??
Song Wang and
Yaochen Zhu and
Haochen Liu and
Zaiyi Zheng and
Chen Chen and
Jundong Li Knowledge Editing for Large Language
Models: a Survey . . . . . . . . . . . . 59:1--59:??
Abishek Rao and
Shivani Aithal and
Sanjay Singh Single-Document Abstractive Text
Summarization: a Systematic Literature
Review . . . . . . . . . . . . . . . . . 60:1--60:??
Pankaj Dadure and
Partha Pakray and
Sivaji Bandyopadhyay Mathematical Information Retrieval: a
Review . . . . . . . . . . . . . . . . . 61:1--61:??
Bo Zhang and
Yansong Gao and
Boyu Kuang and
Changlong Yu and
Anmin Fu and
Willy Susilo A Survey on Advanced Persistent Threat
Detection: a Unified Framework,
Challenges, and Countermeasures . . . . 62:1--62:??
Muhammad Tariq and
Sohail Ahmad and
Mian Ahmad Jan and
Houbing Song Deep Learning Aided Intelligent
Reflective Surfaces for 6G: a Survey . . 63:1--63:??
María Gutiérrez and
M${}^a$ Ángeles Moraga and
Félix García and
Coral Calero Green IN Artificial Intelligence from a
Software Perspective: State-of-the-Art
and Green Decalogue . . . . . . . . . . 64:1--64:??
Muhammed Golec and
Guneet Kaur Walia and
Mohit Kumar and
Felix Cuadrado and
Sukhpal Singh Gill and
Steve Uhlig Cold Start Latency in Serverless
Computing: a Systematic Review,
Taxonomy, and Future Directions . . . . 65:1--65:??
Cláudio Gomes and
João Paulo Fernandes and
Gabriel Falcao and
Soummya Kar and
Sridhar Tayur A Systematic Mapping Study on Quantum
and Quantum-inspired Algorithms in
Operations Research . . . . . . . . . . 66:1--66:??
Bin Jiang and
Jiacheng Feng and
Xuerong Cui and
Jian Wang and
Yongxin Liu and
Houbing Song Security and Reliability of Internet of
Underwater Things: Architecture,
Challenges, and Opportunities . . . . . 67:1--67:??
Athira K. A. and
Divya Udayan J. and
Umashankar Subramaniam A Systematic Literature Review on
Multi-Robot Task Allocation . . . . . . 68:1--68:??
Sheng Zhou and
Hongjia Xu and
Zhuonan Zheng and
Jiawei Chen and
Zhao Li and
Jiajun Bu and
Jia Wu and
Xin Wang and
Wenwu Zhu and
Martin Ester A Comprehensive Survey on Deep
Clustering: Taxonomy, Challenges, and
Future Directions . . . . . . . . . . . 69:1--69:??
Chathurangi Shyalika and
Ruwan Wickramarachchi and
Amit P. Sheth A Comprehensive Survey on Rare Event
Prediction . . . . . . . . . . . . . . . 70:1--70:??
Qian Wang and
Hong-Ning Dai and
Jinghua Yang and
Cai Guo and
Peter Childs and
Maaike Kleinsmann and
Yike Guo and
Pan Wang Learning-based Artificial Intelligence
Artwork: Methodology Taxonomy and
Quality Evaluation . . . . . . . . . . . 71:1--71:??
Yogeswaranathan Kalyani and
Rem Collier The Role of Multi-Agents in Digital Twin
Implementation: Short Survey . . . . . . 72:1--72:??
Moetez Abdelhamid and
Layth Sliman and
Raoudha Ben Djemaa and
Guido Perboli A Review on Blockchain Technology,
Current Challenges, and AI-Driven
Solutions . . . . . . . . . . . . . . . 73:1--73:??
Xiaojie Wang and
Zhonghui Zhao and
Ling Yi and
Zhaolong Ning and
Lei Guo and
F. Richard Yu and
Song Guo A Survey on Security of UAV Swarm
Networks: Attacks and Countermeasures 74:1--74:??
Haseena Rahmath P and
Vishal Srivastava and
Kuldeep Chaurasia and
Roberto G. Pacheco and
Rodrigo S. Couto Early-Exit Deep Neural Network --- a
Comprehensive Survey . . . . . . . . . . 75:1--75:??
Sara Abdali and
Sina Shaham and
Bhaskar Krishnamachari Multi-modal Misinformation Detection:
Approaches, Challenges and Opportunities 76:1--76:??
Mohamed Mostafa and
Ahmad S Almogren and
Muhammad Al-Qurishi and
Majed Alrubaian Modality Deep-learning Frameworks for
Fake News Detection on Social Networks:
a Systematic Literature Review . . . . . 77:1--77:??
Baochen Yan and
Jiahe Lan and
Zheng Yan Backdoor Attacks against Voice
Recognition Systems: a Survey . . . . . 78:1--78:??
Junhao Dong and
Junxi Chen and
Xiaohua Xie and
Jianhuang Lai and
Hao Chen Survey on Adversarial Attack and Defense
for Medical Image Analysis: Methods and
Challenges . . . . . . . . . . . . . . . 79:1--79:??
Fatma-Zohra Hannou and
Maxime Lefrançois and
Pierre Jouvelot and
Victor Charpenay and
Antoine Zimmermann A Survey on IoT Programming Platforms: a
Business-Domain Experts Perspective . . 80:1--80:??
Paola G. Vinueza-Naranjo and
Janneth Chicaiza and
Ruben Rumipamba-Zambrano Fog Computing Technology Research: a
Retrospective Overview and Bibliometric
Analysis . . . . . . . . . . . . . . . . 81:1--81:??
Tao Wang and
Yushu Zhang and
Shuren Qi and
Ruoyu Zhao and
Zhihua Xia and
Jian Weng Security and Privacy on Generative Data
in AIGC: a Survey . . . . . . . . . . . 82:1--82:??
Sabrina Sicari and
Jesus F. Cevallos M. and
Alessandra Rizzardi and
Alberto Coen-Porisini Open-Ethical AI: Advancements in
Open-Source Human-Centric Neural
Language Models . . . . . . . . . . . . 83:1--83:??
Hamed Alqahtani and
Gulshan Kumar Cybersecurity in Electric and Flying
Vehicles: Threats, Challenges, AI
Solutions & Future Directions . . . . . . 84:1--84:??
Shamsher Ullah and
Jianqiang Li and
Jie Chen and
Ikram Ali and
Salabat Khan and
Abdul Ahad and
Farhan Ullah and
Victor C. M. Leung A Survey on Emerging Trends and
Applications of 5G and 6G to Healthcare
Environments . . . . . . . . . . . . . . 85:1--85:??
Bjorn De Sutter and
Sebastian Schrittwieser and
Bart Coppens and
Patrick Kochberger Evaluation Methodologies in Software
Protection Research . . . . . . . . . . 86:1--86:??
Shaobo Zhang and
Yimeng Pan and
Qin Liu and
Zheng Yan and
Kim-Kwang Raymond Choo and
Guojun Wang Backdoor Attacks and Defenses Targeting
Multi-Domain AI Models: a Comprehensive
Review . . . . . . . . . . . . . . . . . 87:1--87:??
Aulia Arif Wardana and
Parman Sukarno Taxonomy and Survey of Collaborative
Intrusion Detection System using
Federated Learning . . . . . . . . . . . 88:1--88:??
Li Bai and
Haibo Hu and
Qingqing Ye and
Haoyang Li and
Leixia Wang and
Jianliang Xu Membership Inference Attacks and
Defenses in Federated Learning: a Survey 89:1--89:??
Anton Danholt Lautrup and
Tobias Hyrup and
Arthur Zimek and
Peter Schneider-Kamp Systematic Review of Generative
Modelling Tools and Utility Metrics for
Fully Synthetic Tabular Data . . . . . . 90:1--90:??
Zhihong Liu and
Xin Xu and
Peng Qiao and
Dongsheng Li Acceleration for Deep Reinforcement
Learning using Parallel and Distributed
Computing: a Survey . . . . . . . . . . 91:1--91:??
Corinne Allaart and
Saba Amiri and
Henri Bal and
Adam Belloum and
Leon Gommans and
Aart van Halteren and
Sander Klous Private and Secure Distributed Deep
Learning: a Survey . . . . . . . . . . . 92:1--92:??
Stefano Lambiase and
Gemma Catolino and
Fabio Palomba and
Filomena Ferrucci Motivations, Challenges, Best Practices,
and Benefits for Bots and Conversational
Agents in Software Engineering: a
Multivocal Literature Review . . . . . . 93:1--93:??
Naeem Ullah and
Javed Ali Khan and
Ivanoe De Falco and
Giovanna Sannino Explainable Artificial Intelligence:
Importance, Use Domains, Stages, Output
Shapes, and Challenges . . . . . . . . . 94:1--94:??
David Jin and
Niclas Kannengießer and
Sascha Rank and
Ali Sunyaev Collaborative Distributed Machine
Learning . . . . . . . . . . . . . . . . 95:1--95:??
Bingqiao Luo and
Zhen Zhang and
Qian Wang and
Anli Ke and
Shengliang Lu and
Bingsheng He AI-powered Fraud Detection in
Decentralized Finance: a Project Life
Cycle Perspective . . . . . . . . . . . 96:1--96:??
Wissem Soussi and
Gürkan Gür and
Burkhard Stiller Democratizing Container Live Migration
for Enhanced Future Networks --- A
Survey . . . . . . . . . . . . . . . . . 97:1--97:??
Difeng Yu and
Tilman Dingler and
Eduardo Velloso and
Jorge Goncalves Object Selection and Manipulation in VR
Headsets: Research Challenges,
Solutions, and Success Measurements . . 98:1--98:??
Yu Zheng and
Qianyue Hao and
Jingwei Wang and
Changzheng Gao and
Jinwei Chen and
Depeng Jin and
Yong Li A Survey of Machine Learning for Urban
Decision Making: Applications in
Planning, Transportation, and Healthcare 99:1--99:??
Chang Gong and
Chuzhe Zhang and
Di Yao and
Jingping Bi and
Wenbin Li and
YongJun Xu Causal Discovery from Temporal Data: an
Overview and New Perspectives . . . . . 100:1--100:??
Yujia Qin and
Shengding Hu and
Yankai Lin and
Weize Chen and
Ning Ding and
Ganqu Cui and
Zheni Zeng and
Xuanhe Zhou and
Yufei Huang and
Chaojun Xiao and
Chi Han and
Yi Ren Fung and
Yusheng Su and
Huadong Wang and
Cheng Qian and
Runchu Tian and
Kunlun Zhu and
Shihao Liang and
Xingyu Shen and
Bokai Xu and
Zhen Zhang and
Yining Ye and
Bowen Li and
Ziwei Tang and
Jing Yi and
Yuzhang Zhu and
Zhenning Dai and
Lan Yan and
Xin Cong and
Yaxi Lu and
Weilin Zhao and
Yuxiang Huang and
Junxi Yan and
Xu Han and
Xian Sun and
Dahai Li and
Jason Phang and
Cheng Yang and
Tongshuang Wu and
Heng Ji and
Guoliang Li and
Zhiyuan Liu and
Maosong Sun Tool Learning with Foundation Models . . 101:1--101:??
Sakuna Harinda Jayasundara and
Nalin Asanka Gamagedara Arachchilage and
Giovanni Russello SoK: Access Control Policy Generation
from High-level Natural Language
Requirements . . . . . . . . . . . . . . 102:1--102:??
Dan Tang and
Rui Dai and
Yudong Yan and
Keqin Li and
Wei Liang and
Zheng Qin When SDN Meets Low-rate Threats: a
Survey of Attacks and Countermeasures in
Programmable Networks . . . . . . . . . 103:1--103:??
Ahmet Oztoprak and
Reza Hassanpour and
Aysegul Ozkan and
Kasim Oztoprak Security Challenges, Mitigation
Strategies, and Future Trends in
Wireless Sensor Networks: a Review . . . 104:1--104:??
Seyma Yucer and
Furkan Tektas and
Noura Al Moubayed and
Toby Breckon Racial Bias within Face Recognition: a
Survey . . . . . . . . . . . . . . . . . 105:1--105:??
Fucheng Miao and
Youxiang Huang and
Zhiyi Lu and
Tomoaki Ohtsuki and
Guan Gui and
Hikmet Sari Wi-Fi Sensing Techniques for Human
Activity Recognition: Brief Survey,
Potential Challenges, and Research
Directions . . . . . . . . . . . . . . . 107:1--107:??
Luke Koch and
Edmon Begoli Adversarial Binaries: AI-guided
Instrumentation Methods for Malware
Detection Evasion . . . . . . . . . . . 108:1--108:??
Phani Krishna Bulasara and
Somya Sahoo and
Nitin Gupta and
Zhu Han and
Neeraj Kumar The Internet of Bio-Nano Things with
Insulin--Glucose, Security and Research
Challenges: a Survey . . . . . . . . . . 109:1--109:??
Mengwei Xu and
Dongqi Cai and
Wangsong Yin and
Shangguang Wang and
Xin Jin and
Xuanzhe Liu Resource-efficient Algorithms and
Systems of Foundation Models: a Survey 110:1--110:??
Zhaozheng Chen and
Qianru Sun Weakly-supervised Semantic Segmentation
with Image-level Labels: From
Traditional Models to Foundation Models 111:1--111:??
Yutao Yang and
Jie Zhou and
Xuanwen Ding and
Tianyu Huai and
Shunyu Liu and
Qin Chen and
Yuan Xie and
Liang He Recent Advances of Foundation Language
Models-based Continual Learning: a
Survey . . . . . . . . . . . . . . . . . 112:1--112:??
Norbert Rudolf Busch and
Andrzej Zalewski A Systematic Literature Review of
Enterprise Architecture Evaluation
Methods . . . . . . . . . . . . . . . . 113:1--113:??
Xianzhi Zhang and
Yipeng Zhou and
Di Wu and
Quan Z. Sheng and
Shazia Riaz and
Miao Hu and
Linchang Xiao A Survey on Privacy-Preserving Caching
at Network Edge: Classification,
Solutions, and Challenges . . . . . . . 114:1--114:??
Ruyue Xin and
Jingye Wang and
Peng Chen and
Zhiming Zhao Trustworthy AI-based Performance
Diagnosis Systems for Cloud
Applications: a Review . . . . . . . . . 115:1--115:??
Amar N. Alsheavi and
Ammar Hawbani and
Wajdy Othman and
Xingfu Wang and
Gamil Qaid and
Liang Zhao and
Ahmed Al-Dubai and
Liu Zhi and
A.s. Ismail and
Rutvij Jhaveri and
Saeed Alsamhi and
Mohammed A. A. Al-Qaness IoT Authentication Protocols:
Challenges, and Comparative Analysis . . 116:1--116:??
Zhifan Lai and
Zikai Chang and
Mingrui Sha and
Qihong Zhang and
Ning Xie and
Changsheng Chen and
Niyato, Dusit (Tao) A Comprehensive Survey on Physical Layer
Authentication Techniques:
Categorization and Analysis of
Model-Driven and Data-Driven Approaches 117:1--117:??
Kaisei Fukaya and
Damon Daylamani-Zad and
Harry Agius Intelligent Generation of Graphical Game
Assets: a Conceptual Framework and
Systematic Review of the State of the
Art . . . . . . . . . . . . . . . . . . 118:1--118:??
Waqar Ali and
Xiangmin Zhou and
Jie Shao Privacy-preserved and Responsible
Recommenders: From Conventional Defense
to Federated Learning and Blockchain . . 119:1--119:??
Antonio Longa and
Steve Azzolin and
Gabriele Santin and
Giulia Cencetti and
Pietro Lio and
Bruno Lepri and
Andrea Passerini Explaining the Explainers in Graph
Neural Networks: a Comparative Study . . 120:1--120:??
Firas Bayram and
Bestoun S. Ahmed Towards Trustworthy Machine Learning in
Production: an Overview of the
Robustness in MLOps Approach . . . . . . 121:1--121:??
Ruoyu Zhao and
Yushu Zhang and
Tao Wang and
Wenying Wen and
Yong Xiang and
Xiaochun Cao Visual Content Privacy Protection: a
Survey . . . . . . . . . . . . . . . . . 122:1--122:??
Yanhong Fei and
Yingjie Liu and
Chentao Jia and
Zhengyu Li and
Xian Wei and
Mingsong Chen A Survey of Geometric Optimization for
Deep Learning: From Euclidean Space to
Riemannian Manifold . . . . . . . . . . 123:1--123:??
Maxwell Standen and
Junae Kim and
Claudia Szabo Adversarial Machine Learning Attacks and
Defences in Multi-Agent Reinforcement
Learning . . . . . . . . . . . . . . . . 124:1--124:??
Yihan Cao and
Siyu Li and
Yixin Liu and
Zhiling Yan and
Yutong Dai and
Philip Yu and
Lichao Sun A Survey of AI-Generated Content (AIGC) 125:1--125:??
Tayssir Bouraffa and
Kai-Lung Hui Regulating Information and Network
Security: Review and Challenges . . . . 126:1--126:??
Claudio Filipi Goncalves dos Santos and
Rodrigo Reis Arrais and
Jhessica Victoria Santos da Silva and
Matheus Henrique Marques da Silva and
Wladimir Barroso Guedes de Araujo Neto and
Leonardo Tadeu Lopes and
Guilherme Augusto Bileki and
Iago Oliveira Lima and
Lucas Borges Rondon and
Bruno Melo de Souza and
Mayara Costa Regazio and
Rodolfo Coelho Dalapicola and
Arthur Alves Tasca ISP Meets Deep Learning: a Survey on
Deep Learning Methods for Image Signal
Processing . . . . . . . . . . . . . . . 127:1--127:??
Mohammed Jubur and
Prakash Shrestha and
Nitesh Saxena An In-Depth Analysis of Password
Managers and Two-Factor Authentication
Tools . . . . . . . . . . . . . . . . . 128:1--128:??
Daochen Zha and
Zaid Pervaiz Bhat and
Kwei-Herng Lai and
Fan Yang and
Zhimeng Jiang and
Shaochen Zhong and
Xia Hu Data-centric Artificial Intelligence: a
Survey . . . . . . . . . . . . . . . . . 129:1--129:??
Tejpal Sharma and
Dhavleesh Rattan Characterization of Android Malwares and
their families . . . . . . . . . . . . . 130:1--130:??
Xuyan Li and
Jie Wang and
Zheng Yan Can Graph Neural Networks be Adequately
Explained? A Survey . . . . . . . . . . 131:1--131:??
Jingke Tu and
Lei Yang and
Jiannong Cao Distributed Machine Learning in Edge
Computing: Challenges, Solutions and
Future Directions . . . . . . . . . . . 132:1--132:??
Yongjun Zhang and
Pengcheng Shi and
Jiayuan Li LiDAR-Based Place Recognition For
Autonomous Driving: a Survey . . . . . . 106:1--106:??
Sanderson L. Gonzaga de Oliveira A Survey of Heuristics for Profile and
Wavefront Reductions . . . . . . . . . . 133:1--133:??
Roberta Calegari and
Fosca Giannotti and
Michela Milano and
Francesca Pratesi Introduction to Special Issue on
Trustworthy Artificial Intelligence
(Part II) . . . . . . . . . . . . . . . 134:1--134:??
Ming Hou and
Simon Banbury and
Brad Cain and
Scott Fang and
Hannah Willoughby and
Liam Foley and
Edward Tunstel and
Imre J. Rudas IMPACTS Homeostasis Trust Management
System: Optimizing Trust in Human--AI
Teams . . . . . . . . . . . . . . . . . 135:1--135:??
Nolwenn Bernard and
Krisztian Balog A Systematic Review of Fairness,
Accountability, Transparency, and Ethics
in Information Retrieval . . . . . . . . 136:1--136:??
Ainhize Barrainkua and
Paula Gordaliza and
Jose A. Lozano and
Novi Quadrianto Preserving the Fairness Guarantees of
Classifiers in Changing Environments: a
Survey . . . . . . . . . . . . . . . . . 137:1--137:??
Otavio Parraga and
Martin D. More and
Christian M. Oliveira and
Nathan S. Gavenski and
Lucas S. Kupssinskü and
Adilson Medronha and
Luis V. Moura and
Gabriel S. Simões and
Rodrigo C. Barros Fairness in Deep Learning: a Survey on
Vision and Language Research . . . . . . 138:1--138:??
Marion Bartl and
Abhishek Mandal and
Susan Leavy and
Suzanne Little Gender Bias in Natural Language
Processing and Computer Vision: a
Comparative Survey . . . . . . . . . . . 139:1--139:??
Jingyang Li and
Guoqiang Li Triangular Trade-off between Robustness,
Accuracy, and Fairness in Deep Neural
Networks: a Survey . . . . . . . . . . . 140:1--140:??
Andrea Tocchetti and
Lorenzo Corti and
Agathe Balayn and
Mireia Yurrita and
Philip Lippmann and
Marco Brambilla and
Jie Yang A.I. Robustness: a Human-Centered
Perspective on Technological Challenges
and Opportunities . . . . . . . . . . . 141:1--141:??
Monty-Maximilian Zühlke and
Daniel Kudenko Adversarial Robustness of Neural
Networks from the Perspective of
Lipschitz Calculus: a Survey . . . . . . 142:1--142:??
Wenqi Wei and
Ling Liu Trustworthy Distributed AI Systems:
Robustness, Privacy, and Governance . . 143:1--143:??
Bhanu chander and
Chinju John and
Lekha Warrier and
Kumaravelan Gopalakrishnan Toward Trustworthy Artificial
Intelligence (TAI) in the Context of
Explainability and Robustness . . . . . 144:1--144:??
Catarina Moreira and
Yu-Liang Chou and
Chihcheng Hsieh and
Chun Ouyang and
João Pereira and
Joaquim Jorge Benchmarking Instance-Centric
Counterfactual Algorithms for XAI: From
White Box to Black Box . . . . . . . . . 145:1--145:??
Atul Rawal and
Adrienne Raglin and
Danda B. Rawat and
Brian M. Sadler and
James McCoy Causality for Trustworthy Artificial
Intelligence: Status, Challenges and
Perspectives . . . . . . . . . . . . . . 146:1--146:??
Lamyanba Laishram and
Muhammad Shaheryar and
Jong Taek Lee and
Soon Ki Jung Toward a Privacy-Preserving Face
Recognition System: a Survey of Leakages
and Solutions . . . . . . . . . . . . . 147:1--147:??
Md Imran Hossain and
Ghada Zamzmi and
Peter R. Mouton and
Md Sirajus Salekin and
Yu Sun and
Dmitry Goldgof Explainable AI for Medical Data: Current
Methods, Limitations, and Future
Directions . . . . . . . . . . . . . . . 148:1--148:??
Aditya Joshi and
Raj Dabre and
Diptesh Kanojia and
Zhuang Li and
Haolan Zhan and
Gholamreza Haffari and
Doris Dippold Natural Language Processing for Dialects
of a Language: a Survey . . . . . . . . 149:1--149:??
Xiaoli Tang and
Han Yu Towards Trustworthy AI-Empowered
Real-Time Bidding for Online
Advertisement Auctioning . . . . . . . . 150:1--150:??
Ons Aouedi and
Van An Le and
Kandaraj Piamrat and
Yusheng Ji Deep Learning on Network Traffic
Prediction: Recent Advances, Analysis,
and Future Directions . . . . . . . . . 151:1--151:??
Badhan Chandra Das and
M. Hadi Amini and
Yanzhao Wu Security and Privacy Challenges of Large
Language Models: a Survey . . . . . . . 152:1--152:??
Kamakshya Nayak and
Debi Prosad Dogra A Comprehensive Review on Group
Re-identification in Surveillance Videos 153:1--153:??
Iqra Qasim and
Alexander Horsch and
Dilip Prasad Dense Video Captioning: a Survey of
Techniques, Datasets and Evaluation
Protocols . . . . . . . . . . . . . . . 154:1--154:??
Leshan Lai and
Yuansheng Liu and
Bosheng Song and
Keqin Li and
Xiangxiang Zeng Deep Generative Models for Therapeutic
Peptide Discovery: a Comprehensive
Review . . . . . . . . . . . . . . . . . 155:1--155:??
Huayu Chen and
Junxiang Li and
Huanhuan He and
Jing Zhu and
Shuting Sun and
Xiaowei Li and
Bin Hu Toward the Construction of Affective
Brain-Computer Interface: a Systematic
Review . . . . . . . . . . . . . . . . . 156:1--156:??
Tong Li and
Qingyue Long and
Haoye Chai and
Shiyuan Zhang and
Fenyu Jiang and
Haoqiang Liu and
Wenzhen Huang and
Depeng Jin and
Yong Li Generative AI Empowered Network Digital
Twins: Architecture, Technologies, and
Applications . . . . . . . . . . . . . . 157:1--157:??
Lea Demelius and
Roman Kern and
Andreas Trügler Recent Advances of Differential Privacy
in Centralized Deep Learning: a
Systematic Survey . . . . . . . . . . . 158:1--158:??
Shameer K. Pradhan and
Mieke Jans and
Niels Martin Getting the Data in Shape for Your
Process Mining Analysis: an In-Depth
Analysis of the Pre-Analysis Stage . . . 159:1--159:??
Ikram Ullah and
Munam Ali Shah and
Abid Khan and
Mohsen Guizani Location Privacy Schemes in Vehicular
Networks: Taxonomy, Comparative
Analysis, Design Challenges, and Future
Opportunities . . . . . . . . . . . . . 160:1--160:??
Song-Kyoo Kim and
Hou Cheng Vong Secured Network Architectures Based on
Blockchain Technologies: a Systematic
Review . . . . . . . . . . . . . . . . . 162:1--162:??
Mengyao Li and
Zhibang Yang and
Xu Zhou and
Yixiang Fang and
Kenli Li and
Keqin Li Clustering on Attributed Graphs: From
Single-view to Multi-view . . . . . . . 163:1--163:??
Tania Bailoni and
Mauro Dragoni A Review on Trustworthiness of Digital
Assistants for Personal Healthcare . . . 164:1--164:??
Menglu Li and
Yasaman Ahmadiadli and
Xiao-Ping Zhang A Survey on Speech Deepfake Detection 165:1--165:??
Miko\laj Ma\lki\'nski and
Jacek Ma\'ndziuk Deep Learning Methods for Abstract
Visual Reasoning: a Survey on Raven's
Progressive Matrices . . . . . . . . . . 166:1--166:??
Yuan Yuan and
Zhaojian Li and
Bin Zhao A Survey of Multimodal Learning:
Methods, Applications, and Future . . . 167:1--167:??
Aymeric Blot and
Justyna Petke A Comprehensive Survey of Benchmarks for
Improvement of Software's Non-Functional
Properties . . . . . . . . . . . . . . . 168:1--168:??
Mikel K. Ngueajio and
Saurav Aryal and
Marcellin Atemkeng and
Gloria Washington and
Danda Rawat Decoding Fake News and Hate Speech: a
Survey of Explainable AI Techniques . . 169:1--169:??
Omar Jarkas and
Ryan Ko and
Naipeng Dong and
Redowan Mahmud A Container Security Survey: Exploits,
Attacks, and Defenses . . . . . . . . . 170:1--170:??
Swapnil Sanjaykumar Mane and
Suman Kundu and
Rajesh Sharma A Survey on Online Aggression: Content
Detection and Behavioral Analysis on
Social Media . . . . . . . . . . . . . . 171:1--171:??
Zhuoying Duan and
Zikai Chang and
Ning Xie and
Weize Sun and
Niyato, Dusit (Tao) Adaptive Strategies in Enhancing
Physical Layer Security: a Comprehensive
Survey . . . . . . . . . . . . . . . . . 172:1--172:??
Yi Liu and
Changsheng Zhang and
Xingjun Dong and
Jiaxu Ning Point Cloud-Based Deep Learning in
Industrial Production: a Survey . . . . 173:1--173:??
Molud Esmaili and
Ken Christensen Performance Modeling of Public
Permissionless Blockchains: a Survey . . 174:1--174:??
Dinh-Viet-Toan Le and
Louis Bigo and
Dorien Herremans and
Mikaela Keller Natural Language Processing Methods for
Symbolic Music Generation and
Information Retrieval: a Survey . . . . 175:1--175:??
Shirlei Aparecida de Chaves and
Fabiane Benitti User-Centred Privacy and Data
Protection: an Overview of Current
Research Trends and Challenges for the
Human-Computer Interaction Field . . . . 176:1--176:??
Vasileios Leon and
Muhammad Abdullah Hanif and
Giorgos Armeniakos and
Xun Jiao and
Muhammad Shafique and
Kiamal Pekmestzi and
Dimitrios Soudris Approximate Computing Survey, Part II:
Application-Specific & Architectural
Approximation Techniques and
Applications . . . . . . . . . . . . . . 177:1--177:??
Anindo Mahmood and
Murat Yuksel Resource Sharing on the Internet: a
Comprehensive Survey on ISP Peering . . 178:1--178:??
Jiahao Xie and
Guangmo Tong Advances in Set Function Learning: a
Survey of Techniques and Applications 179:1--179:??
Sebastian Groll and
Ludwig Fuchs and
Günther Pernul Separation of Duty in Information
Security . . . . . . . . . . . . . . . . 180:1--180:??
Ilies Benhabbour and
Marc Dacier ENDEMIC: End-to-End Network Disruptions
--- Examining Middleboxes, Issues, and
Countermeasures --- a Survey . . . . . . 181:1--181:??
Zehang Deng and
Yongjian Guo and
Changzhou Han and
Wanlun Ma and
Junwu Xiong and
Sheng Wen and
Yang Xiang AI Agents Under Threat: a Survey of Key
Security Challenges and Future Pathways 182:1--182:??
Maedeh Daryanavard Chounchenani and
Asadollah Shahbahrami and
Reza Hassanpour and
Georgi Gaydadjiev Deep Learning Based Image Aesthetic
Quality Assessment --- a Review . . . . 183:1--183:??
Qiang He and
Songyangjun Zhang and
Yuliang Cai and
Wei Yuan and
Lianbo Ma and
Keping Yu A Survey on Exploring Real and Virtual
Social Network Rumors: State-of-the-Art
and Research Challenges . . . . . . . . 184:1--184:??
Vasileios Leon and
Muhammad Abdullah Hanif and
Giorgos Armeniakos and
Xun Jiao and
Muhammad Shafique and
Kiamal Pekmestzi and
Dimitrios Soudris Approximate Computing Survey, Part I:
Terminology and Software & Hardware
Approximation Techniques . . . . . . . . 185:1--185:??
Huaping Liu and
Di Guo and
Angelo Cangelosi Embodied Intelligence: a Synergy of
Morphology, Action, Perception and
Learning . . . . . . . . . . . . . . . . 186:1--186:??
Xiaoyu Zhang and
Weipeng Jiang and
Chao Shen and
Qi Li and
Qian Wang and
Chenhao Lin and
Xiaohong Guan Deep Learning Library Testing:
Definition, Methods and Challenges . . . 187:1--187:??
Qiang Zhang and
Keyan Ding and
Tianwen Lv and
Xinda Wang and
Qingyu Yin and
Yiwen Zhang and
Jing Yu and
Yuhao Wang and
Xiaotong Li and
Zhuoyi Xiang and
Xiang Zhuang and
Zeyuan Wang and
Ming Qin and
Mengyao Zhang and
Jinlu Zhang and
Jiyu Cui and
Renjun Xu and
Hongyang Chen and
Xiaohui Fan and
Huabin Xing and
Huajun Chen Scientific Large Language Models: a
Survey on Biological & Chemical Domains 161:1--161:??
Neeloy Chakraborty and
Melkior Ornik and
Katherine Driggs-Campbell Hallucination Detection in Foundation
Models for Decision-Making: a Flexible
Definition and Review of the State of
the Art . . . . . . . . . . . . . . . . 188:1--188:??
Yijun Tian and
Shichao Pei and
Xiangliang Zhang and
Chuxu Zhang and
Nitesh V. Chawla Knowledge Distillation on Graphs: a
Survey . . . . . . . . . . . . . . . . . 189:1--189:??
Jiayi Kuang and
Ying Shen and
Jingyou Xie and
Haohao Luo and
Zhe Xu and
Ronghao Li and
Yinghui Li and
Xianfeng Cheng and
Xika Lin and
Yu Han Natural Language Understanding and
Inference with MLLM in Visual Question
Answering: a Survey . . . . . . . . . . 190:1--190:??
Shir Landau-Feibish and
Zaoxing Liu and
Jennifer Rexford Compact Data Structures for Network
Telemetry . . . . . . . . . . . . . . . 191:1--191:??
Dipkamal Bhusal and
Nidhi Rastogi Adversarial Patterns: Building Robust
Android Malware Classifiers . . . . . . 192:1--192:??
Junhao Zheng and
Shengjie Qiu and
Chengming Shi and
Qianli Ma Towards Lifelong Learning of Large
Language Models: a Survey . . . . . . . 193:1--193:??
Dipanwita Thakur and
Antonella Guzzo and
Giancarlo Fortino and
Francesco Piccialli Green Federated Learning: a New Era of
Green Aware AI . . . . . . . . . . . . . 194:1--194:??
Thanh Linh Nguyen and
Lam Nguyen and
Thong Hoang and
Dilum Bandara and
Qin Wang and
Qinghua Lu and
Xiwei Xu and
Liming Zhu and
Shiping Chen Blockchain-Empowered Trustworthy Data
Sharing: Fundamentals, Applications, and
Challenges . . . . . . . . . . . . . . . 195:1--195:??
Mohammad Shahnawaz and
Manish Kumar A Comprehensive Survey on Big Data
Analytics: Characteristics, Tools and
Techniques . . . . . . . . . . . . . . . 196:1--196:??
Mian Ahmad Jan and
Muhammad Adil and
Bouziane Brik and
Saad Harous and
Sohail Abbas Making Sense of Big Data in Intelligent
Transportation Systems: Current Trends,
Challenges and Future Directions . . . . 197:1--197:??
Guozhi Liu and
Weiwei Lin and
Haotong Zhang and
Jianpeng Lin and
Shaoliang Peng and
Keqin Li Public Datasets for Cloud Computing: a
Comprehensive Survey . . . . . . . . . . 198:1--198:??
Paulo Roberto da Paz Ferraz Santos and
Paulo Angelo Alves Resende and
João José Costa Gondim and
André Costa Drummond Towards Robust Cyber Attack Taxonomies:
a Survey with Requirements, Structures,
and Assessment . . . . . . . . . . . . . 199:1--199:??
Tianen Liu and
Shuai Wang and
Zheng Dong and
Borui Li and
Tian He From Perception to Computation:
Revisiting Delay Optimization for
Connected Autonomous Vehicles . . . . . 200:1--200:??
Syed Mustafa Haider Rizvi and
Ramsha Imran and
Arif Mahmood Text Classification Using Graph
Convolutional Networks: a Comprehensive
Survey . . . . . . . . . . . . . . . . . 201:1--201:??
Claudia Diamantini and
Tarique Khan and
Domenico Potena and
Emanuele Storti Semantic Models of Performance
Indicators: a Systematic Survey . . . . 202:1--202:??
Geon Lee and
Fanchen Bu and
Tina Eliassi-Rad and
Kijung Shin A Survey on Hypergraph Mining: Patterns,
Tools, and Generators . . . . . . . . . 203:1--203:??
Leila Benarous and
Sherali Zeadally and
Saadi Boudjit and
Abdelhamid Mellouk A Review of Pseudonym Change Strategies
for Location Privacy Preservation
Schemes in Vehicular Networks . . . . . 204:1--204:??
Sourish Gunesh Dhekane and
Thomas Ploetz Transfer Learning in Sensor-Based Human
Activity Recognition: a Survey . . . . . 205:1--205:??
Zhuosheng Zhang and
Yao Yao and
Aston Zhang and
Xiangru Tang and
Xinbei Ma and
Zhiwei He and
Yiming Wang and
Mark Gerstein and
Rui Wang and
Gongshen Liu and
Hai Zhao Igniting Language Intelligence: The
Hitchhiker's Guide from Chain-of-Thought
Reasoning to Language Agents . . . . . . 206:1--206:??
Yihong Ma and
Yijun Tian and
Nuno Moniz and
Nitesh V. Chawla Class-Imbalanced Learning on Graphs: a
Survey . . . . . . . . . . . . . . . . . 207:1--207:??
Joseph Renzullo and
Pemma Reiter and
Westley Weimer and
Stephanie Forrest Automated Program Repair: Emerging
Trends Pose and Expose Problems for
Benchmarks . . . . . . . . . . . . . . . 208:1--208:??
Yue Zheng and
Yuhao Chen and
Bin Qian and
Xiufang Shi and
Yuanchao Shu and
Jiming Chen A Review on Edge Large Language Models:
Design, Execution, and Applications . . 209:1--209:??
Naveen Karunanayake and
Ravin Gunawardena and
Suranga Seneviratne and
Sanjay Chawla Out-of-Distribution Data: an
Acquaintance of Adversarial Examples ---
a Survey . . . . . . . . . . . . . . . . 210:1--210:??
Naeem Syed and
Adnan Anwar and
Zubair Baig and
Sherali Zeadally Artificial Intelligence as a Service
(AIaaS) for Cloud, Fog and the Edge:
State-of-the-Art Practices . . . . . . . 211:1--211:??
Mutong Liu and
Yang Liu and
Jiming Liu Machine Learning for Infectious Disease
Risk Prediction: a Survey . . . . . . . 212:1--212:??
Qi An and
Frank Jiang and
Azadeh Neiat and
William Yeoh and
Kumar Venayagamoorthy and
Arkady Zaslavsky A Comprehensive Review on IoT
Marketplace Matchmaking: Approaches,
Opportunities and Challenges . . . . . . 213:1--213:??
Guilherme Oliveira and
Quoc Ngo and
Leandro Passos and
Danilo Jodas and
Joao Papa and
Dinesh Kumar Facial Expression Analysis in
Parkinsons's Disease Using Machine
Learning: a Review . . . . . . . . . . . 214:1--214:??
Huali Xu and
Shuaifeng Zhi and
Shuzhou Sun and
Vishal Patel and
Li Liu Deep Learning for Cross-Domain Few-Shot
Visual Recognition: a Survey . . . . . . 215:1--215:??
Vu Tuan Truong and
Luan Ba Dang and
Long Bao Le Attacks and Defenses for Generative
Diffusion Models: a Comprehensive Survey 216:1--216:??
Beatrice Casey and
Joanna C. S. Santos and
George Perry A Survey of Source Code Representations
for Machine Learning-Based Cybersecurity
Tasks . . . . . . . . . . . . . . . . . 217:1--217:??
Nils Kemmerzell and
Annika Schreiner and
Haroon Khalid and
Michael Schalk and
Letizia Bordoli Towards a Better Understanding of
Evaluating Trustworthiness in AI Systems 218:1--218:??
Kaveen Hiniduma and
Suren Byna and
Jean Luca Bez Data Readiness for AI: a 360-Degree
Survey . . . . . . . . . . . . . . . . . 219:1--219:??
Elias Zavitsanos and
Eirini Spyropoulou and
George Giannakopoulos and
Georgios Paliouras Machine Learning for Identifying Risk in
Financial Statements: a Survey . . . . . 220:1--220:??
Jiahua Huang and
Weiwei Lin and
Wentai Wu and
Yang Wang and
Haocheng Zhong and
Xinhua Wang and
Keqin Li On Efficiency, Fairness and Security in
AI Accelerator Resource Sharing: a
Survey . . . . . . . . . . . . . . . . . 221:1--221:??
Adam Haskard and
Damith Herath Secure Robotics: Navigating Challenges
at the Nexus of Safety, Trust, and
Cybersecurity in Cyber-Physical Systems 222:1--222:??
Mang Ye and
Wei Shen and
Bo Du and
Eduard Snezhko and
Vassili Kovalev and
Pong C. Yuen Vertical Federated Learning for
Effectiveness, Security, Applicability:
a Survey . . . . . . . . . . . . . . . . 223:1--223:??
Shahroz Tariq and
Mohan Baruwal Chhetri and
Surya Nepal and
Cecile Paris Alert Fatigue in Security Operations
Centres: Research Challenges and
Opportunities . . . . . . . . . . . . . 224:1--224:??
Yimiao Sun and
Yuan He and
Yang Zou and
Jiaming Gu and
Xiaolei Yang and
Jia Zhang and
Ziheng Mao A Survey of mmWave Backscatter:
Applications, Platforms, and
Technologies . . . . . . . . . . . . . . 225:1--225:??
Marloes Vredenborg and
Anouk van Kasteren and
Judith Masthoff Personalization in Public Transport
Passenger Information Systems: a
Systematic Review and Framework . . . . 226:1--226:??
Mohammed Alosaimi and
Omer Rana and
Charith Perera Testbeds and Evaluation Frameworks for
Anomaly Detection within Built
Environments: a Systematic Review . . . 227:1--227:??
Xubin Wang and
Zhiqing Tang and
Jianxiong Guo and
Tianhui Meng and
Chenhao Wang and
Tian Wang and
Weijia Jia Empowering Edge Intelligence: a
Comprehensive Survey on On-Device AI
Models . . . . . . . . . . . . . . . . . 228:1--228:??
Phaedra Sophia Curlin and
Jeff Heiges and
Calvin Chan and
Tamara Silbergleit Lehman A Survey of Hardware-Based AES SBoxes:
Area, Performance, and Security . . . . 229:1--229:??
Joshua Zhao and
Saurabh Bagchi and
Salman Avestimehr and
Kevin Chan and
Somali Chaterji and
Dimitris Dimitriadis and
Jiacheng Li and
Ninghui Li and
Arash Nourian and
Holger Roth The Federation Strikes Back: a Survey of
Federated Learning Privacy Attacks,
Defenses, Applications, and Policy
Landscape . . . . . . . . . . . . . . . 230:1--230:??
Chenxi Liu and
Zhu Xiao and
Wangchen Long and
Tong Li and
Hongbo Jiang and
Keqin Li Vehicle Trajectory Data Processing,
Analytics, and Applications: a Survey 231:1--231:??
Sumanth Doddapaneni and
Gowtham Ramesh and
Mitesh Khapra and
Anoop Kunchukuttan and
Pratyush Kumar A Primer on Pretrained Multilingual
Language Models . . . . . . . . . . . . 232:1--232:??
Steffen Wendzel and
Luca Caviglione and
Wojciech Mazurczyk and
Aleksandra Mileva and
Jana Dittmann and
Christian Krätzer and
Kevin Lamshöft and
Claus Vielhauer and
Laura Hartmann and
Jörg Keller and
Tom Neubert and
Sebastian Zillien A Generic Taxonomy for Steganography
Methods . . . . . . . . . . . . . . . . 233:1--233:??
Saeid Nahavandi and
Roohallah Alizadehsani and
Darius Nahavandi and
Shady Mohamed and
Navid Mohajer and
Mohammad Rokonuzzaman and
Ibrahim Hossain A Comprehensive Review on Autonomous
Navigation . . . . . . . . . . . . . . . 234:1--234:??
Claudia Szabo and
Robin Baker and
Glen Pearce and
Eyoel Teffera and
Anthony Perry Overview and Challenges of Distributed
Decision Making in Resource Contested
and Dynamic Environments . . . . . . . . 235:1--235:??
Md Mehedi Hasan and
Moloud Abdar and
Abbas Khosravi and
Uwe Aickelin and
Pietro Lio and
Ibrahim Hossain and
Ashikur Rahman and
Saeid Nahavandi Survey on Leveraging Uncertainty
Estimation Towards Trustworthy Deep
Neural Networks: The Case of Reject
Option and Post-training Processing . . 236:1--236:??
Quentin Ducasse and
Pascal Cotret and
Lo\"\ic Lagadec War on JITs: Software-Based Attacks and
Hybrid Defenses for JIT Compilers --- a
Comprehensive Survey . . . . . . . . . . 237:1--237:??
Yuan Jin and
Antonio Pepe and
Jianning Li and
Christina Gsaxner and
Yuxuan Chen and
Behrus Puladi and
Fen-hua Zhao and
Kelsey Pomykala and
Jens Kleesiek and
Alejandro F Frangi and
Jan Egger Aortic Vessel Tree Segmentation for
Cardiovascular Diseases Treatment:
Status Quo . . . . . . . . . . . . . . . 238:1--238:??
Abdur Rahman Onik and
Joseph Brown and
Clinton Walker and
Ibrahim Baggili A Systematic Literature Review of Secure
Instant Messaging Applications from a
Digital Forensics Perspective . . . . . 239:1--239:??
Diana Freitas and
Paul deGrandis and
Tiago Boldt Sousa A Survey on the State of the Art of
Causally Consistent Cloud Systems . . . 240:1--240:??
Bingchen Qian and
Yuexiang Xie and
Yaliang Li and
Bolin Ding and
Jingren Zhou Tree-based Models for Vertical Federated
Learning: a Survey . . . . . . . . . . . 241:1--241:??
Max Klabunde and
Tobias Schumacher and
Markus Strohmaier and
Florian Lemmerich Similarity of Neural Network Models: a
Survey of Functional and
Representational Measures . . . . . . . 242:1--242:??
Lin Geng Foo and
Hossein Rahmani and
Jun Liu AI-Generated Content (AIGC) for Various
Data Modalities: a Survey . . . . . . . 243:1--243:??
Lingxin Jin and
Xiangyu Wen and
Wei Jiang and
Jinyu Zhan and
Xingzhi Zhou Trojan Attacks and Countermeasures on
Deep Neural Networks from Life-Cycle
Perspective: a Review . . . . . . . . . 244:1--244:??
Md Palash Uddin and
Yong Xiang and
Mahmudul Hasan and
Jun Bai and
Yao Zhao and
Longxiang Gao A Systematic Literature Review of Robust
Federated Learning: Issues, Solutions,
and Future Research Directions . . . . . 245:1--245:??
Evangelia Konstantopoulou and
George Athanasiou and
Nicolas Sklavos Review and Analysis of FPGA and ASIC
Implementations of NIST Lightweight
Cryptography Finalists . . . . . . . . . 246:1--246:??
Sandarbh Yadav and
Vadlamani Ravi and
Shivaram Kalyanakrishnan Hybrids of Reinforcement Learning and
Evolutionary Computation in Finance: a
Survey . . . . . . . . . . . . . . . . . 247:1--247:??
Gebremariam Assres and
Guru Bhandari and
Andrii Shalaginov and
Tor-Morten Gronli and
Gheorghita Ghinea State-of-the-Art and Challenges of
Engineering ML-Enabled Software Systems
in the Deep Learning Era . . . . . . . . 248:1--248:??
Byeong Su Kim and
Jieun Kim and
Deokwoo Lee and
Beakcheol Jang Visual Question Answering: a Survey of
Methods, Datasets, Evaluation, and
Challenges . . . . . . . . . . . . . . . 249:1--249:??
Qingbo Zhang and
Xiangmin Zhou and
Xiuzhen Zhang and
Xiaochun Yang and
Bin Wang and
Xun Yi Unified Empirical Evaluation and
Comparison of Session-based
Recommendation Algorithms . . . . . . . 250:1--250:??
Adrián Riesco and
Kazuhiro Ogata and
Masaki Nakamura and
Daniel Gaina and
Duong Dinh Tran and
Kokichi Futatsugi Proof Scores: a Survey . . . . . . . . . 251:1--251:??
Abdulaziz Aljohani and
Omer Rana and
Charith Perera Self-adaptive Federated Learning in
Internet of Things Systems: a Review . . 252:1--252:??
Gun Il Kim and
Sunga Hwang and
Beakcheol Jang Efficient Compressing and Tuning Methods
for Large Language Models: a Systematic
Literature Review . . . . . . . . . . . 253:1--253:??
Anagha Pradeep and
Radhika Mamidi Sandar'sana: a Survey on Sanskrit
Computational Linguistics and Digital
Infrastructure for Sanskrit . . . . . . 254:1--254:??
Kennedy Edemacu and
Xintao Wu Privacy Preserving Prompt Engineering: a
Survey . . . . . . . . . . . . . . . . . 255:1--255:??
Noah Lewis and
Jean Luca Bez and
Suren Byna I/O in Machine Learning Applications on
HPC Systems: a 360-degree Survey . . . . 256:1--256:??
Emir Dervisevic and
Amina Tankovic and
Ehsan Fazel and
Ramana Kompella and
Peppino Fazio and
Miroslav Voznak and
Miralem Mehic Quantum Key Distribution Networks ---
Key Management: a Survey . . . . . . . . 257:1--257:??
Roland Oruche and
Sai Keerthana Goruganthu and
Rithika Akula and
Xiyao Cheng and
Ashraful Md Goni and
Bruce W. Shibo and
Kerk Kee and
Marcos Zampieri and
Prasad Calyam A Survey on the Recent Advancements in
Human-Centered Dialog Systems . . . . . 258:1--258:??
Shoulong Zhang and
Haomin Li and
Kaiwen Sun and
Hejia Chen and
Yan Wang and
Shuai Li Security and Privacy Challenges of AIGC
in Metaverse: a Comprehensive Survey . . 259:1--259:??
Vibhas K. Vats and
David Crandall Geometric Constraints in Deep Learning
Frameworks: a Survey . . . . . . . . . . 260:1--260:??
Omair Faraj and
David Megias and
Joaquin Garcia-alfaro Security Approaches for Data Provenance
in the Internet of Things: a Systematic
Literature Review . . . . . . . . . . . 261:1--261:??
Antonio Di Marino and
Vincenzo Bevilacqua and
Angelo Ciaramella and
Ivanoe De Falco and
Giovanna Sannino Ante-Hoc Methods for Interpretable Deep
Models: a Survey . . . . . . . . . . . . 262:1--262:??
Jingyuan Zhao and
Yuyan Wu and
Rui Deng and
Susu Xu and
Jinpeng Gao and
Andrew Burke A Survey of Autonomous Driving from a
Deep Learning Perspective . . . . . . . 263:1--263:??
Xiuyuan Chen and
Junzuo Lai and
Chao Lin and
Xinyi Huang and
Debiao He Cryptographic Primitives in Script-based
and Scriptless Payment Channel Networks:
a Survey . . . . . . . . . . . . . . . . 264:1--264:??
Pierre-Daniel Arsenault and
Shengrui Wang and
Jean-Marc Patenaude A Survey of Explainable Artificial
Intelligence (XAI) in Financial Time
Series Forecasting . . . . . . . . . . . 265:1--265:??
Omid Asghari and
Naghmeh Ivaki and
Henrique Madeira UAV Operations Safety Assessment: a
Systematic Literature Review . . . . . . 266:1--266:??
Ornela Danushi and
Stefano Forti and
Jacopo Soldani Carbon-Efficient Software Design and
Development: a Systematic Literature
Review . . . . . . . . . . . . . . . . . 267:1--267:??
Bingyuan Wang and
Qifeng Chen and
Zeyu Wang Diffusion-Based Visual Art Creation: a
Survey and New Perspectives . . . . . . 268:1--268:??
Oluwajuwon Fawole and
Danda Rawat Recent Advances in Vision Transformer
Robustness Against Adversarial Attacks
in Traffic Sign Detection and
Recognition: a Survey . . . . . . . . . 269:1--269:??
Jing Liu and
Yang Liu and
Jieyu Lin and
Jielin Li and
Liang Cao and
Peng Sun and
Bo Hu and
Liang Song and
Azzedine Boukerche and
Victor C. M. Leung Networking Systems for Video Anomaly
Detection: a Tutorial and Survey . . . . 270:1--270:??
Imane Taleb and
Jean-Loup Guillaume and
Benjamin Duthil A Survey on Services Placement
Algorithms in Integrated Cloud-Fog /Edge
Computing . . . . . . . . . . . . . . . 271:1--271:??
Simon Hanisch and
Patricia Arias-Cabarcos and
Javier Parra-Arnau and
Thorsten Strufe Anonymization Techniques for Behavioral
Biometric Data: a Survey . . . . . . . . 272:1--272:??
Xian Wang and
Luyao Shen and
Lik-Hang Lee A Systematic Review of XR-Enabled Remote
Human--Robot Interaction Systems . . . . 273:1--273:??
Jiajun Zhou and
Chenxuan Xie and
Shengbo Gong and
Zhenyu Wen and
Xiangyu Zhao and
Qi Xuan and
Xiaoniu Yang Data Augmentation on Graphs: a Technical
Survey . . . . . . . . . . . . . . . . . 274:1--274:??
Jun Bai and
Di Wu and
Tristan Shelley and
Peter Schubel and
David Twine and
John Russell and
Xuesen Zeng and
Ji Zhang A Comprehensive Survey on Machine
Learning Driven Material Defect
Detection . . . . . . . . . . . . . . . 275:1--275:??
Komal Saini and
Sandeep Sharma Smart Road Traffic Monitoring: Unveiling
the Synergy of IoT and AI for Enhanced
Urban Mobility . . . . . . . . . . . . . 276:1--276:??
Haopeng Zhang and
Philip S. Yu and
Jiawei Zhang A Systematic Survey of Text
Summarization: From Statistical Methods
to Large Language Models . . . . . . . . 277:1--277:??
Jiankai Sun and
Chuanyang Zheng and
Enze Xie and
Zhengying Liu and
Ruihang Chu and
Jianing Qiu and
Jiaqi Xu and
Mingyu Ding and
Hongyang Li and
Mengzhe Geng and
Yue Wu and
Wenhai Wang and
Junsong Chen and
Zhangyue Yin and
Xiaozhe Ren and
Jie Fu and
Junxian He and
Yuan Wu and
Qi Liu and
Xihui Liu and
Yu Li and
Hao Dong and
Yu Cheng and
Ming Zhang and
Pheng Ann Heng and
Jifeng Dai and
Ping Luo and
Jingdong Wang and
Ji-Rong Wen and
Xipeng Qiu and
Yike Guo and
Hui Xiong and
Qun Liu and
Zhenguo Li A Survey of Reasoning with Foundation
Models: Concepts, Methodologies, and
Outlook . . . . . . . . . . . . . . . . 278:1--278:??
Youheng Bai and
Zitao Liu and
Teng Guo and
Mingliang Hou and
Kui Xiao Prerequisite Relation Learning: a Survey
and Outlook . . . . . . . . . . . . . . 279:1--279:??
Aviram Zilberman and
Amit Dvir and
Ariel Stulman IPv6 Routing Protocol for Low-Power and
Lossy Networks Security Vulnerabilities
and Mitigation Techniques: a Survey . . 280:1--280:??
Ioana Banicescu and
Trisha Chakraborty and
Seth Gilbert and
Maxwell Young A Survey on Adversarial Contention
Resolution . . . . . . . . . . . . . . . 281:1--281:??
Jihoon Kim and
Hyerean Jang and
Youngjoo Shin A Survey of Side-Channel Attacks on
Branch Prediction Units . . . . . . . . 282:1--282:??
Rashik Shadman and
Ahmed Anu Wahab and
Michael Manno and
Matthew Lukaszewski and
Daqing Hou and
Faraz Hussain Keystroke Dynamics: Concepts,
Techniques, and Applications . . . . . . 283:1--283:??
Shermin Sherkat and
Thomas Wortmann and
Andreas Wortmann Two Decades of Automated AI Planning
Methods in Construction and Fabrication:
a Systematic Review . . . . . . . . . . 284:1--284:??
Mostafa Jahanifar and
Manahil Raza and
Kesi Xu and
Trinh Thi Le Vuong and
Robert Jewsbury and
Adam Shephard and
Neda Zamanitajeddin and
Jin Tae Kwak and
Shan E Ahmed Raza and
Fayyaz Minhas and
Nasir Rajpoot Domain Generalization in Computational
Pathology: Survey and Guidelines . . . . 285:1--285:??
Cristina Silvano and
Daniele Ielmini and
Fabrizio Ferrandi and
Leandro Fiorin and
Serena Curzel and
Luca Benini and
Francesco Conti and
Angelo Garofalo and
Cristian Zambelli and
Enrico Calore and
Sebastiano Schifano and
Maurizio Palesi and
Giuseppe Ascia and
Davide Patti and
Nicola Petra and
Davide De Caro and
Luciano Lavagno and
Teodoro Urso and
Valeria Cardellini and
Gian Carlo Cardarilli and
Robert Birke and
Stefania Perri A Survey on Deep Learning Hardware
Accelerators for Heterogeneous HPC
Platforms . . . . . . . . . . . . . . . 286:1--286:??
Sheng Di and
Jinyang Liu and
Kai Zhao and
Xin Liang and
Robert Underwood and
Zhaorui Zhang and
Milan Shah and
Yafan Huang and
Jiajun Huang and
Xiaodong Yu and
Congrong Ren and
Hanqi Guo and
Grant Wilkins and
Dingwen Tao and
Jiannan Tian and
Sian Jin and
Zizhe Jian and
Daoce Wang and
Md Hasanur Rahman and
Boyuan Zhang and
Shihui Song and
Jon Calhoun and
Guanpeng Li and
Kazutomo Yoshii and
Khalid Alharthi and
Franck Cappello A Survey on Error-Bounded Lossy
Compression for Scientific Datasets . . 287:1--287:??
Pattaraporn Sangaroonsilp and
Hoa Khanh Dam A Study on the Prevalence of Privacy in
Software Engineering . . . . . . . . . . 288:1--288:??
Shuai Shao and
Ye Tian and
Yajie Zhang and
Shangshang Yang and
Panpan Zhang and
Cheng He and
Xingyi Zhang and
Yaochu Jin Evolutionary Computation for Sparse
Multi-Objective Optimization: a Survey 289:1--289:??
Junlan Dong and
Jinghui Zhong Recent Advances in Symbolic Regression 290:1--290:??
Nawel Benarba and
Sara Bouchenak Bias in Federated Learning: a
Comprehensive Survey . . . . . . . . . . 291:1--291:??
Anpeng Wu and
Kun Kuang and
Ruoxuan Xiong and
Fei Wu Instrumental Variables in Causal
Inference and Machine Learning: a Survey 292:1--292:??
Kok Wee Ang and
Eyasu Getahun Chekole and
Jianying Zhou Unveiling the Covert Vulnerabilities in
Multi-Factor Authentication Protocols: a
Systematic Review and Security Analysis 293:1--293:??
João Baiense and
Eftim Zdravevski and
Paulo Coelho and
Ivan Miguel Pires and
Fernando J. Velez Driving Healthcare Monitoring with IoT
and Wearable Devices: a Systematic
Review . . . . . . . . . . . . . . . . . 294:1--294:??
Nikolaos Pippas and
Elliot A. Ludvig and
Cagatay Turkay The Evolution of Reinforcement Learning
in Quantitative Finance: a Survey . . . 295:1--295:??
Feifei Niu and
Chuanyi Li and
Kui Liu and
Xin Xia and
David Lo When Deep Learning Meets Information
Retrieval-based Bug Localization: a
Survey . . . . . . . . . . . . . . . . . 296:1--296:??
Lu Xing and
Venkata Sai Pavan Kumar Vadrevu and
Walid G. Aref The Ubiquitous Skiplist: a Survey of
What Cannot be Skipped About the
Skiplist and its Applications in Data
Systems . . . . . . . . . . . . . . . . 297:1--297:??
Han Xu and
Minghua Xu and
Xianjun Deng and
Bang Wang Sentiment Diffusion in Online Social
Networks: a Survey from the
Computational Perspective . . . . . . . 298:1--298:??
Luís Vilaça and
Yi Yu and
Paula Viana A Survey of Recent Advances and
Challenges in Deep Audio-Visual
Correlation Learning . . . . . . . . . . 299:1--299:??
Haipeng Cai A Survey of Program Analysis for
Distributed Software Systems . . . . . . 300:1--300:??
Janik-Vasily Benzin and
Stefanie Rinderle-Ma A Survey on Event Prediction Methods
from a Systems Perspective: Bringing
Together Disparate Research Areas . . . 301:1--301:??
Zhiqiang Zhong and
Anastasia Barkova and
Davide Mottin Knowledge-augmented Graph Machine
Learning for Drug Discovery: a Survey 302:1--302:??
Zahra Mousavi and
Chadni Islam and
Muhammad Ali Babar and
Alsharif Abuadbba and
Kristen Moore Detecting Misuse of Security APIs: a
Systematic Review . . . . . . . . . . . 303:1--303:??
Vlastimil Slany and
Eva Krcalova and
Jiri Balej and
Martin Zach and
Tereza Kucova and
Michal Prauzek and
Radek Martinek Smart Water-IoT: Harnessing IoT and AI
for Efficient Water Management . . . . . 304:1--304:??
Divya Vetriveeran and
Leena Sri R. Resource Provisioning in Fog Computing
--- a Survey . . . . . . . . . . . . . . 305:1--305:??
Chandrasekar Subramanian and
Balaraman Ravindran Causality in Bandits: a Survey . . . . . 306:1--306:??
Jesse Read and
Indre Zliobaite Supervised Learning from Data Streams:
an Overview and Update . . . . . . . . . 307:1--307:??
Asma Shakil and
Christof Lutteroth and
Gerald Weber A Taxonomy and Systematic Review of Gaze
Interactions for $2$D Displays:
Promising Techniques and Opportunities 308:1--308:??
Jose Luis Hernandez-Ramos and
Georgios Karopoulos and
Efstratios Chatzoglou and
Vasileios Kouliaridis and
Enrique Marmol and
Aurora Gonzalez-Vidal and
Georgios Kambourakis Intrusion Detection Based on Federated
Learning: a Systematic Review . . . . . 309:1--309:??
Willian Bolzan and
Kleinner Farias Investigating EEG Microstate Analysis in
Cognitive Software Engineering Tasks: a
Systematic Mapping Study and Taxonomy 310:1--310:??
Hamdy O. Farag and
Mohamed Medhat Gaber and
Mohammed Ibrahim Awad and
Nancy E. Elhady Myoelectric Prosthetic Hands: a Review
of Muscle Synergy, Machine Learning and
Edge Computing . . . . . . . . . . . . . 311:1--311:??
Luiz Fernando Puttow Southier and
Gustavo Alexandre Tuchlinowicz Nunes and
João Henrique Pereira Machado and
Matheus Buratti and
Pedro Henrique de Viveiros Trentin and
Wesley Augusto Catuzzo de Bona and
Barbara de Oliveira Koop and
Elioenai Markson Ferreira Diniz and
João Victor Costa Mazzochin and
João Leonardo Harres Dall Agnol and
Lucas Caldeira de Oliveira and
Marcelo Filipak and
Luiz Antonio Zanlorensi and
Marcos Belançon and
Jefferson Oliva and
Marcelo Teixeira and
Dalcimar Casanova A Systematic Literature Review on
Neonatal Fingerprint Recognition . . . . 312:1--312:??
Xiaojie Wang and
Hanxue Li and
Ling Yi and
Zhaolong Ning and
Xiaoming Tao and
Song Guo and
Yan Zhang A Survey on Off-chain Networks:
Frameworks, Technologies, Solutions and
Challenges . . . . . . . . . . . . . . . 313:1--313:??
Mahdis Saeedi and
Hawre Hosseini and
Christine Wong and
Hossein Fani A Survey of Subgraph Optimization for
Expert Team Formation . . . . . . . . . 314:1--314:??
Huan Yan and
Yong Li Generative AI for Intelligent
Transportation Systems: Road
Transportation Perspective . . . . . . . 315:1--315:??
Zhaolong Zheng and
Lin Yao and
Haibo Hu and
Guowei Wu Benchmarking Relaxed Differential
Privacy in Private Learning: a
Comparative Survey . . . . . . . . . . . 316:1--316:??
Weining Weng and
Yang Gu and
Shuai Guo and
Yuan Ma and
Zhaohua Yang and
Yuchen Liu and
Yiqiang Chen Self-supervised Learning for
Electroencephalogram: a Systematic
Survey . . . . . . . . . . . . . . . . . 317:1--317:??
Karthik Shivashankar and
Ghadi Al Hajj and
Antonio Martini Maintainability and Scalability in
Machine Learning: Challenges and
Solutions . . . . . . . . . . . . . . . 318:1--318:??
Satyam Kumar and
Yelleti Vivek and
Vadlamani Ravi and
Indranil Bose A Comprehensive Review of Causal
Inference in Banking, Finance, and
Insurance . . . . . . . . . . . . . . . 319:1--319:??
Dulce Canha and
Sylvain Kubler and
Kary Främling and
Guy Fagherazzi A Functionally-Grounded Benchmark
Framework for XAI Methods: Insights and
Foundations from a Systematic Literature
Review . . . . . . . . . . . . . . . . . 320:1--320:??
Andrea Cini and
Ivan Marisca and
Daniele Zambon and
Cesare Alippi Graph Deep Learning for Time Series
Forecasting . . . . . . . . . . . . . . 321:1--321:??
Leonardo Peroni and
Sergey Gorinsky An End-to-End Pipeline Perspective on
Video Streaming in Best-Effort Networks:
a Survey and Tutorial . . . . . . . . . 322:1--322:??
VijayaKumar Kadha and
Sambit Bakshi and
Santos Kumar Das Unravelling Digital Forgeries: a
Systematic Survey on Image Manipulation
Detection and Localization . . . . . . . 323:1--323:??
Rezika Bouzid and
Raphaël Khoury Assessing the Effectiveness of ChatGPT
in Secure Code Development: a Systematic
Literature Review . . . . . . . . . . . 324:1--324:??
Nan Fu and
Guang Cheng and
Yue Teng and
Guangye Dai and
Shui Yu and
Zihan Chen Intelligent Root Cause Localization in
MicroService Systems: a Survey and New
Perspectives . . . . . . . . . . . . . . 325:1--325:??
Amer Farea and
Zhen Yang and
Kien Duong and
Nadeesha Perera and
Frank Emmert-Streib Evaluation of Question Answering
Systems: Complexity of Judging a Natural
Language . . . . . . . . . . . . . . . . 1:1--1:43
Ahmed Alamri and
Mohammad Alshehri and
Laila Alrajhi and
Alexandra Cristea Prediction of Certification in MOOCs: a
Systematic Literature Review . . . . . . 2:1--2:32
Joan Lu and
Bhavya Krishna Balasubramanian and
Mike Joy and
Qiang Xu Survey and Analysis for the Challenges
in Computer Science to the Automation of
Grading Systems . . . . . . . . . . . . 3:1--3:37
Xiaomei Zhang and
Xiangyu Zhu and
Ming Tang and
Zhen Lei Deep Learning for Human Parsing: a
Survey . . . . . . . . . . . . . . . . . 4:1--4:33
Sanyam Vyas and
Vasilios Mavroudis and
Pete Burnap Towards the Deployment of Realistic
Autonomous Cyber Network Defence: a
Systematic Review . . . . . . . . . . . 5:1--5:36
Jasmin Kaur and
Alvaro Cintas Canto and
Mehran Mozaffari Kermani and
Reza Azarderakhsh A Survey on the Implementations,
Attacks, and Countermeasures of the NIST
Lightweight Cryptography Standard: ASCON 6:1--6:16
Atsushi Hori and
Kaiming Ouyang and
Min Si and
Pavan Balaji and
Julien Jaeger and
Marc Pérache and
Sam White and
Evan Ramos and
Laxmikant Kale and
Kevin Pedretti and
Ron Brightwell and
Balazs Gerofi and
Yutaka Ishikawa A Survey on the Shared Address Space
with Privatized Static Variables
(SAS-PSV) Execution Model for the
Many-Core Era . . . . . . . . . . . . . 7:1--7:34
Umair Qudus and
Michael Röder and
Muhammad Saleem and
Axel-Cyrille Ngonga Ngomo Fact Checking Knowledge Graphs --- a
Survey . . . . . . . . . . . . . . . . . 8:1--8:36
Abhishek Kumar Pandey and
Sherali Zeadally and
Ashok Kumar Das and
Neeraj Kumar Secure Integration of Cyber Engineering
and Medical Cyber-Physical System: a
Survey and Open Issues . . . . . . . . . 9:1--9:36
Kaike Zhang and
Qi Cao and
Fei Sun and
Yunfan Wu and
Shuchang Tao and
Huawei Shen and
Xueqi Cheng Robust Recommender System: a Survey and
Future Directions . . . . . . . . . . . 10:1--10:38
Theekshana Dissanayake and
Yasmeen George and
Dwarikanath Mahapatra and
Shridha Sridharan and
Clinton Fookes and
Zongyuan Ge Few-Shot Learning for Medical Image
Segmentation: a Review and Comparative
Study . . . . . . . . . . . . . . . . . 11:1--11:36
Henri A\"\idasso and
Mohammed Sayagh and
Francis Bordeleau Build Optimization: a Systematic
Literature Review . . . . . . . . . . . 12:1--12:38
Cunxiang Wang and
Xiaoze Liu and
Yuanhao Yue and
Qipeng Guo and
Xiangkun Hu and
Xiangru Tang and
Tianhang Zhang and
Cheng Jiayang and
Yunzhi Yao and
Xuming Hu and
Zehan Qi and
Wenyang Gao and
Yidong Wang and
Linyi Yang and
Jindong Wang and
Xing Xie and
Zheng Zhang and
Yue Zhang Survey on Factuality in Large Language
Models . . . . . . . . . . . . . . . . . 13:1--13:37
Amanjot Kaur and
Nima Valizadeh and
Devki Nandan Jha and
Tomasz Szydlo and
James R. K. Rajasekaran and
Vijay Kumar and
Mutaz Barika and
Jun Liang and
Rajiv Ranjan and
Omer Rana Cybersecurity Challenges in the EV
Charging Ecosystem . . . . . . . . . . . 14:1--14:32
Xupeng Miao and
Gabriele Oliaro and
Zhihao Zhang and
Xinhao Cheng and
Hongyi Jin and
Tianqi Chen and
Zhihao Jia Towards Efficient Generative Large
Language Model Serving: a Survey from
Algorithms to Systems . . . . . . . . . 15:1--15:37
Cheng-Te Li and
Yu-Che Tsai and
Chih-Yao Chen and
Jay Chiehen Liao Graph Neural Networks for Tabular Data
Learning: a Survey with Taxonomy and
Directions . . . . . . . . . . . . . . . 16:1--16:51
Luciana Rebelo and
Francesco Basciani and
Patrizio Pelliccione Applications of AI in Space Domain . . . 17:1--17:38
Philip Empl and
David Koch and
Marietheres Dietz and
Günther Pernul Digital Twins in Security Operations:
State of the Art and Future Perspectives 18:1--18:38
Roberto Leyva and
Epiphaniou Gregory and
Carsten Maple Attack Vectors for Face Recognition
Systems: a Comprehensive Review . . . . 19:1--19:37
Alaa Saleh and
Roberto Morabito and
Schahram Dustdar and
Sasu Tarkoma and
Susanna Pirttikangas and
Lauri Lovén Towards Message Brokers for Generative
AI: Survey, Challenges, and
Opportunities . . . . . . . . . . . . . 20:1--20:37
Guilherme Bittencourt and
Naan Vasconcelos and
Yan Andrade and
Nícollas Silva and
Washington Cunha and
Diego Roberto Colombo Dias and
Marcos André Gonçalves and
Leonardo Rocha Review-Aware Recommender Systems
(RARSs): Recent Advances, Experimental
Comparative Analysis, Discussions, and
New Directions . . . . . . . . . . . . . 21:1--21:49
Xubin Ren and
Wei Wei and
Lianghao Xia and
Chao Huang A Comprehensive Survey on
Self-Supervised Learning for
Recommendation . . . . . . . . . . . . . 22:1--22:38
Saad Khan and
Pedro Afonso Ferreira Lopes martins and
Bruno Sousa and
Vasco Pereira A Comprehensive Review on Lightweight
Cryptographic Mechanisms for Industrial
Internet of Things Systems . . . . . . . 23:1--23:37
Ananya Mukherjee and
Manish Shrivastava Lost in Translation? Found in
Evaluation: a Comprehensive Survey on
Sentence-Level Translation Evaluation 24:1--24:47
Emrul Hasan and
Mizanur Rahman and
Chen Ding and
Jimmy Xiangji Huang and
Shaina Raza Review-based Recommender Systems: a
Survey of Approaches, Challenges and
Future Perspectives . . . . . . . . . . 25:1--25:41
Parush Gera and
Tempestt Neal Deep Learning in Stance Detection: a
Survey . . . . . . . . . . . . . . . . . 26:1--26:37
Nicolas Brisebarre and
Guillaume Hanrot and
Jean-Michel Muller and
Paul Zimmermann Correctly-Rounded Evaluation of a
Function: Why, How, and at What Cost? 27:1--27:34
Zizhen Deng and
Hu Tian and
Xiaolong Zheng and
Daniel Dajun Zeng Deep Causal Learning: Representation,
Discovery and Inference . . . . . . . . 28:1--28:36
Xiaofang Li and
Zhizhong Ma and
Ruili Wang and
Zhixin Sun and
Manna Dai and
Yi Wang and
Zhenguang Liu and
Hong Ye A Survey on Image Segmentation and
Super-resolution Reconstruction in
Visual Sensor Networks . . . . . . . . . 29:1--29:29
Alessandro Bigiotti and
Leonardo Mostarda and
Alfredo Navarra and
Andrea Pinna and
Davide Sestili and
Roberto Tonelli and
Matteo Vaccargiu Blockchain Agnostic Protocols: an
Analysis of the State of the Art . . . . 30:1--30:36
Senthil Kumar Jagatheesaperumal and
Artur Gomes Barreto and
Victor Hugo Cde Albuquerque Metaverse Platforms for Immersive
Healthcare: a Survey on Telemedicine
Solutions . . . . . . . . . . . . . . . 31:1--31:31
Asif Iqbal and
Ashok Kumar Suhag and
Neeraj Kumar and
Arpit Bhardwaj Use of BCI Systems in the Analysis of
EEG Signals for Motor and Speech Imagery
Task: a SLR . . . . . . . . . . . . . . 32:1--32:25
Solange Margarido and
Penousal Machado and
Licínio Roque and
Pedro Martins Boosting Mixed-Initiative Co-Creativity
in Game Design: a Tutorial . . . . . . . 33:1--33:36
Li Li and
Xiang Gao and
Hailong Sun and
Chunming Hu and
Carolyn Sun and
Haoyu Wang and
Haipeng Cai and
Ting Su and
Xiapu Luo and
Tegawendé Bissyande and
Jacques Klein and
John Grundy and
Tao Xie and
Haibo Chen and
Huaimin Wang Software Engineering for OpenHarmony: a
Research Roadmap . . . . . . . . . . . . 34:1--34:36
Tazeem Ahmad and
Alicia Morel and
Nuo Cheng and
Kannappan Palaniappan and
Prasad Calyam and
Kun Sun and
Jianli Pan Future UAV/Drone Systems for Intelligent
Active Surveillance and Monitoring . . . 35:1--35:37
Eduardo Blazquez and
Juan Tapiador Practical Android Software Protection in
the Wild . . . . . . . . . . . . . . . . 36:1--36:32
Shuo Lu and
Yingsheng Wang and
Lijun Sheng and
Lingxiao He and
Aihua Zheng and
Jian Liang Out-of-Distribution Detection: a
Task-Oriented Survey of Recent Advances 37:1--37:39
Jiawei Li and
Yang Gao and
Yizhe Yang and
Yu Bai and
Xiaofeng Zhou and
Yinghao Li and
Huashan Sun and
Yuhang Liu and
Xingpeng Si and
Yuhao Ye and
Yixiao Wu and
Yiguan Lin and
Bin Xu and
Bowen Ren and
Chong Feng and
Heyan Huang Fundamental Capabilities and
Applications of Large Language Models: a
Survey . . . . . . . . . . . . . . . . . 38:1--38:42
Beyza Eken and
Samodha Pallewatta and
Nguyen Tran and
Ayse Tosun and
Muhammad Ali Babar A Multivocal Review of MLOps Practices,
Challenges and Open Issues . . . . . . . 39:1--39:35
Tingting Hang and
Shuting Liu and
Jun Feng and
Hamza Djigal and
Jun Huang Few-Shot Relation Extraction Based on
Prompt Learning: a Taxonomy, Survey,
Challenges and Future Directions . . . . 40:1--40:38
Yun Liao and
Yide Di and
Hao Zhou and
Kaijun Zhu and
Mingyu Lu and
Qing Duan and
Junhui Liu A Survey on Neural Radiance Fields . . . 41:1--41:33
Ramona Kühn and
Jelena Mitrovi'c and
Michael Granitzer Computational Approaches to the
Detection of Lesser-Known Rhetorical
Figures: a Systematic Survey and
Research Challenges . . . . . . . . . . 42:1--42:36
Zixuan Shangguan and
Yanjie Dong and
Song Guo and
Victor C. M. Leung and
M. Jamal Deen and
Xiping Hu Facial Expression Analysis and Its
Potentials in IoT Systems: a
Contemporary Survey . . . . . . . . . . 43:1--43:39
Lingzhe Zhang and
Tong Jia and
Mengxi Jia and
Yifan Wu and
Aiwei Liu and
Yong Yang and
Zhonghai Wu and
Xuming Hu and
Philip Yu and
Ying Li A Survey of AIOps in the Era of Large
Language Models . . . . . . . . . . . . 44:1--44:35
Alexander Michael Rombach and
Peter Fettke Deep Learning Based Key Information
Extraction from Business Documents:
Systematic Literature Review . . . . . . 45:1--45:37
Chuanyu Xue and
Tianyu Zhang and
Yuanbin Zhou and
Mark Nixon and
Andrew Loveless and
Song Han A Survey and Experimental Study of
Real-Time Scheduling Methods for
802.1Qbv TSN Networks . . . . . . . . . 46:1--46:37
Haoxin He and
Shufan Fei and
Zheng Yan Advancing 5G Security and Privacy with
AI: a Survey . . . . . . . . . . . . . . 47:1--47:36
Muhammad Umar Khan and
Girija Chetty and
Roland Goecke and
Raul Fernandez-Rojas A Systematic Review of Multimodal Signal
Fusion for Acute Pain Assessment Systems 48:1--48:35
Xiaofan Zhou and
Baiting Chen and
Yu Gui and
Lu Cheng Conformal Prediction: a Data Perspective 49:1--49:37
Christophe El Zeinaty and
Wassim Hamidouche and
Glenn Herrou and
Daniel Menard Designing Object Detection Models for
TinyML: Foundations, Comparative
Analysis, Challenges, and Emerging
Solutions . . . . . . . . . . . . . . . 50:1--50:48
Angelica Marotta and
Stuart Madnick Analyzing and Categorizing Emerging
Cybersecurity Regulations . . . . . . . 51:1--51:36
Chiyu Zhang and
Lu Zhou and
Xiaogang Xu and
Jiafei Wu and
Zhe Liu Adversarial Attacks of Vision Tasks in
the Past 10 Years: a Survey . . . . . . 52:1--52:42
Shreyas Chaudhari and
Pranjal Aggarwal and
Vishvak Murahari and
Tanmay Rajpurohit and
Ashwin Kalyan and
Karthik Narasimhan and
Ameet Deshpande and
Bruno Castro da Silva RLHF Deciphered: a Critical Analysis of
Reinforcement Learning from Human
Feedback for LLMs . . . . . . . . . . . 53:1--53:37
Liang Shi and
Zhengju Tang and
Nan Zhang and
Xiaotong Zhang and
Zhi Yang A Survey on Employing Large Language
Models for Text-to-SQL Tasks . . . . . . 54:1--54:37
Shriyank Somvanshi and
Syed Aaqib Javed and
Md Monzurul Islam and
Diwas Pandit and
Subasish Das A Survey on Kolmogorov--Arnold Network 55:1--55:35
Phibadeity S. Marwein and
Debdatta Kandar Load Balancing in the Internet of
Vehicles: a Comprehensive Review of SDN
and Machine Learning Approaches . . . . 56:1--56:36
Jingtao Ding and
Yunke Zhang and
Yu Shang and
Yuheng Zhang and
Zefang Zong and
Jie Feng and
Yuan Yuan and
Hongyuan Su and
Nian Li and
Nicholas Sukiennik and
Fengli Xu and
Yong Li Understanding World or Predicting
Future? A Comprehensive Survey of World
Models . . . . . . . . . . . . . . . . . 57:1--57:38
Wei Zhou and
Li Yang and
Lei Zhao and
Runyu Zhang and
Yifan Cui and
Hongpu Huang and
Kun Qie and
Chen Wang Vision Technologies with Applications in
Traffic Surveillance Systems: a Holistic
Survey . . . . . . . . . . . . . . . . . 58:1--58:47
Qing Cheng and
Zefan Zeng and
Xingchen Hu and
Yuehang Si and
Zhong Liu A Survey of Event Causality
Identification: Taxonomy, Challenges,
Assessment, and Prospects . . . . . . . 59:1--59:37
Qiang Xu and
Wenpeng Mu and
Jianing Li and
Tanfeng Sun and
Xinghao Jiang Advancements in AI-Generated Content
Forensics: a Systematic Literature
Review . . . . . . . . . . . . . . . . . 60:1--60:36
Federico Sabbatini Four Decades of Symbolic Knowledge
Extraction from Sub-Symbolic Predictors.
A Survey . . . . . . . . . . . . . . . . 61:1--61:36
Long Chen and
Yuzhi Huang and
Junyu Dong and
Qi Xu and
Sam Kwong and
Huimin Lu and
Huchuan Lu and
Chongyi Li Underwater Optical Object Detection in
the Era of Artificial Intelligence:
Current, Challenge, and Future . . . . . 62:1--62:34
Ola Shorinwa and
Zhiting Mei and
Justin Lidard and
Allen Z. Ren and
Anirudha Majumdar A Survey on Uncertainty Quantification
of Large Language Models: Taxonomy, Open
Research Challenges, and Future
Directions . . . . . . . . . . . . . . . 63:1--63:38
Aref Miri Rekavandi and
Shima Rashidi and
Farid Boussaid and
Stephen Hoefs and
Emre Akbas and
Mohammed Bennamoun Transformers in Small Object Detection:
a Benchmark and Survey of
State-of-the-Art . . . . . . . . . . . . 64:1--64:33
Diego Gomes and
Eduardo Felix and
Fernando Aires and
Marco Vieira Static Code Analysis for IoT Security: a
Systematic Literature Review . . . . . . 65:1--65:47
Yinjin Fu and
Jun Su and
Jiahao Ning and
Jian Wu and
Yutong Lu and
Nong Xiao Distributed Data Deduplication for Big
Data: a Survey . . . . . . . . . . . . . 66:1--66:38
Despoina Giarimpampa and
Roland Meier and
Tegawendé F. Bissyande and
Vincent Lenders and
Jacques Klein Exploring the Role of Artificial
Intelligence in Enhancing Security
Operations: a Systematic Review . . . . 67:1--67:38
Abid Ali and
Diego Molla A Systematic Literature Review on
Multimodal Text Summarization . . . . . 68:1--68:38
Kalana Induwara Wijegunarathna and
Kristin Stock and
Christopher B. Jones Digital Gazetteers: Review and Prospects
for Place Name Knowledge Bases . . . . . 69:1--69:39
Konstantinos Prousalis and
Konstantinos Georgiou and
Andreas Kalogeropoulos and
Dimitrios Ntalaperas and
Nikos Konofaos and
Lefteris Angelis and
Christos Papalitsas and
Thanos Stavropoulos and
Nico Gariboldi A Survey on Sequence Alignment
Algorithms and State-of-the-Art Aligners 70:1--70:40
Nayereh Rasouli and
Cristian Klein and
Erik Elmroth Resource Management for Mission-Critical
Applications in Edge Computing:
Systematic Review on Recent Research and
Open Issues . . . . . . . . . . . . . . 71:1--71:37
Wenyu Dong and
Guangquan Xu and
Shicheng Feng and
Hongpeng Bai and
Michael Sheng and
Xi Zheng Escorting the Confidentiality and
Integrity of UAVs: What Exactly Can
Trusted Execution Environment Offer? . . 72:1--72:35
Pawan Kumar and
Kunwar Pal and
Mahesh Chandra Govil Comprehensive Review of Path Planning
Techniques for Unmanned Aerial Vehicles
(UAVs) . . . . . . . . . . . . . . . . . 73:1--73:44
Federico Olmedo Slicing of Probabilistic Programs: a
Review of Existing Approaches . . . . . 74:1--74:40
Pierre Nagorny and
Bart Kevelham and
Sylvain Chagué and
Caecilia Charbonnier A Comprehensive Review of Real-Time
Multi-View Multi-Person Markerless
Motion Capture . . . . . . . . . . . . . 75:1--75:34
Minfeng Qi and
Qin Wang and
Zhipeng Wang and
Manvir Schneider and
Tianqing Zhu and
Shiping Chen and
William Knottenbelt and
Thomas Hardjono SoK: Bitcoin Layer Two (L2) . . . . . . 76:1--76:37
Ezekiel Soremekun and
Mike Papadakis and
Maxime Cordy and
Yves Le Traon Software Fairness: an Analysis and
Survey . . . . . . . . . . . . . . . . . 77:1--77:38
Namrata Marium Chacko and
Narendra V G and
Mamatha Balachandra and
Manoj T Lightweight Consensus in Blockchain: a
Systematic Literature Review . . . . . . 78:1--78:37
Chen Ling and
Xujiang Zhao and
Jiaying Lu and
Chengyuan Deng and
Can Zheng and
Junxiang Wang and
Tanmoy Chowdhury and
Yun Li and
Hejie Cui and
Xuchao Zhang and
Tianjiao Zhao and
Amit Panalkar and
Dhagash Mehta and
Stefano Pasquali and
Wei Cheng and
Haoyu Wang and
Yanchi Liu and
Zhengzhang Chen and
Haifeng Chen and
Chris White and
Quanquan Gu and
Jian Pei and
Carl Yang and
Liang Zhao Domain Specialization as the Key to Make
Large Language Models Disruptive: a
Comprehensive Survey . . . . . . . . . . 79:1--79:39
Anastassia Gharib and
Jason Jaskolka and
Mohamed Ibnkahla and
Ashraf Matrawy Security Management of Horizontal IoT
Platforms: a Survey and Comparison . . . 80:1--80:39
Abdullahi Kutiriko Abubakar and
Lee Gillam and
Nishanth Sastry The Role of the Internet of Things (IoT)
in Achieving the United Nations (UN)
Sustainable Development Goals (SDGs) ---
a Systematic Review . . . . . . . . . . 81:1--81:46
Luke Topham and
Peter Atherton and
Tom Reynolds and
Yasir Hussain and
Abir Hussain and
Hoshang Kolivand and
Wasiq Khan Artificial Intelligence in Educational
Technology: a Systematic Review of
Datasets and Applications . . . . . . . 82:1--82:28